References [5] (trunk) and [6] (9.04) below contain the commits for the fixes.
Regards Scott HotWax Media http://www.hotwaxmedia.com On 15/04/2010, at 8:43 AM, BJ Freeman wrote: > - 2010-03-08: > Vendor fixed this issue. > how can we verify that they are fixed n the trunk > are the recommendation of 9.04 accurate. > > > ========================= > BJ Freeman > http://bjfreeman.elance.com > Strategic Power Office with Supplier Automation > <http://www.businessesnetwork.com/automation/viewforum.php?f=93> > Specialtymarket.com <http://www.specialtymarket.com/> > > Systems Integrator-- Glad to Assist > > Chat Y! messenger: bjfr33man > Linkedin > <http://www.linkedin.com/profile?viewProfile=&key=1237480&locale=en_US&trk=tab_pro> > > > Jacopo Cappellato sent the following on 4/14/2010 12:53 PM: >> Bonsai Information Security - Advisory >> http://www.bonsai-sec.com/research/ >> >> Multiple XSS in Apache OFBiz >> >> 1. *Advisory Information* >> >> Title: Multiple XSS in Apache OFBiz >> Advisory ID: BONSAI-2010-0103 >> Advisory URL: >> http://www.bonsai-sec.com/research/vulnerabilities/apacheofbiz-multiple-xss-0103.php >> Date published: 2010-04-14 >> Vendors contacted: Apache Software Foundation >> Release mode: Coordinated release >> >> >> 2. *Vulnerability Information* >> >> Class: Multiple Cross Site Scripting (XSS) >> Remotely Exploitable: Yes >> Locally Exploitable: Yes >> CVE Name: CVE-2010-0432 >> >> >> 3. *Software Description* >> >> Apache Open For Business (Apache OFBiz) is a community-driven >> Open Source Enterprise Resource Planning (ERP) system. >> It provides a suite of enterprise applications that integrate >> and automate many of the business processes of an enterprise. >> Apache OFBiz is a foundation and starting point for reliable, >> secure and scalable enterprise solutions. >> OFBiz is an Apache Software Foundation top level project. >> >> >> 4. *Vulnerability Description* >> >> Cross-Site Scripting attacks are a type of injection problem, in which >> malicious scripts are injected into the otherwise benign and trusted web >> sites. >> Cross-site scripting (XSS) attacks occur when an attacker uses a web >> application to send malicious code, generally in the form of a browser side >> script, to a different end user. Flaws that allow these attacks to succeed >> are >> quite widespread and occur anywhere a web application uses input from a user >> in the output it generates without validating or encoding it. >> >> This vulnerability can be exploited to force a logged in Administrator >> to run arbitrary SQL commands [3] or create a new user with Full Privileges >> [4]. >> You can find customized XSS PoC payloads here. >> >> For additional information and a demostrative video, please read [1] and [2]. >> >> >> 5. *Vulnerable packages* >> >> Apache OFBiz: >> - Stable Version <= 9.04 >> - SVN Revision <= 920371 >> - Release Branch Candidate 4.0 Revision <= 920381 >> >> Products based on Apache OFBiz: >> - Opentaps Version <= 1.4 >> - Neogia Version <= 1.0 >> - Entente Oya Version <= 1.6 >> >> Since there are more products based on Apache OFBiz, these vulnerabilities >> resides >> in some of them but unconfirmed. Check [2] for updates. >> >> >> 6. *Mitigation* >> >> SVN Trunk users should update to at least revision 920372 >> from svn or apply the following patches [5]. >> Release Branch Candidate 09.04 should update to at least revision 920382 >> from svn or applythe following patches [6]. >> Apache Software Foundation developers informed us that all users should >> upgrade to the latest version of Apache OFBiz, which fixes this >> vulnerability. >> More information to be found here: >> >> http://ofbiz.apache.org >> >> >> 7. *Credits* >> >> These vulnerabilities were discovered by Lucas Apa ( lucas -at- >> bonsai-sec.com ). >> >> >> 8. *Technical Description* >> >> 8.1 A Reflected Cross Site Scripting vulnerability was found in the >> "productStoreId" variable within the 'Export Product Listing' section. >> When rendering menu widget item links of type hidden-form, the hidden >> input value attributes were not being html encoded. In many cases these >> hidden input values are derived from request parameters and could be used >> in a Reflected Cross-Site Scripting attack. >> >> For a page that contains a menu widget with the following menu item >> definition: >> <menu-item name="ebayExportAllCategoryToEbayStore" >> title="${uiLabelMap.EbayExportAllCategoryToEbayStore}"> >> <link target="exportCategoryEbayStore"> >> <parameter param-name="productStoreId" >> value="${parameters.productStoreId}"/> >> </link> >> </menu-item> >> >> The vulnerability can be triggered by clicking on the >> following URL: >> >> https://www.ofbiz-example.com/ebaystore/control/exportProductListing?productStoreId=90100" >> style="width:100%25;height:100%25;display:block;position:absolute;top:0px;left:0px" >> onMouseOver="alert(document.cookie) >> >> >> 8.2 A Reflected Cross Site Scripting vulnerability was found in the >> "partyId" variable within the 'View Profile' section. >> This is because the application does not properly sanitise >> the users input. The vulnerability can be triggered by clicking on the >> following URL: >> >> https://www.ofbiz-example.com/partymgr/control/viewprofile?&partyId=aa" >> style="width:100%25;height:100%25;display:block;position:absolute;top:0px;left:0px" >> onMouseOver="alert(document.cookie) >> >> https://www.neogia-example.com/partymgr/control/login;partyId=aa" >> style="width:100%25;height:100%25;display:block;position:absolute;top:0px;left:0px" >> onMouseOver="alert(document.cookie) >> >> https://www.opentaps-example.com/partymgr/control/viewprofile?partyId=aa" >> style="width:100%25;height:100%25;display:block;position:absolute;top:0px;left:0px" >> onMouseOver="alert(document.cookie) >> >> >> 8.3 A Reflected Cross Site Scripting vulnerability was found in the >> "start" variable within the 'Show Portal Page' section. >> During page rendering, if a FreeMarker TemplateException is thrown >> then the stack trace is printed directly into the response and the >> exception messages may contain un-sanitized user input which can expose >> a Reflected Cross-Site Scripting vulnerability. >> >> For any page rendered via a FreeMarker template that contains: >> ${screens.render(screenLocation, screenName)} >> (or a similar screens.render(Ķ) call) >> >> The vulnerability can be triggered by clicking on the >> following URL: >> >> https://www.ofbiz-example.com/myportal/control/showPortalPage?period=week >> &start=1266796800000\<script>alert(document.cookie)</script> >> >> >> 8.4 A 404-based Reflected Cross Site Scripting vulnerability was found >> on the whole application. >> When using the ControlServlet, if an invalid request URI is supplied then >> the 404 error page displays the requested URI without first sanitizing it. >> The vulnerability can be triggered by clicking on the >> following URL: >> >> https://www.ofbiz-example.com/facility/control/ReceiveReturn"<b><body >> onLoad="alert(document.cookie)"><br><div>><!-- >> >> https://www.neogia-example.com/facility/control/ReceiveReturn"<b><body >> onLoad="alert(document.cookie)"><br><div>><!-- >> >> http://www.opentaps-example.com/crmsfa/control/ReceiveReturn"<b><body >> onLoad="alert(document.cookie)"><br><div>><!-- >> >> https://www.ententeoya-example.com/cms/control/ReceiveReturn"<b><body >> onLoad="alert(document.cookie)"><br><div>><!-- >> >> >> 8.5 A Reflected Cross Site Scripting vulnerability was found >> on the ecommerce section specifically in the 'entityName' variable. >> The vulnerability can be triggered by clicking on the >> following URL: >> >> http://www.ofbiz-example.com/ecommerce/control/ViewBlogArticle?contentId=BLG10000\<script> >> alert(document.cookie)</script>&blogContentId=BLOGROOTBIGAL >> >> http://www.opentaps-example.com/ecommerce/control/ViewBlogArticle?contentId=BLG10000\<script> >> alert(document.cookie)</script>&blogContentId=BLOGROOTBIGAL >> >> >> 8.6 A Reflected Cross Site Scripting vulnerability was found in the >> "entityName" variable within the 'Web Tools' section. >> This is because the application fails to correctly sanitize >> multiple form widget controls data before rendering it. >> The vulnerability can be triggered by clicking on the >> following URL: >> >> https://www.ofbiz-example.com/webtools/control/FindGeneric?entityName=AccommodationClass\<script> >> alert(document.cookie)</script>&find=true&VIEW_SIZE=50&VIEW_INDEX=0 >> >> 8.7 A Persistant Cross Site Scripting vulnerability was found in almost >> every user controlled parameters within the application. >> This is because the application does not properly sanitise >> the users input. An example of this vulnerability can be triggered by >> following these steps. >> >> i) A logged in user sends the following string on 'subject' or 'content' >> parameters within the 'ecommerce/control/contactus' section. >> >> <script>alert(document.cookie)</script> >> >> ii) A logged in Administrator browses 'Other Party Comms' section. >> >> iii) The browser executes the JavaScript on every future Other Party Comms >> load. >> >> 9. *Report Timeline* >> >> - 2010-02-17: >> Vulnerabilities were identified. >> >> - 2010-02-23: >> Vendor contacted. >> >> - 2010-02-24: >> Other products based on Ofbiz contacted. No specific answer given >> >> - 2010-02-27: >> Vendor confirms this issue and inform us a fix will be available soon. >> >> - 2010-03-08: >> Vendor fixed this issue. >> >> - 2010-03-09: >> Other products based on Ofbiz contacted again for an approximate fix >> release date. No answer. >> >> - 2010-03-12: >> Other products based on Ofbiz contacted. No answer. >> >> - 2010-04-06: >> The advisory BONSAI-2010-0103 is published. >> >> >> 10. *References* >> >> [0] http://ofbiz.apache.org/ >> [1] http://www.owasp.org/index.php/Cross_site_scripting >> [2] http://www.bonsai-sec.com/en/research/vulnerabilities/ofbizexploiter.php >> [3] >> http://www.bonsai-sec.com/en/research/vulnerabilities/create-user-xss-payload.js >> [4] >> http://www.bonsai-sec.com/en/research/vulnerabilities/sql-exec-xss-payload.js >> [5] http://svn.apache.org/viewvc?rev=920369&view=rev >> http://svn.apache.org/viewvc?rev=920370&view=rev >> http://svn.apache.org/viewvc?rev=920371&view=rev >> http://svn.apache.org/viewvc?rev=920372&view=rev >> [6] http://svn.apache.org/viewvc?rev=920379&view=rev >> http://svn.apache.org/viewvc?rev=920380&view=rev >> http://svn.apache.org/viewvc?rev=920381&view=rev >> http://svn.apache.org/viewvc?rev=920382&view=rev >> [7] http://www.bonsai-sec.com/blog >> >> 11. *About Bonsai* >> >> Bonsai is a company involved in providing professional computer information >> security services. >> Currently a sound growth company, since its foundation in early 2009 in >> Buenos Aires, Argentina, >> we are fully committed to quality service, and focused on our customers' >> real needs. >> >> >> 12. *Disclaimer* >> >> The contents of this advisory are copyright (c) 2010 Bonsai Information >> Security, and may be >> distributed freely provided that no fee is charged for this distribution and >> proper credit is >> given. >
smime.p7s
Description: S/MIME cryptographic signature
