[jira] [Commented] (OFBIZ-12096) Post-auth XSS vulnerability at catalog/control/EditProductPromo
[ https://issues.apache.org/jira/browse/OFBIZ-12096?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=17252258#comment-17252258 ] ASF subversion and git services commented on OFBIZ-12096: - Commit c52f29e0ae7409884c620434def11f2c47bd380f in ofbiz-framework's branch refs/heads/trunk from Jacques Le Roux [ https://gitbox.apache.org/repos/asf?p=ofbiz-framework.git;h=c52f29e ] Fixed: Post-auth XSS vulnerability at catalog/control/EditProductPromo (OFBIZ-12096) We missed to unescape EcmaScript encoded strings in UtilCoded::checkStringForHtmlSafe, ie in all form fields using allow-html="safe" Thanks: 牛治 for report > Post-auth XSS vulnerability at catalog/control/EditProductPromo > --- > > Key: OFBIZ-12096 > URL: https://issues.apache.org/jira/browse/OFBIZ-12096 > Project: OFBiz > Issue Type: Sub-task > Components: product/catalog >Affects Versions: Trunk >Reporter: Jacques Le Roux >Assignee: Jacques Le Roux >Priority: Major > Fix For: 18.12.01, 17.12.05 > > > This vulnerability was reported by 牛治 : > Locations: > * catalog/control/EditProductPromo > * catalog/control/EditProductPromoCode > Description: the Promo Name and Promo Text input boxes on the > EditProductPromo page have not a valid verification and result in an XSS > attack. > Poc: Encode the characters of "alert('poruin')", and the poc > after encoding is as follows > "\x3C\x73\x63\x72\x69\x70\x74\x3E\x61\x6C\x65\x72\x74\x28\x27\x70\x6F\x72\x75\x69\x6E\x27\x29\x3C\x2F\x73\x63\x72\x69\x70\x74\x3E" > As this vulnerability is a post-auth we did not create a CVE -- This message was sent by Atlassian Jira (v8.3.4#803005)
[jira] [Commented] (OFBIZ-12096) Post-auth XSS vulnerability at catalog/control/EditProductPromo
[ https://issues.apache.org/jira/browse/OFBIZ-12096?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=17252256#comment-17252256 ] ASF subversion and git services commented on OFBIZ-12096: - Commit 540f5c80cd07c470712d8081a827e30a1c520554 in ofbiz-framework's branch refs/heads/release17.12 from Jacques Le Roux [ https://gitbox.apache.org/repos/asf?p=ofbiz-framework.git;h=540f5c8 ] Fixed: Post-auth XSS vulnerability at catalog/control/EditProductPromo (OFBIZ-12096) Prevents issues with integration tests Conflicts handled by hand: framework/base/src/main/java/org/apache/ofbiz/base/util/UtilCodec.java > Post-auth XSS vulnerability at catalog/control/EditProductPromo > --- > > Key: OFBIZ-12096 > URL: https://issues.apache.org/jira/browse/OFBIZ-12096 > Project: OFBiz > Issue Type: Sub-task > Components: product/catalog >Affects Versions: Trunk >Reporter: Jacques Le Roux >Assignee: Jacques Le Roux >Priority: Major > Fix For: 18.12.01, 17.12.05 > > > This vulnerability was reported by 牛治 : > Locations: > * catalog/control/EditProductPromo > * catalog/control/EditProductPromoCode > Description: the Promo Name and Promo Text input boxes on the > EditProductPromo page have not a valid verification and result in an XSS > attack. > Poc: Encode the characters of "alert('poruin')", and the poc > after encoding is as follows > "\x3C\x73\x63\x72\x69\x70\x74\x3E\x61\x6C\x65\x72\x74\x28\x27\x70\x6F\x72\x75\x69\x6E\x27\x29\x3C\x2F\x73\x63\x72\x69\x70\x74\x3E" > As this vulnerability is a post-auth we did not create a CVE -- This message was sent by Atlassian Jira (v8.3.4#803005)
[jira] [Commented] (OFBIZ-12096) Post-auth XSS vulnerability at catalog/control/EditProductPromo
[ https://issues.apache.org/jira/browse/OFBIZ-12096?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=17252257#comment-17252257 ] ASF subversion and git services commented on OFBIZ-12096: - Commit 42571fb635964540ff217f5ecd0753a1fefd3078 in ofbiz-framework's branch refs/heads/release18.12 from Jacques Le Roux [ https://gitbox.apache.org/repos/asf?p=ofbiz-framework.git;h=42571fb ] Fixed: Post-auth XSS vulnerability at catalog/control/EditProductPromo (OFBIZ-12096) Prevents issues with integration tests Conflicts handled by hand: framework/base/src/main/java/org/apache/ofbiz/base/util/UtilCodec.java > Post-auth XSS vulnerability at catalog/control/EditProductPromo > --- > > Key: OFBIZ-12096 > URL: https://issues.apache.org/jira/browse/OFBIZ-12096 > Project: OFBiz > Issue Type: Sub-task > Components: product/catalog >Affects Versions: Trunk >Reporter: Jacques Le Roux >Assignee: Jacques Le Roux >Priority: Major > Fix For: 18.12.01, 17.12.05 > > > This vulnerability was reported by 牛治 : > Locations: > * catalog/control/EditProductPromo > * catalog/control/EditProductPromoCode > Description: the Promo Name and Promo Text input boxes on the > EditProductPromo page have not a valid verification and result in an XSS > attack. > Poc: Encode the characters of "alert('poruin')", and the poc > after encoding is as follows > "\x3C\x73\x63\x72\x69\x70\x74\x3E\x61\x6C\x65\x72\x74\x28\x27\x70\x6F\x72\x75\x69\x6E\x27\x29\x3C\x2F\x73\x63\x72\x69\x70\x74\x3E" > As this vulnerability is a post-auth we did not create a CVE -- This message was sent by Atlassian Jira (v8.3.4#803005)
[jira] [Commented] (OFBIZ-12096) Post-auth XSS vulnerability at catalog/control/EditProductPromo
[ https://issues.apache.org/jira/browse/OFBIZ-12096?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=17252241#comment-17252241 ] ASF subversion and git services commented on OFBIZ-12096: - Commit c7fef0c409bca7c01d1f94e9431af52714398c58 in ofbiz-framework's branch refs/heads/trunk from Jacques Le Roux [ https://gitbox.apache.org/repos/asf?p=ofbiz-framework.git;h=c7fef0c ] Fixed: Post-auth XSS vulnerability at catalog/control/EditProductPromo (OFBIZ-12096) We missed to unescape EcmaScript encoded strings in UtilCoded::checkStringForHtmlSafe, ie in all form fields using allow-html="safe" Thanks: 牛治 for report > Post-auth XSS vulnerability at catalog/control/EditProductPromo > --- > > Key: OFBIZ-12096 > URL: https://issues.apache.org/jira/browse/OFBIZ-12096 > Project: OFBiz > Issue Type: Sub-task > Components: product/catalog >Affects Versions: Trunk >Reporter: Jacques Le Roux >Assignee: Jacques Le Roux >Priority: Major > > This vulnerability was reported by 牛治 : > Locations: > * catalog/control/EditProductPromo > * catalog/control/EditProductPromoCode > Description: the Promo Name and Promo Text input boxes on the > EditProductPromo page have not a valid verification and result in an XSS > attack. > Poc: Encode the characters of "alert('poruin')", and the poc > after encoding is as follows > "\x3C\x73\x63\x72\x69\x70\x74\x3E\x61\x6C\x65\x72\x74\x28\x27\x70\x6F\x72\x75\x69\x6E\x27\x29\x3C\x2F\x73\x63\x72\x69\x70\x74\x3E" > As this vulnerability is a post-auth we did not create a CVE -- This message was sent by Atlassian Jira (v8.3.4#803005)
[jira] [Commented] (OFBIZ-12096) Post-auth XSS vulnerability at catalog/control/EditProductPromo
[ https://issues.apache.org/jira/browse/OFBIZ-12096?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=17252239#comment-17252239 ] ASF subversion and git services commented on OFBIZ-12096: - Commit 637e02978cb0e11df0d202a2272055e3bf68e542 in ofbiz-framework's branch refs/heads/release17.12 from Jacques Le Roux [ https://gitbox.apache.org/repos/asf?p=ofbiz-framework.git;h=637e029 ] Fixed: Post-auth XSS vulnerability at catalog/control/EditProductPromo (OFBIZ-12096) We missed to unescape EcmaScript encoded strings in UtilCoded::checkStringForHtmlSafe, ie in all form fields using allow-html="safe" Thanks: 牛治 for report Conflicts handled by hand => no functional changes in code (ude to IDE setting) framework/base/src/main/java/org/apache/ofbiz/base/util/UtilCodec.java > Post-auth XSS vulnerability at catalog/control/EditProductPromo > --- > > Key: OFBIZ-12096 > URL: https://issues.apache.org/jira/browse/OFBIZ-12096 > Project: OFBiz > Issue Type: Sub-task > Components: product/catalog >Affects Versions: Trunk >Reporter: Jacques Le Roux >Assignee: Jacques Le Roux >Priority: Major > > This vulnerability was reported by 牛治 : > Locations: > * catalog/control/EditProductPromo > * catalog/control/EditProductPromoCode > Description: the Promo Name and Promo Text input boxes on the > EditProductPromo page have not a valid verification and result in an XSS > attack. > Poc: Encode the characters of "alert('poruin')", and the poc > after encoding is as follows > "\x3C\x73\x63\x72\x69\x70\x74\x3E\x61\x6C\x65\x72\x74\x28\x27\x70\x6F\x72\x75\x69\x6E\x27\x29\x3C\x2F\x73\x63\x72\x69\x70\x74\x3E" > As this vulnerability is a post-auth we did not create a CVE -- This message was sent by Atlassian Jira (v8.3.4#803005)
[jira] [Commented] (OFBIZ-12096) Post-auth XSS vulnerability at catalog/control/EditProductPromo
[ https://issues.apache.org/jira/browse/OFBIZ-12096?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=17252240#comment-17252240 ] ASF subversion and git services commented on OFBIZ-12096: - Commit d620550a5f0fb757d2af6f66af0d7b2e19f9cb6f in ofbiz-framework's branch refs/heads/release18.12 from Jacques Le Roux [ https://gitbox.apache.org/repos/asf?p=ofbiz-framework.git;h=d620550 ] Fixed: Post-auth XSS vulnerability at catalog/control/EditProductPromo (OFBIZ-12096) We missed to unescape EcmaScript encoded strings in UtilCoded::checkStringForHtmlSafe, ie in all form fields using allow-html="safe" Thanks: 牛治 for report Conflicts handled by hand => no functional changes in code (ude to IDE setting) framework/base/src/main/java/org/apache/ofbiz/base/util/UtilCodec.java > Post-auth XSS vulnerability at catalog/control/EditProductPromo > --- > > Key: OFBIZ-12096 > URL: https://issues.apache.org/jira/browse/OFBIZ-12096 > Project: OFBiz > Issue Type: Sub-task > Components: product/catalog >Affects Versions: Trunk >Reporter: Jacques Le Roux >Assignee: Jacques Le Roux >Priority: Major > > This vulnerability was reported by 牛治 : > Locations: > * catalog/control/EditProductPromo > * catalog/control/EditProductPromoCode > Description: the Promo Name and Promo Text input boxes on the > EditProductPromo page have not a valid verification and result in an XSS > attack. > Poc: Encode the characters of "alert('poruin')", and the poc > after encoding is as follows > "\x3C\x73\x63\x72\x69\x70\x74\x3E\x61\x6C\x65\x72\x74\x28\x27\x70\x6F\x72\x75\x69\x6E\x27\x29\x3C\x2F\x73\x63\x72\x69\x70\x74\x3E" > As this vulnerability is a post-auth we did not create a CVE -- This message was sent by Atlassian Jira (v8.3.4#803005)