CVE-2016-6800
CVSS V2 Medium 4.3
CVSS V3 Medium 6.1
Description
The default configuration of the Apache OFBiz framework offers a blog functionality. Different users are able to operate blogs which are related to specific parties. In the form field for the creation of new blog articles the user input of the summary field as well as the article field is not properly sanitized. It is possible to inject arbitrary JavaScript code in these form fields. This code gets executed from the browser of every user who is visiting this article. Mitigation: Upgrade to Apache OFBiz 16.11.01.
Overview
- CVE ID
- CVE-2016-6800
- Assigner
- security@apache.org
- Vulnerability Status
- Modified
- Published Version
- 2017-08-30T17:29:00
- Last Modified Date
- 2019-10-16T20:15:10
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:apache:ofbiz:11.04:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:apache:ofbiz:11.04.01:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:apache:ofbiz:11.04.02:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:apache:ofbiz:11.04.03:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:apache:ofbiz:11.04.04:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:apache:ofbiz:11.04.05:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:apache:ofbiz:11.04.06:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:apache:ofbiz:12.04:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:apache:ofbiz:12.04.01:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:apache:ofbiz:12.04.02:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:apache:ofbiz:12.04.03:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:apache:ofbiz:12.04.04:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:apache:ofbiz:12.04.05:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:apache:ofbiz:12.04.06:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:apache:ofbiz:13.07:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:apache:ofbiz:13.07.01:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:apache:ofbiz:13.07.02:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:apache:ofbiz:13.07.03:*:*:*:*:*:*:* | 1 | OR |
CVSS Version 2
- Version
- 2.0
- Vector String
- AV:N/AC:M/Au:N/C:N/I:P/A:N
- Access Vector
- NETWORK
- Access Compatibility
- MEDIUM
- Authentication
- NONE
- Confidentiality Impact
- NONE
- Integrity Impact
- PARTIAL
- Availability Impact
- NONE
- Base Score
- 4.3
- Severity
- MEDIUM
- Exploitability Score
- 8.6
- Impact Score
- 2.9
CVSS Version 3
- Version
- 3.0
- Vector String
- CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
- Attack Vector
- NETWORK
- Attack Compatibility
- LOW
- Privileges Required
- NONE
- User Interaction
- REQUIRED
- Scope
- CHANGED
- Confidentiality Impact
- LOW
- Availability Impact
- NONE
- Base Score
- 6.1
- Base Severity
- MEDIUM
- Exploitability Score
- 2.8
- Impact Score
- 2.7
References
Reference URL | Reference Tags |
---|---|
https://s.apache.org/Owsz | Mailing List Mitigation Vendor Advisory |
https://lists.apache.org/thread.html/28987cffe0237fa67eca9de8bbbc04a917ac8785342ad9e5a196c978@%3Cuser.ofbiz.apache.org%3E |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2016-6800 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6800 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2022-05-10 17:01:27 | Added to TrackCVE | |||
2022-12-02 20:28:46 | 2017-08-30T17:29Z | 2017-08-30T17:29:00 | CVE Published Date | updated |
2022-12-02 20:28:46 | 2019-10-16T20:15:10 | CVE Modified Date | updated | |
2022-12-02 20:28:46 | Modified | Vulnerability Status | updated |