Project:
View Issue Details[ Jump to Notes ] | [ Issue History ] [ Print ] | ||||||||||
ID | |||||||||||
0014854 | |||||||||||
Type | Category | Severity | Reproducibility | Date Submitted | Last Update | ||||||
design defect | [Openbravo ERP] C. Security | major | always | 2010-10-12 00:42 | 2022-02-01 08:08 | ||||||
Reporter | cmlh_id_au | View Status | public | ||||||||
Assigned To | Triage Platform Base | ||||||||||
Priority | high | Resolution | open | Fixed in Version | |||||||
Status | acknowledged | Fix in branch | Fixed in SCM revision | ||||||||
Projection | none | ETA | none | Target Version | |||||||
OS | Linux 32 bit | Database | PostgreSQL | Java version | 1.6.0_18 | ||||||
OS Version | Community Appliance | Database version | 8.3.9 | Ant version | 1.7.1 | ||||||
Product Version | SCM revision | ||||||||||
Review Assigned To | |||||||||||
Web browser | |||||||||||
Modules | Core | ||||||||||
Regression level | |||||||||||
Regression date | |||||||||||
Regression introduced in release | |||||||||||
Regression introduced by commit | |||||||||||
Triggers an Emergency Pack | No | ||||||||||
Summary | 0014854: Cross Site Scripting (XSS) - Reflected - ExportGrid.html - "Command" Parameter | ||||||||||
Description | The value of the "Command" Parameter is not validated and/or escaped during the HTTP GET Request of /openbravo/utility/ExportGrid.html and hence is vulnerable to Reflected Cross Site Scripting (XSS) | ||||||||||
Steps To Reproduce | 1. Copy and paste the following URL into Firefox after authenticating to http://demo2.openbravo.com: [^] http://demo2.openbravo.com/openbravo/utility/ExportGrid.html?inpTabId=347&inpWindowId=204&inpAccessLevel=7&Command=CSV%22%3E%3Cimg%20src%3da%20onerror%3dalert%28%27XSS%27%29%3E&inpTabId=347&inpParamSessionDate=&inpwindowId=204&inprMailtextId=&inpkeyColumnId=R_MailText_ID&inpTableId=416&inpKeyName=inprMailtextId&urlwin=MailTemplate_Edition.html&inpAccessLevel=7 [^] 2. A Javascript Alert Box will display "XSS" as per the attached screenshot. | ||||||||||
Proposed Solution | Validate and escape the value of the "Command" Parameter on the server side i.e. prior to the Javascript being executed by the web browser. | ||||||||||
Tags | No tags attached. | ||||||||||
Attached Files | Cross_Site_Scripting_(XSS)_-_Reflected_-_ExportGrid.html_-_Command_Parameter.jpg [^] (74,291 bytes) 2010-10-12 00:42
| ||||||||||
Relationships [ Relation Graph ] [ Dependency Graph ] | |
Notes | |
(0052470) AugustoMauch (administrator) 2012-09-24 23:26 |
Effort: 1 Impact: low Plan: short |
Issue History | |||
Date Modified | Username | Field | Change |
2010-10-12 00:42 | cmlh_id_au | New Issue | |
2010-10-12 00:42 | cmlh_id_au | Assigned To | => alostale |
2010-10-12 00:42 | cmlh_id_au | File Added: Cross_Site_Scripting_(XSS)_-_Reflected_-_ExportGrid.html_-_Command_Parameter.jpg | |
2010-10-12 00:46 | cmlh_id_au | Issue Monitored: cmlh_id_au | |
2010-10-25 08:56 | alostale | Assigned To | alostale => shuehner |
2010-10-25 08:56 | alostale | Status | new => scheduled |
2011-10-28 17:05 | dmitry_mezentsev | Type | defect => design defect |
2012-02-20 11:14 | shuehner | Assigned To | shuehner => alostale |
2012-09-24 23:26 | AugustoMauch | Note Added: 0052470 | |
2012-09-24 23:26 | AugustoMauch | Priority | normal => high |
2017-03-31 14:36 | alostale | Status | scheduled => acknowledged |
2017-04-10 14:34 | alostale | Assigned To | alostale => platform |
2022-02-01 08:08 | alostale | Assigned To | platform => Triage Platform Base |
Copyright © 2000 - 2009 MantisBT Group |