CVE-2016-6800
Published on: 08/30/2017 12:00:00 AM UTC
Last Modified on: 03/23/2021 11:27:11 PM UTC
Certain versions of Ofbiz from Apache contain the following vulnerability:
The default configuration of the Apache OFBiz framework offers a blog functionality. Different users are able to operate blogs which are related to specific parties. In the form field for the creation of new blog articles the user input of the summary field as well as the article field is not properly sanitized. It is possible to inject arbitrary JavaScript code in these form fields. This code gets executed from the browser of every user who is visiting this article. Mitigation: Upgrade to Apache OFBiz 16.11.01.
- CVE-2016-6800 has been assigned by
[email protected] to track the vulnerability - currently rated as MEDIUM severity.
- Affected Vendor/Software:
Apache Software Foundation - Apache OFBiz version 13.07.*
- Affected Vendor/Software:
Apache Software Foundation - Apache OFBiz version 12.04.*
- Affected Vendor/Software:
Apache Software Foundation - Apache OFBiz version 11.04.*
CVSS3 Score: 6.1 - MEDIUM
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
|
---|---|---|---|---|
NETWORK | LOW | NONE | REQUIRED | |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
|
CHANGED | LOW | LOW | NONE |
CVSS2 Score: 4.3 - MEDIUM
Access Vector ⓘ |
Access Complexity |
Authentication |
---|---|---|
NETWORK | MEDIUM | NONE |
Confidentiality Impact |
Integrity Impact |
Availability Impact |
NONE | PARTIAL | NONE |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
[SECURITY] CVE-2016-6800 Apache OFBiz blog stored XSS vulnerability | Mailing List Mitigation Vendor Advisory s.apache.org text/xml |
![]() |
Pony Mail! | lists.apache.org text/html |
![]() |
There are currently no QIDs associated with this CVE
Known Affected Configurations (CPE V2.3)
Type | Vendor | Product | Version | Update | Edition | Language |
---|---|---|---|---|---|---|
Application | Apache | Ofbiz | 11.04 | All | All | All |
Application | Apache | Ofbiz | 11.04.01 | All | All | All |
Application | Apache | Ofbiz | 11.04.02 | All | All | All |
Application | Apache | Ofbiz | 11.04.03 | All | All | All |
Application | Apache | Ofbiz | 11.04.04 | All | All | All |
Application | Apache | Ofbiz | 11.04.05 | All | All | All |
Application | Apache | Ofbiz | 11.04.06 | All | All | All |
Application | Apache | Ofbiz | 12.04 | All | All | All |
Application | Apache | Ofbiz | 12.04.01 | All | All | All |
Application | Apache | Ofbiz | 12.04.02 | All | All | All |
Application | Apache | Ofbiz | 12.04.03 | All | All | All |
Application | Apache | Ofbiz | 12.04.04 | All | All | All |
Application | Apache | Ofbiz | 12.04.05 | All | All | All |
Application | Apache | Ofbiz | 12.04.06 | All | All | All |
Application | Apache | Ofbiz | 13.07 | All | All | All |
Application | Apache | Ofbiz | 13.07.01 | All | All | All |
Application | Apache | Ofbiz | 13.07.02 | All | All | All |
Application | Apache | Ofbiz | 13.07.03 | All | All | All |
Application | Apache | Ofbiz | 11.04 | All | All | All |
Application | Apache | Ofbiz | 11.04.01 | All | All | All |
Application | Apache | Ofbiz | 11.04.02 | All | All | All |
Application | Apache | Ofbiz | 11.04.03 | All | All | All |
Application | Apache | Ofbiz | 11.04.04 | All | All | All |
Application | Apache | Ofbiz | 11.04.05 | All | All | All |
Application | Apache | Ofbiz | 11.04.06 | All | All | All |
Application | Apache | Ofbiz | 12.04 | All | All | All |
Application | Apache | Ofbiz | 12.04.01 | All | All | All |
Application | Apache | Ofbiz | 12.04.02 | All | All | All |
Application | Apache | Ofbiz | 12.04.03 | All | All | All |
Application | Apache | Ofbiz | 12.04.04 | All | All | All |
Application | Apache | Ofbiz | 12.04.05 | All | All | All |
Application | Apache | Ofbiz | 12.04.06 | All | All | All |
Application | Apache | Ofbiz | 13.07 | All | All | All |
Application | Apache | Ofbiz | 13.07.01 | All | All | All |
Application | Apache | Ofbiz | 13.07.02 | All | All | All |
Application | Apache | Ofbiz | 13.07.03 | All | All | All |
- cpe:2.3:a:apache:ofbiz:11.04:*:*:*:*:*:*:*:
- cpe:2.3:a:apache:ofbiz:11.04.01:*:*:*:*:*:*:*:
- cpe:2.3:a:apache:ofbiz:11.04.02:*:*:*:*:*:*:*:
- cpe:2.3:a:apache:ofbiz:11.04.03:*:*:*:*:*:*:*:
- cpe:2.3:a:apache:ofbiz:11.04.04:*:*:*:*:*:*:*:
- cpe:2.3:a:apache:ofbiz:11.04.05:*:*:*:*:*:*:*:
- cpe:2.3:a:apache:ofbiz:11.04.06:*:*:*:*:*:*:*:
- cpe:2.3:a:apache:ofbiz:12.04:*:*:*:*:*:*:*:
- cpe:2.3:a:apache:ofbiz:12.04.01:*:*:*:*:*:*:*:
- cpe:2.3:a:apache:ofbiz:12.04.02:*:*:*:*:*:*:*:
- cpe:2.3:a:apache:ofbiz:12.04.03:*:*:*:*:*:*:*:
- cpe:2.3:a:apache:ofbiz:12.04.04:*:*:*:*:*:*:*:
- cpe:2.3:a:apache:ofbiz:12.04.05:*:*:*:*:*:*:*:
- cpe:2.3:a:apache:ofbiz:12.04.06:*:*:*:*:*:*:*:
- cpe:2.3:a:apache:ofbiz:13.07:*:*:*:*:*:*:*:
- cpe:2.3:a:apache:ofbiz:13.07.01:*:*:*:*:*:*:*:
- cpe:2.3:a:apache:ofbiz:13.07.02:*:*:*:*:*:*:*:
- cpe:2.3:a:apache:ofbiz:13.07.03:*:*:*:*:*:*:*:
- cpe:2.3:a:apache:ofbiz:11.04:*:*:*:*:*:*:*:
- cpe:2.3:a:apache:ofbiz:11.04.01:*:*:*:*:*:*:*:
- cpe:2.3:a:apache:ofbiz:11.04.02:*:*:*:*:*:*:*:
- cpe:2.3:a:apache:ofbiz:11.04.03:*:*:*:*:*:*:*:
- cpe:2.3:a:apache:ofbiz:11.04.04:*:*:*:*:*:*:*:
- cpe:2.3:a:apache:ofbiz:11.04.05:*:*:*:*:*:*:*:
- cpe:2.3:a:apache:ofbiz:11.04.06:*:*:*:*:*:*:*:
- cpe:2.3:a:apache:ofbiz:12.04:*:*:*:*:*:*:*:
- cpe:2.3:a:apache:ofbiz:12.04.01:*:*:*:*:*:*:*:
- cpe:2.3:a:apache:ofbiz:12.04.02:*:*:*:*:*:*:*:
- cpe:2.3:a:apache:ofbiz:12.04.03:*:*:*:*:*:*:*:
- cpe:2.3:a:apache:ofbiz:12.04.04:*:*:*:*:*:*:*:
- cpe:2.3:a:apache:ofbiz:12.04.05:*:*:*:*:*:*:*:
- cpe:2.3:a:apache:ofbiz:12.04.06:*:*:*:*:*:*:*:
- cpe:2.3:a:apache:ofbiz:13.07:*:*:*:*:*:*:*:
- cpe:2.3:a:apache:ofbiz:13.07.01:*:*:*:*:*:*:*:
- cpe:2.3:a:apache:ofbiz:13.07.02:*:*:*:*:*:*:*:
- cpe:2.3:a:apache:ofbiz:13.07.03:*:*:*:*:*:*:*:
No vendor comments have been submitted for this CVE