cve/2022/CVE-2022-25813.md

19 lines
962 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2022-25813](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25813)
![](https://img.shields.io/static/v1?label=Product&message=Apache%20OFBiz&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=Apache%20OFBiz%3C%3D%2018.12.05%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-1336%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine&color=brighgreen)
### Description
In Apache OFBiz, versions 18.12.05 and earlier, an attacker acting as an anonymous user of the ecommerce plugin, can insert a malicious content in a message “Subject” field from the "Contact us" page. Then a party manager needs to list the communications in the party component to activate the SSTI. A RCE is then possible.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/karimhabush/cyberowl
- https://github.com/mbadanoiu/CVE-2022-25813