Apache OFBiz Cross-Site Scripting and Code Execution Vulnerabilities
Description
Multiple vulnerabilities have been reported in Apache OFBiz, which can be exploited by malicious people to conduct cross-site scripting attacks and compromise a vulnerable system.
1) Certain unspecified input is not properly sanitised within the "getServerError()" function in checkoutProcess.js before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.
2) Certain input passed as parameter arrays is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.
3) Certain input related to content IDs and map-keys is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.
4) Certain unspecified input passed to the Webslinger component is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.
5) An error in the FlexibleStringExpander class when handling strings with nested scripts can be exploited to execute arbitrary code.
The vulnerabilities are reported in version 10.04.01. Prior versions may also be affected.