Vulnerability Description
In Apache OFBiz, versions 18.12.05 and earlier, an attacker acting as an anonymous user of the ecommerce plugin, can insert a malicious content in a message “Subject” field from the "Contact us" page. Then a party manager needs to list the communications in the party component to activate the SSTI. A RCE is then possible.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apache | Ofbiz | < 18.12.06 |
Related Weaknesses (CWE)
References
- http://www.openwall.com/lists/oss-security/2022/09/02/4Mailing ListPatchThird Party Advisory
- https://lists.apache.org/thread/vmj5s0qb59t0lvzf3vol3z1sc3sgyb2bMailing ListPatchVendor Advisory
- http://www.openwall.com/lists/oss-security/2022/09/02/4Mailing ListPatchThird Party Advisory
- https://lists.apache.org/thread/vmj5s0qb59t0lvzf3vol3z1sc3sgyb2bMailing ListPatchVendor Advisory
FAQ
What is CVE-2022-25813?
CVE-2022-25813 is a vulnerability with a CVSS score of 7.5 (HIGH). In Apache OFBiz, versions 18.12.05 and earlier, an attacker acting as an anonymous user of the ecommerce plugin, can insert a malicious content in a message “Subject” field from the "Contact us" page....
How severe is CVE-2022-25813?
CVE-2022-25813 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-25813?
Check the references section above for vendor advisories and patch information. Affected products include: Apache Ofbiz.