Apache Open For Business Project (aka OFBiz) 10.04.01 through 10.04.05, 11.04.01 through 11.04.02, and 12.04.01 allows remote attackers to execute arbitrary Unified Expression Language (UEL) functions via JUEL metacharacters in unspecified parameters, related to nested expressions.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/61369 | vdb entry third party advisory |
http://ofbiz.apache.org/download.html#vulnerabilities | patch vendor advisory |
http://secunia.com/advisories/53910 | third party advisory |
http://osvdb.org/95522 | vdb entry broken link |
https://exchange.xforce.ibmcloud.com/vulnerabilities/85875 | vdb entry third party advisory |
http://archives.neohapsis.com/archives/bugtraq/2013-07/0143.html | mailing list broken link |