CVE-2010-0432

N/A Unknown
Published: April 15, 2010 Modified: April 29, 2026
View on NVD

Description

Multiple cross-site scripting (XSS) vulnerabilities in the Apache Open For Business Project (aka OFBiz) 09.04 and earlier, as used in Opentaps, Neogia, and Entente Oya, allow remote attackers to inject arbitrary web script or HTML via (1) the productStoreId parameter to control/exportProductListing, (2) the partyId parameter to partymgr/control/viewprofile (aka partymgr/control/login), (3) the start parameter to myportal/control/showPortalPage, (4) an invalid URI beginning with /facility/control/ReceiveReturn (aka /crmsfa/control/ReceiveReturn or /cms/control/ReceiveReturn), (5) the contentId parameter (aka the entityName variable) to ecommerce/control/ViewBlogArticle, (6) the entityName parameter to webtools/control/FindGeneric, or the (7) subject or (8) content parameter to an unspecified component under ecommerce/control/contactus.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://svn.apache.org/viewvc?view=revision&revision=920369
Source: secalert@redhat.com
Vendor Advisory
http://svn.apache.org/viewvc?view=revision&revision=920370
Source: secalert@redhat.com
Vendor Advisory
http://svn.apache.org/viewvc?view=revision&revision=920371
Source: secalert@redhat.com
Vendor Advisory
http://svn.apache.org/viewvc?view=revision&revision=920372
Source: secalert@redhat.com
Vendor Advisory
http://svn.apache.org/viewvc?view=revision&revision=920379
Source: secalert@redhat.com
Vendor Advisory
http://svn.apache.org/viewvc?view=revision&revision=920380
Source: secalert@redhat.com
Vendor Advisory
http://svn.apache.org/viewvc?view=revision&revision=920381
Source: secalert@redhat.com
Vendor Advisory
http://svn.apache.org/viewvc?view=revision&revision=920382
Source: secalert@redhat.com
Vendor Advisory
http://www.securityfocus.com/bid/39489
Source: secalert@redhat.com
Exploit Third Party Advisory
http://svn.apache.org/viewvc?view=revision&revision=920369
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://svn.apache.org/viewvc?view=revision&revision=920370
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://svn.apache.org/viewvc?view=revision&revision=920371
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://svn.apache.org/viewvc?view=revision&revision=920372
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://svn.apache.org/viewvc?view=revision&revision=920379
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://svn.apache.org/viewvc?view=revision&revision=920380
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://svn.apache.org/viewvc?view=revision&revision=920381
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://svn.apache.org/viewvc?view=revision&revision=920382
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.bonsai-sec.com/en/research/vulnerabilities/apacheofbiz-multiple-xss-0103.php
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Third Party Advisory
http://www.securityfocus.com/bid/39489
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Third Party Advisory

20 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
45.9%
98th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

apache