Multiple cross-site scripting (XSS) vulnerabilities in Apache Open For Business Project (aka OFBiz) 10.04.x before 10.04.02 allow remote attackers to inject arbitrary web script or HTML via (1) a parameter array in freemarker templates, the (2) contentId or (3) mapKey parameter in a cms event request, which are not properly handled in an error message, or unspecified input in (4) an ajax request to the getServerError function in checkoutProcess.js or (5) a Webslinger component request. NOTE: some of these details are obtained from third party information.
mail-archives.apache.org/mod_mbox/ofbiz-dev/201204.mbox/%[email protected]%3E
mail-archives.apache.org/mod_mbox/www-announce/201204.mbox/%[email protected]%3E
ofbiz.apache.org/download.html
osvdb.org/show/osvdb/81346
osvdb.org/show/osvdb/81347
osvdb.org/show/osvdb/81348
osvdb.org/show/osvdb/81349
seclists.org/bugtraq/2012/Apr/101
seclists.org/fulldisclosure/2012/Apr/172
secunia.com/advisories/48800
www.securityfocus.com/bid/53023
www.securitytracker.com/id?1026927
exchange.xforce.ibmcloud.com/vulnerabilities/74870