Apache OFBiz version 18.12.12 and below is vulnerable to directory traversal. An attacker can exploit this vulnerability by sending a crafted XML request to the '/webtools/control/xmlrpc' endpoint, allowing them to access files outside of the web root directory, such as sensitive system files like '/etc/passwd' or executing commands on the server.
Apache OFBiz is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input. An attacker may leverage these issues to execute arbitrary HTML and script code in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials and launch other attacks.
This exploit allows an attacker to execute arbitrary SQL commands on the vulnerable Apache OFBiz application. The exploit is triggered by sending a specially crafted POST request to the EntitySQLProcessor servlet, which contains the malicious SQL command. The malicious command is then executed by the application.
This exploit allows an attacker to bypass authentication and create a user with full administrative privileges in Apache OFBiz. The exploit works by sending a POST request to the /webtools/control/scheduleService endpoint with the externalLoginKey parameter set to the value of the externalLoginKey cookie. The request also includes the username and password of the user to be created, as well as the roleTypeId parameter set to FULLADMIN.
A Cross-Site Request Forgery (CSRF) vulnerability in Apache OFBiz 17.12.03 allows an attacker to take over an account by sending a malicious request to the server. The malicious request is sent via a form with hidden fields containing the user's information. The form is then submitted using a script. After that, the attacker can do a password reset via the forget password feature.
Apache OFBiz is vulnerable to XML External Entity Injection (XXE) in versions prior to 16.11.04. An attacker can use this vulnerability to disclose files from the server.