Multiple cross-site scripting (XSS) vulnerabilities in Apache Open For Business Project (aka OFBiz) 10.04.x before 10.04.02 allow remote attackers to inject arbitrary web script or HTML via (1) a parameter array in freemarker templates, the (2) contentId or (3) mapKey parameter in a cms event request, which are not properly handled in an error message, or unspecified input in (4) an ajax request to the getServerError function in checkoutProcess.js or (5) a Webslinger component request. NOTE: some of these details are obtained from third party information.
mail-archives.apache.org/mod_mbox/ofbiz-dev/201204.mbox/%3CA126EDA0-06A5-4B67-8CDD-FC5F5AABA147%40apache.org%3E
mail-archives.apache.org/mod_mbox/www-announce/201204.mbox/%3C2B984C00-EC65-4455-98D3-55735ABE8AF9%40apache.org%3E
ofbiz.apache.org/download.html#vulnerabilities
osvdb.org/show/osvdb/81346
osvdb.org/show/osvdb/81347
osvdb.org/show/osvdb/81348
osvdb.org/show/osvdb/81349
seclists.org/bugtraq/2012/Apr/101
seclists.org/fulldisclosure/2012/Apr/172
secunia.com/advisories/48800
www.securityfocus.com/bid/53023
www.securitytracker.com/id?1026927
exchange.xforce.ibmcloud.com/vulnerabilities/74870