12.9 C
New York
Thursday, November 21, 2024

Apache OFBiz RCE flaw exploited to search out weak Confluence servers


A essential Apache OFBiz pre-authentication distant code execution vulnerability is being actively exploited utilizing public proof of idea (PoC) exploits.

Apache OFBiz (Open For Enterprise) is an open-source enterprise useful resource planning system many companies use for e-commerce stock and order administration, human sources operations, and accounting.

OFBiz is a part of Atlassian JIRA, a business challenge administration and issue-tracking software program utilized by over 120,000 firms worldwide. Subsequently, any flaws within the open-source challenge are inherited by Atlassian’s product.

This authentication bypass flaw is tracked as CVE-2023-49070 and was fastened in OFBiz model 18.12.10, launched on December 5, 2023.

The problem probably enabled attackers to raise their privileges with out authentication, carry out arbitrary code execution, and entry delicate info.

Whereas investigating Apache’s repair, which was to take away the XML-RPC code from OFBiz, SonicWall researchers found that the foundation trigger for CVE-2023-49070 was nonetheless current.

This incomplete repair nonetheless allowed attackers to take advantage of the bug in a completely patched model of the software program.

Actively exploited in assaults

In a write-up revealed yesterday, SonicWall researchers display it is doable to bypass Apache’s repair for the CVE-2023-49070 vulnerability when utilizing particular credential mixtures.

“It was found whereas researching the root trigger for the beforehand disclosed CVE-2023-49070,” explains SonicWall’s report.

“The safety measures taken to patch CVE-2023-49070 left the foundation subject intact and due to this fact the authentication bypass was nonetheless current.”

This patch bypass is brought on by flawed logic in dealing with empty or particular parameters like “requirePasswordChange=Y.”

Vulnerable authentication logic function
Weak authentication logic perform (SonicWall)

SonicWall reported their findings to the Apache workforce, who shortly resolved the flaw, which they categorized as a server-side request forgery (SSRF) downside.

The brand new bypass subject was assigned CVE-2023-51467 and was addressed in OFBiz model 18.12.11, launched on December 26, 2023.

Nonetheless, not many have upgraded to this newest launch but, and the abundance of public PoCs exploits for the pre-auth RCE makes the flaw a simple goal for hackers.

Menace monitoring service ‘Shadowserver’ reported right this moment that it has detected fairly just a few scans that leverage public PoCs, trying to take advantage of CVE-2023-49070.

“All through December now we have noticed scans utilizing a PoC that has been revealed for CVE-2023-49070, so anticipate related for CVE-2023-51467,” warned ShadowServer CEO Piotr Kijewski.

tweet

Kijewski instructed BleepingComputer that present exploitation makes an attempt are being performed to search out weak servers by forcing them to hook up with an oast.on-line URL.

The researchers additional stated these scanning weak servers are notably fascinated about discovering weak Confluence servers.

Confluence servers are a preferred goal for menace actors as they generally maintain delicate information that can be utilized to unfold laterally on to additional inner companies or for extortion.

To attenuate the danger, customers of Apache OFBiz are really useful to improve to model 18.12.11 as quickly as doable.



Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles