Friday, December 29, 2023
HomeCyber SecurityApache OFBiz RCE flaw exploited to seek out weak Confluence servers

Apache OFBiz RCE flaw exploited to seek out weak Confluence servers


A crucial Apache OFBiz pre-authentication distant code execution vulnerability is being actively exploited utilizing public proof of idea (PoC) exploits.

Apache OFBiz (Open For Enterprise) is an open-source enterprise useful resource planning system many companies use for e-commerce stock and order administration, human sources operations, and accounting.

OFBiz is a part of Atlassian JIRA, a business challenge administration and issue-tracking software program utilized by over 120,000 corporations worldwide. Subsequently, any flaws within the open-source challenge are inherited by Atlassian’s product.

This authentication bypass flaw is tracked as CVE-2023-49070 and was fastened in OFBiz model 18.12.10, launched on December 5, 2023.

The difficulty doubtlessly enabled attackers to raise their privileges with out authentication, carry out arbitrary code execution, and entry delicate info.

Whereas investigating Apache’s repair, which was to take away the XML-RPC code from OFBiz, SonicWall researchers found that the foundation trigger for CVE-2023-49070 was nonetheless current.

This incomplete repair nonetheless allowed attackers to use the bug in a totally patched model of the software program.

Actively exploited in assaults

In a write-up printed yesterday, SonicWall researchers display it is attainable to bypass Apache’s repair for the CVE-2023-49070 vulnerability when utilizing particular credential combos.

“It was found whereas researching the root trigger for the beforehand disclosed CVE-2023-49070,” explains SonicWall’s report.

“The safety measures taken to patch CVE-2023-49070 left the foundation subject intact and subsequently the authentication bypass was nonetheless current.”

This patch bypass is attributable to flawed logic in dealing with empty or particular parameters like “requirePasswordChange=Y.”

Vulnerable authentication logic function
Weak authentication logic operate (SonicWall)

SonicWall reported their findings to the Apache staff, who rapidly resolved the flaw, which they categorized as a server-side request forgery (SSRF) drawback.

The brand new bypass subject was assigned CVE-2023-51467 and was addressed in OFBiz model 18.12.11, launched on December 26, 2023.

Nonetheless, not many have upgraded to this newest launch but, and the abundance of public PoCs exploits for the pre-auth RCE makes the flaw a straightforward goal for hackers.

Risk monitoring service ‘Shadowserver’ reported right this moment that it has detected fairly a number of scans that leverage public PoCs, trying to use CVE-2023-49070.

“All through December we’ve got noticed scans utilizing a PoC that has been printed for CVE-2023-49070, so anticipate comparable for CVE-2023-51467,” warned ShadowServer CEO Piotr Kijewski.

tweet

Kijewski informed BleepingComputer that present exploitation makes an attempt are being carried out to seek out weak servers by forcing them to hook up with an oast.on-line URL.

The researchers additional mentioned these scanning weak servers are significantly fascinated by discovering weak Confluence servers.

Confluence servers are a well-liked goal for menace actors as they generally maintain delicate information that can be utilized to unfold laterally on to additional inside companies or for extortion.

To reduce the danger, customers of Apache OFBiz are advisable to improve to model 18.12.11 as quickly as attainable.





Supply hyperlink

RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -
Google search engine

Most Popular

Recent Comments