Friday, November 22, 2024

New PoC Exploit for Apache OfBiz Vulnerability Poses Threat to ERP Techniques

Jan 11, 2024NewsroomVulnerability / Cyber Assault

Apache OfBiz Vulnerability

Cybersecurity researchers have developed a proof-of-concept (PoC) code that exploits a lately disclosed crucial flaw within the Apache OfBiz open-source Enterprise Useful resource Planning (ERP) system to execute a memory-resident payload.

The vulnerability in query is CVE-2023-51467 (CVSS rating: 9.8), a bypass for one more extreme shortcoming in the identical software program (CVE-2023-49070, CVSS rating: 9.8) that may very well be weaponized to bypass authentication and remotely execute arbitrary code.

Whereas it was fastened in Apache OFbiz model 18.12.11 launched final month, risk actors have been noticed making an attempt to use the flaw, focusing on susceptible situations.

The newest findings from VulnCheck present that CVE-2023-51467 will be exploited to execute a payload straight from reminiscence, leaving little to no traces of malicious exercise.

Cybersecurity

Safety flaws disclosed in Apache OFBiz (e.g., CVE-2020-9496) have been exploited by risk actors prior to now, together with by risk actors related to the Sysrv botnet. One other three-year-old bug within the software program (CVE-2021-29200) has witnessed exploitation makes an attempt from 29 distinctive IP addresses over the previous 30 days, per knowledge from GreyNoise.

What’s extra, Apache OFBiz was additionally one of many first merchandise to have a public exploit for Log4Shell (CVE-2021-44228), illustrating that it continues to be of curiosity to each defenders and attackers alike.

Apache OfBiz Vulnerability

CVE-2023-51467 isn’t any exception, with particulars a few distant code execution endpoint (“/webtools/management/ProgramExport”) in addition to PoC for command execution rising merely days after public disclosure.

Whereas safety guardrails (i.e., Groovy sandbox) have been erected such that they block any makes an attempt to add arbitrary net shells or run Java code through the endpoint, the unfinished nature of the sandbox signifies that an attacker might run curl instructions and acquire a bash reverse shell on Linux programs.

Cybersecurity

“For a complicated attacker, although, these payloads aren’t best,” VulnCheck’s Chief Know-how Officer Jacob Baines stated. “They contact the disk and depend on Linux-specific conduct.”

The Go-based exploit devised by VulnCheck is a cross-platform answer that works on each Home windows and Linux in addition to will get across the denylist by making the most of groovy.util.Eval capabilities to launch an in-memory Nashorn reverse shell because the payload.

“OFBiz isn’t broadly well-liked, but it surely has been exploited prior to now. There’s a honest deal of hype round CVE-2023-51467 however no public weaponized payload, which referred to as into query if it was even potential,” Baines stated. “We have concluded that not solely is it potential, however we are able to obtain arbitrary in reminiscence code execution.”

Discovered this text fascinating? Observe us on Twitter and LinkedIn to learn extra unique content material we publish.



Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles