vendor:
Apache OfBiz
by:
Álvaro Muñoz, Adrián Díaz (s4dbrd)
6,1
CVSS
MEDIUM
Remote Command Execution (RCE)
502
CWE
Product Name: Apache OfBiz
Affected Version From: 17.12.01
Affected Version To: 17.12.01
Patch Exists: YES
Related CWE: CVE-2020-9496
CPE: a:apache:ofbiz
Metasploit:
N/A
Other Scripts:
https://www.infosecmatter.com/metasploit-module-library/?mm=exploit/linux/http/apache_ofbiz_deserialization, https://www.infosecmatter.com/nessus-plugin-library/?id=148239, https://www.infosecmatter.com/nessus-plugin-library/?id=133758, https://www.infosecmatter.com/list-of-metasploit-linux-exploits-detailed-spreadsheet/, https://www.infosecmatter.com/nessus-plugin-library/?id=87239, https://www.infosecmatter.com/bug-bounty-tips-10-dec-24/, https://www.infosecmatter.com/metasploit-module-library/?mm=exploit/windows/local/bypassuac_fodhelper
Tags: ofbiz,packetstorm,cve,cve2020,apache,java
CVSS Metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Nuclei References:
http://packetstormsecurity.com/files/158887/Apache-OFBiz-XML-RPC-Java-Deserialization.html, http://packetstormsecurity.com/files/161769/Apache-OFBiz-XML-RPC-Java-Deserialization.html, https://securitylab.github.com/advisories/GHSL-2020-069-apache_ofbiz, https://s.apache.org/l0994, https://nvd.nist.gov/vuln/detail/CVE-2020-9496
Nuclei Metadata: {'max-request': 1, 'vendor': 'apache', 'product': 'ofbiz'}
Platforms Tested: Linux
2021
ApacheOfBiz 17.12.01 – Remote Command Execution (RCE) via Unsafe Deserialization of XMLRPC arguments
Apache OFBiz 17.12.03 contains cross-site scripting and unsafe deserialization vulnerabilities via an XML-RPC request.
Mitigation:
Authentication should be used for XMLRPC requests.