14.2 C
New York
Sunday, September 8, 2024

Apache OFBiz Replace Fixes Excessive-Severity Flaw Resulting in Distant Code Execution


Sep 06, 2024Ravie LakshmananCybersecurity / Vulnerability

Apache OFBiz Replace Fixes Excessive-Severity Flaw Resulting in Distant Code Execution

A brand new safety flaw has been addressed within the Apache OFBiz open-source enterprise useful resource planning (ERP) system that, if efficiently exploited, might result in unauthenticated distant code execution on Linux and Home windows.

The high-severity vulnerability, tracked as CVE-2024-45195 (CVSS rating: 7.5), impacts all variations of the software program earlier than 18.12.16.

Cybersecurity

“An attacker with no legitimate credentials exploit lacking view authorization checks within the net software to execute arbitrary code on the server,” Rapid7 safety researcher Ryan Emmons stated in a brand new report.

It is value noting that CVE-2024-45195 is a bypass for a sequence of points, CVE-2024-32113, CVE-2024-36104, and CVE-2024-38856, which had been addressed by the challenge maintainers over the previous few months.

Each CVE-2024-32113 and CVE-2024-38856 have since come beneath lively exploitation within the wild, with the previous leveraged to deploy the Mirai botnet malware.

Rapid7 stated all three older shortcomings stem from the “capability to desynchronize the controller and consider map state,” an issue that was by no means absolutely remediated in any of the patches.

A consequence of the vulnerability is that it might be abused by attackers to execute code or SQL queries and obtain distant code execution sans authentication.

The newest patch put in place “validates {that a} view ought to allow nameless entry if a consumer is unauthenticated, slightly than performing authorization checks purely primarily based on the goal controller.”

Cybersecurity

Apache OFBiz model 18.12.16 additionally addresses a crucial server-side request forgery (SSRF) vulnerability (CVE-2024-45507, CVSS rating: 9.8) that might result in unauthorized entry and system compromise by making the most of a specifically crafted URL.

Discovered this text fascinating? Comply with us on Twitter and LinkedIn to learn extra unique content material we submit.



Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles