Pre-Auth RCE Vulnerability in Apache OFBiz (CVE-2024-38856) Is Under Active Exploitation, CISA Warns
The Cybersecurity and Infrastructure Security Agency (CISA) has recently included a vulnerability in Apache OFBiz in its Known Exploited Vulnerabilities (KEV) Catalog, citing ongoing active exploitation.
This flaw, identified as CVE-2024-38856, is classified as critical and enables remote attackers to execute malicious code.
Given that Apache OFBiz is a widely used Enterprise Resource Planning (ERP) solution, the implications of this vulnerability could significantly impact numerous businesses if not addressed promptly.
What is CVE-2024-38856?
CVE-2024-38856, rated with a CVSS score of 8.1, represents a critical pre-authentication vulnerability that allows Remote Code Execution (RCE) within the popular ERP system, Apache OFBiz.
Vulnerability card of CVE-2024-38856 (SOCRadar Vulnerability Intelligence)
The vulnerability arises from incorrect authorization, permitting an unauthenticated attacker to inject a malicious Groovy payload through specific endpoints.
This vulnerability, published on August 5, 2024, also serves as a patch bypass for a previous vulnerability, CVE-2024-36104, which had a higher CVSS score of 9.1. With the risk of exploitation so high, CISA has mandated that all Federal Civilian Executive Branch (FCEB) agencies patch this vulnerability by September 17, 2024.
SOCRadar’s Vulnerability Intelligence module offers a comprehensive solution for monitoring and responding to critical vulnerabilities in real-time. By continuously tracking CVE and exploitation trends, this powerful tool provides organizations with an extensive database and advanced analytics capabilities to stay ahead of emerging threats.
CVE and exploitation trends on SOCRadar’s Vulnerability Intelligence module
Exploitation Mechanism of CVE-2024-38856
The CVE-2024-38856 vulnerability stems from a discrepancy in the way the ControlServlet and RequestHandler functions handle different endpoints. Ideally, these functions should process the same endpoints consistently.
By crafting a raw URL without any path traversal vector, an attacker can gain unauthorized access to the ProgramExport endpoint. This is achieved by combining the ProgramExport endpoint with other endpoints which don’t require authentication, as reported by SonicWall.
Some of the vulnerable URLs identified are as follows:
POST /webtools/control/forgotPassword/ProgramExport
POST /webtools/control/main/ProgramExport
POST /webtools/control/showDateTime/ProgramExport
POST /webtools/control/view/ProgramExport
POST /webtools/control/TestService/ProgramExport
Which OFBiz Versions Are Affected?
All versions of Apache OFBiz up to 18.12.14 are vulnerable to CVE-2024-38856.
Exploit Available for CVE-2024-38856
Proof-of-Concept (PoC) exploit codes and scanners for the CVE-2024-38856 vulnerability are publicly available, increasing the urgency for organizations to act.
These exploits can be quickly weaponized by attackers, potentially leading to widespread malicious activity. Continuous monitoring of CVE and exploitation trends is essential for effective vulnerability management.
An example of an exploit and scanner can be found on GitHub. Additionally, a Shodan search reveals approximately 72,000 exposed Apache OFBiz instances, indicating the potential attack surface.
Shodan search results for exposed Apache OFBiz instances
Patch CVE-2024-38856 Now!
Organizations are strongly advised to upgrade to version 18.12.15 to mitigate this critical security threat. The latest updates and release notes can be found on the Downloads page of the Apache OFBiz website.
For further details and root cause analysis of the vulnerability, refer to the official research blog.
To ensure continuous monitoring and enhance the protection of your digital assets, you can rely on SOCRadar’s Attack Surface Management (ASM) module.
The ASM module offers continuous, in-depth surveillance of your digital environment, enabling the identification and prioritization of security vulnerabilities. It provides detailed, actionable insights through timely alerts, assisting in effectively mitigating risks before they can be exploited.
Monitor the vulnerabilities affecting your assets through SOCRadar’s Attack Surface Management (ASM) module, ensure quick response by your security team
By integrating the capabilities of the Vulnerability Intelligence and ASM modules, your organization can proactively manage and address emerging threats.
1 post – 1 participant
Pre-Auth RCE Vulnerability in Apache OFBiz (CVE-2024-38856) Is Under Active Exploitation, CISA Warns
The Cybersecurity and Infrastructure Security Agency (CISA) has recently included a vulnerability in Apache OFBiz in its Known Exploited Vulnerabilities (KEV) Catalog, citing ongoing active exploitation.
This flaw, identified as CVE-2024-38856, is classified as critical and enables remote attackers to execute malicious code.
Given that Apache OFBiz is a widely used Enterprise Resource Planning (ERP) solution, the implications of this vulnerability could significantly impact numerous businesses if not addressed promptly.
What is CVE-2024-38856?
CVE-2024-38856, rated with a CVSS score of 8.1, represents a critical pre-authentication vulnerability that allows Remote Code Execution (RCE) within the popular ERP system, Apache OFBiz.
Vulnerability card of CVE-2024-38856 (SOCRadar Vulnerability Intelligence)
The vulnerability arises from incorrect authorization, permitting an unauthenticated attacker to inject a malicious Groovy payload through specific endpoints.
This vulnerability, published on August 5, 2024, also serves as a patch bypass for a previous vulnerability, CVE-2024-36104, which had a higher CVSS score of 9.1. With the risk of exploitation so high, CISA has mandated that all Federal Civilian Executive Branch (FCEB) agencies patch this vulnerability by September 17, 2024.
SOCRadar’s Vulnerability Intelligence module offers a comprehensive solution for monitoring and responding to critical vulnerabilities in real-time. By continuously tracking CVE and exploitation trends, this powerful tool provides organizations with an extensive database and advanced analytics capabilities to stay ahead of emerging threats.
CVE and exploitation trends on SOCRadar’s Vulnerability Intelligence module
Exploitation Mechanism of CVE-2024-38856
The CVE-2024-38856 vulnerability stems from a discrepancy in the way the ControlServlet and RequestHandler functions handle different endpoints. Ideally, these functions should process the same endpoints consistently.
By crafting a raw URL without any path traversal vector, an attacker can gain unauthorized access to the ProgramExport endpoint. This is achieved by combining the ProgramExport endpoint with other endpoints which don’t require authentication, as reported by SonicWall.
Some of the vulnerable URLs identified are as follows:
POST /webtools/control/forgotPassword/ProgramExport
POST /webtools/control/main/ProgramExport
POST /webtools/control/showDateTime/ProgramExport
POST /webtools/control/view/ProgramExport
POST /webtools/control/TestService/ProgramExport
Which OFBiz Versions Are Affected?
All versions of Apache OFBiz up to 18.12.14 are vulnerable to CVE-2024-38856.
Exploit Available for CVE-2024-38856
Proof-of-Concept (PoC) exploit codes and scanners for the CVE-2024-38856 vulnerability are publicly available, increasing the urgency for organizations to act.
These exploits can be quickly weaponized by attackers, potentially leading to widespread malicious activity. Continuous monitoring of CVE and exploitation trends is essential for effective vulnerability management.
An example of an exploit and scanner can be found on GitHub. Additionally, a Shodan search reveals approximately 72,000 exposed Apache OFBiz instances, indicating the potential attack surface.
Shodan search results for exposed Apache OFBiz instances
Patch CVE-2024-38856 Now!
Organizations are strongly advised to upgrade to version 18.12.15 to mitigate this critical security threat. The latest updates and release notes can be found on the Downloads page of the Apache OFBiz website.
For further details and root cause analysis of the vulnerability, refer to the official research blog.
To ensure continuous monitoring and enhance the protection of your digital assets, you can rely on SOCRadar’s Attack Surface Management (ASM) module.
The ASM module offers continuous, in-depth surveillance of your digital environment, enabling the identification and prioritization of security vulnerabilities. It provides detailed, actionable insights through timely alerts, assisting in effectively mitigating risks before they can be exploited.
Monitor the vulnerabilities affecting your assets through SOCRadar’s Attack Surface Management (ASM) module, ensure quick response by your security team
By integrating the capabilities of the Vulnerability Intelligence and ASM modules, your organization can proactively manage and address emerging threats.
Article Link: Pre-Auth RCE Vulnerability in Apache OFBiz (CVE-2024-38856) Is Under Active Exploitation, CISA Warns – SOCRadar® Cyber Intelligence Inc.
1 post – 1 participant
Read full topic