Alert! CISA Identifies Crucial Apache OFBiz Vulnerability Amid Ongoing Exploitation Reports

August 28, 2024Ravie LakshmananSoftware Security / Vulnerability

The U.S.

CISA Flags Critical Apache OFBiz Flaw Amid Active Exploitation Reports

August 28, 2024Ravie LakshmananSoftware Security / Vulnerability

CISA Flags Critical Apache OFBiz Flaw Amid Active Exploitation Reports

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued an announcement on Tuesday highlighting a severe security issue affecting the Apache OFBiz open-source enterprise resource planning (ERP) system, adding it to its Known Exploited Vulnerabilities (KEV) database due to confirmed cases of ongoing exploitation.

The identified vulnerability, indexed as CVE-2024-38856, has been assigned a CVSS score of 9.8, indicating a severe level of criticality.

Cybersecurity

“Apache OFBiz includes an incorrect authorization vulnerability, enabling potential remote code execution through a Groovy payload within the OFBiz user process by an unauthorized party,” as stated by CISA.

Further insights into this vulnerability emerged earlier in the month when SonicWall outlined it as a workaround for another vulnerability, CVE-2024-36104, allowing for execution of remote code via custom-crafted requests.

“A defect in the override view functionality exposes crucial endpoints to unauthorized threat actors leveraging a tailored request, paving the way for remote code execution,” detailed SonicWall researcher Hasib Vhora in a statement.

This development follows three weeks after CISA incorporated another Apache OFBiz vulnerability (CVE-2024-32113) into the KEV database, prompted by reports of its application in deploying the Mirai botnet.

While there have been no public disclosures on the exploitation tactics associated with CVE-2024-38856, there are available proof-of-concept (PoC) exploits shared publicly.

Cybersecurity

The occurrence of exploits targeting two Apache OFBiz vulnerabilities emphasizes threat actors’ keen interest and quick response to disclosed vulnerabilities with the intent to exploit vulnerable systems for malicious purposes.

Entities are strongly advised to update to version 18.12.15 as a preventative measure against this threat. Federal Civilian Executive Branch (FCEB) organizations have been directed to implement the necessary updates by September 17, 2024.

Engaged by this article? Stay connected with us on Twitter and LinkedIn for more exclusive content we share.

About Author

Subscribe To InfoSec Today News

You have successfully subscribed to the newsletter

There was an error while trying to send your request. Please try again.

World Wide Crypto will use the information you provide on this form to be in touch with you and to provide updates and marketing.