Remote Code Execution Vulnerability in Apache Struts

CVE-2023-51467
9.8CRITICAL

Key Information

Vendor
Apache
Status
Apache Ofbiz
Vendor
CVE Published:
26 December 2023

Badges

😄 Trended👾 Exploit Exists🔴 Public PoC🟡 EPSS 65%📰 News Worthy

Summary

The vulnerability CVE-2023-51467 allows attackers to bypass authentication processes in the Apache OFBiz open source enterprise resource planning (ERP) system, enabling them to remotely execute arbitrary code, and potentially gain server-side request forgery (SSRF) access in the backend interface. This vulnerability was discovered by SonicWall during a root cause analysis of another OFBiz bug, CVE-2023-49070. Exploits for this vulnerability have been used to execute arbitrary code on impacted hosts, and attempts have been made to exploit it in the wild. To mitigate the risk, Apache OFBiz developers have released version 18.12.11 to patch the vulnerability and urged users to update. The security firm SonicWall also disclosed technical details of the vulnerability, and indicators of in-the-wild exploitation have been reported. The vulnerability impacts Apache OFBiz versions 18.12.10 and earlier, and a security announcement was made to recommend upgrading to the unaffected version, Apache OFBiz 18.12.11, or applying protective measures to restrict access to the affected system. It has also been reported that other critical vulnerabilities in Apache software have been targeted by threat actors, indicating a broader trend of exploitation of Apache software vulnerabilities in recent times.

Affected Version(s)

Apache OFBiz < 18.12.11

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

News Articles

EPSS Score

65% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • 👾

    Exploit exists.

  • Vulnerability started trending.

  • First article discovered by Security Boulevard

  • Vulnerability published.

  • Vulnerability Reserved.

Collectors

NVD DatabaseMitre Database6 Proof of Concept(s)6 News Article(s)

Credit

Hasib Vhora, Senior Threat Researcher, SonicWall
Gao Tian
L0ne1y
.