Uploaded image for project: 'OFBiz'
  1. OFBiz
  2. OFBIZ-1525 Issue to group security concerns
  3. OFBIZ-12332

post-auth Remote Code Execution Vulnerability

Attach filesAttach ScreenshotVotersWatch issueWatchersLinkCloneUpdate Comment AuthorReplace String in CommentUpdate Comment VisibilityDelete Comments
    XMLWordPrintableJSON

Details

    • Bug Crush Event - 21/2/2015

    Description

      I found that the latest version of the OFBiz framework was affected by an XMLRPC Remote Code Execution Vulnerability.

      This vulnerability is caused by incomplete patch repair of cve-2020-9496.

      Successful exploit:

      Please refer to the attachment for payload details.This HTTP request will execute the command  `touch /tmp/success` file on the attacked server.

       

      Attachments

        1. payload.txt
          4 kB
          Jie Zhu
        2. payload_windows.txt
          4 kB
          Jie Zhu
        3. payload_20211008.txt
          5 kB
          Jie Zhu
        4. LocallyAdaptedPayload.txt
          4 kB
          Jacques Le Roux
        5. image-2021-10-03-11-43-31-228.png
          7 kB
          Jie Zhu
        6. image-2021-10-03-11-43-20-021.png
          292 kB
          Jie Zhu

        Issue Links

        Activity

          This comment will be Viewable by All Users Viewable by All Users
          Cancel

          People

            jleroux Jacques Le Roux
            zhujie Jie Zhu
            Votes:
            0 Vote for this issue
            Watchers:
            3 Start watching this issue

            Dates

              Created:
              Updated:
              Resolved:

              Agile

                Completed Sprint:
                Bug Crush Event - 21/2/2015 ended 26/Feb/15
                View on Board

                Slack

                  Issue deployment