Apache OFBiz has recently released a critical update addressing a high-severity vulnerability, tracked as CVE-2024-45195, which could enable unauthenticated remote code execution on both Linux and Windows systems. This flaw, present in all versions before 18.12.16, arises from missing view authorization checks in the web application. As a result, attackers can exploit the vulnerability to execute arbitrary code on the server without needing valid credentials. This issue highlights a significant security gap in the system that required immediate remediation.
The update also tackles several earlier vulnerabilities, including CVE-2024-32113, CVE-2024-36104, and CVE-2024-38856, which had not been fully addressed in previous patches. CVE-2024-32113, in particular, was actively exploited in the wild, with attackers using it to deploy the Mirai botnet malware. The root cause of these issues was related to the desynchronization of the controller and view map state, a problem that persisted despite earlier fixes. The new patch effectively mitigates this by ensuring that view authorization checks are properly validated for anonymous access.
In addition to resolving the remote code execution (RCE) vulnerability, the update also addresses a critical server-side request forgery (SSRF) vulnerability, tracked as CVE-2024-45507, which has a CVSS score of 9.8. This flaw could allow unauthorized access to systems through specially crafted URLs. By fixing this vulnerability, the update helps prevent potential system compromises that could arise from SSRF attacks, further enhancing the security of the Apache OFBiz platform.
Organizations using Apache OFBiz are urged to apply the latest update promptly to protect against these vulnerabilities. The comprehensive patch not only fixes the high-severity RCE and SSRF flaws but also reinforces the overall security of the ERP system. Keeping software up to date is crucial in defending against emerging threats and ensuring the continued integrity and safety of enterprise systems.
Reference: