Experts warn of an authentication bypass zero-day flaw that affects Apache OfBiz, an open-source Enterprise Resource Planning (ERP) system.
An attacker can trigger the vulnerability, tracked as , to bypass authentication to achieve a simple Server-Side Request Forgery (SSRF)
The issue resides in the login functionality and results from an incomplete patch for the Pre-auth RCE vulnerability (CVSS score: 9.8).
SonicWall researchers pointed out that the Apache OfBiz is part of the supply chain of prominent software, such as Atlassian’s JIRA (used by over ).
“As a result, like with many supply chain libraries, the impact of this vulnerability could be severe if leveraged by threat actors.” reads the published by SonicWall. “Our research demonstrates that this flaw could lead to the exposure of sensitive information or even the ability to execute arbitrary code as demonstrated in the short video below using version 18.12.10, where the system “ping” application is executed by an unauthenticated attacker.”
The SonicWall researchers discovered that the magic string requirePasswordChange=Y is the root cause of the authentication bypass regardless of the username and password field or other parameters in an HTTP request.
For this reason, removing the XML RPC code did not completely patch the flaw.
The vulnerability has been addressed by the Apache OFbiz with the release of or later (commit and ).
Follow me on Twitter: and and Mastodon
(SecurityAffairs – hacking, Apache OFbiz)