Apache OFBiz Critical Remote Code Execution Vulnerability CVE-2024-45195 Fixed

Published:

Apache OFBiz Critical RCE Vulnerability (CVE-2024-45195) Patched

Popular open-source enterprise Resource Planning (ERP) system, Apache OFBiz, recently made headlines for harboring a critical Remote Code Execution (RCE) vulnerability. Tracked as CVE-2024-45195, this vulnerability posed a significant threat to Linux and Windows servers running OFBiz, allowing attackers to execute arbitrary code. Fortunately, the Apache security team swiftly addressed the issue in the latest update, urging users to patch their installations immediately.

The vulnerability, discovered by Rapid7 security researchers, was attributed to missing authorization checks within the OFBizEweb application. This flaw, categorized as a forced browsing vulnerability, exposed restricted paths to unauthenticated direct request attacks. According to security researcher Ryan Emmons, exploiting this vulnerability could enable attackers to execute malicious code on the server, potentially leading to complete system compromise.

The potential consequences of exploiting CVE-2024-45195 are severe for organizations relying on OFBiz. These risks include data theft and leakage, disruption of operations, and the possibility of lateral movement and persistence within the network. The Apache Software Foundation (ASF) released a patch (version 18.12.16) to address this vulnerability, strengthening authorization checks within the OFBiz application.

Emmons highlighted that the CVE-2024-45195 patch also addressed three other OFBiz vulnerabilities, emphasizing the critical importance of timely patching and proactive security measures in open-source software. The discovery of these vulnerabilities underscores the need for continuous monitoring and vigilance in the face of evolving cyber threats. By implementing a comprehensive security strategy, organizations using OFBiz can minimize their attack surface and safeguard their critical data.

Related articles

Recent articles