Apache OFBiz FlexibleStringExpander Remote Code Execution

critical Nessus Plugin ID 59247

Synopsis

The remote web application has a code execution vulnerability.

Description

The version of Apache OFBiz hosted on the remote host has an arbitrary code execution vulnerability. Specially crafted input passed to the getInstance() method of the FlexibleStringExpander class can result in the evaluation of nested Java Unified Expression Language expressions. A remote, unauthenticated attacker could exploit this to execute arbitrary code.

Solution

Upgrade to Apache OFBiz 10.04.02 or later.

See Also

http://svn.apache.org/viewvc?view=revision&revision=1309879

http://www.nessus.org/u?f40a2756

Plugin Details

Severity: Critical

ID: 59247

File Name: ofbiz_nested_script_rce.nasl

Version: 1.17

Type: remote

Family: CGI abuses

Published: 5/23/2012

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.2

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2012-1622

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: cpe:/a:apache:open_for_business_project

Required KB Items: www/ofbiz/port

Exploit Ease: No exploit is required

Patch Publication Date: 4/15/2012

Vulnerability Publication Date: 4/5/2012

Exploitable With

Elliot (Apache OFBiz 10.04.01 RCE (Linux))

Reference Information

CVE: CVE-2012-1622

BID: 53025