Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <48b22647-65c0-2c49-dd78-e5cef87eafe6@apache.org>
Date: Tue, 03 Sep 2024 17:05:47 +0000
From: Jacques Le Roux <jleroux@...che.org>
To: oss-security@...ts.openwall.com
Subject: CVE-2024-45507: Apache OFBiz: Prevent use of URLs in files when
 loading them from Java or Groovy, leading to a RCE 

Severity: important

Affected versions:

- Apache OFBiz before 18.12.16

Description:

Server-Side Request Forgery (SSRF), Improper Control of Generation of Code ('Code Injection') vulnerability in Apache OFBiz.

This issue affects Apache OFBiz: before 18.12.16.

Users are recommended to upgrade to version 18.12.16, which fixes the issue.

Credit:

孙相 (Sun Xiang) (finder)

References:

https://ofbiz.apache.org/download.html
https://ofbiz.apache.org/security.html
https://issues.apache.org/jira/browse/OFBIZ-13132
https://ofbiz.apache.org/
https://www.cve.org/CVERecord?id=CVE-2024-45507

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.