Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <b68dafaf-8650-5424-3e67-aaad8f5ceb7f@apache.org>
Date: Sat, 16 Nov 2024 07:54:58 +0000
From: Jacques Le Roux <jleroux@...che.org>
To: oss-security@...ts.openwall.com
Subject: CVE-2024-47208: Apache OFBiz: URLs allowing remote use of Groovy
 expressions, leading to RCE 

Severity: important

Affected versions:

- Apache OFBiz before 18.12.17

Description:

Server-Side Request Forgery (SSRF), Improper Control of Generation of Code ('Code Injection') vulnerability in Apache OFBiz.

This issue affects Apache OFBiz: before 18.12.17.

Users are recommended to upgrade to version 18.12.17, which fixes the issue.

Credit:

孙相 (Sun Xiang) (finder)

References:

https://ofbiz.apache.org/download.html
https://ofbiz.apache.org/security.html
https://issues.apache.org/jira/browse/OFBIZ-13158
https://ofbiz.apache.org/
https://www.cve.org/CVERecord?id=CVE-2024-47208

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.