banner

The Apache Software program Basis on Friday addressed a excessive severity vulnerability in Apache OFBiz that would have allowed an unauthenticated adversary to remotely seize management of the open-source enterprise useful resource planning (ERP) system.

Tracked as CVE-2021-26295, the flaw impacts all variations of the software program previous to 17.12.06 and employs an “unsafe deserialization” as an assault vector to allow unauthorized distant attackers to execute arbitrary code on a server instantly.

OFBiz is a Java-based net framework for automating enterprise processes and provides a variety of performance, together with accounting, buyer relationship administration, manufacturing operations administration, order administration, provide chain achievement, and warehouse administration system, amongst others.

Particularly, by exploiting this flaw, a malicious celebration can tamper with serialized information to insert arbitrary code that, when deserialized, can probably lead to distant code execution.

“An unauthenticated attacker can use this vulnerability to efficiently take over Apache OFBiz,” OFBiz developer Jacques Le Roux noted.

Unsafe deserialization has been a source of data integrity and different safety points, with the Open Net Utility Safety Undertaking (OWASP) noting that “information which is untrusted can’t be trusted to be effectively shaped, [and that] malformed information or sudden information could possibly be used to abuse software logic, deny service, or execute arbitrary code, when deserialized.”

r00t4dm at Cloud-Penetrating Arrow Lab, MagicZero from SGLAB of Legendsec at Qi’anxin Group, and Longofo at Knownsec 404 Workforce have been credited with reporting the vulnerability.

It is really helpful to improve Apache OFBiz to the latest version (17.12.06) to mitigate the danger related to the flaw.

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.