CVE-2021-29200
📋 TL;DR
CVE-2021-29200 is an unsafe deserialization vulnerability in Apache OFBiz that allows unauthenticated remote code execution. Attackers can exploit this to execute arbitrary code on affected systems. All Apache OFBiz installations prior to version 17.12.07 are vulnerable.
💻 Affected Systems
- Apache OFBiz
📦 What is this software?
Ofbiz by Apache
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise allowing attackers to execute arbitrary commands, steal data, install malware, or pivot to other systems.
Likely Case
Remote code execution leading to data theft, service disruption, or deployment of ransomware/cryptominers.
If Mitigated
Limited impact if proper network segmentation and access controls prevent exploitation attempts.
🎯 Exploit Status
Exploit code is publicly available and requires minimal technical skill to execute.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 17.12.07 and later
Vendor Advisory: https://lists.apache.org/thread.html/rbe8439b26a71fc3b429aa793c65dcc4a6e349bc7bb5010746a74fa1d%40%3Ccommits.ofbiz.apache.org%3E
Restart Required: Yes
Instructions:
1. Backup your OFBiz installation and database. 2. Download OFBiz 17.12.07 or later from Apache website. 3. Replace vulnerable files with patched version. 4. Restart OFBiz service. 5. Verify functionality.
🔧 Temporary Workarounds
Network Access Restriction
allRestrict network access to OFBiz instances using firewalls or security groups
Web Application Firewall
allDeploy WAF with rules to block deserialization attacks
🧯 If You Can't Patch
- Isolate vulnerable systems in separate network segments with strict access controls
- Implement application-level monitoring and alerting for suspicious deserialization attempts
🔍 How to Verify
Check if Vulnerable:
Check OFBiz version in admin interface or examine version files in installation directory
Check Version:
Check ${OFBIZ_HOME}/framework/base/config/ofbiz-containers.xml or admin interface
Verify Fix Applied:
Confirm version is 17.12.07 or higher and test deserialization functionality
📡 Detection & Monitoring
Log Indicators:
- Unusual Java deserialization errors
- Unexpected process execution
- Abnormal network connections from OFBiz process
Network Indicators:
- HTTP requests with serialized Java objects in parameters
- Outbound connections to suspicious IPs from OFBiz server
SIEM Query:
source="ofbiz.log" AND ("deserialization" OR "java.io.ObjectInputStream" OR suspicious command execution patterns)
🔗 References
- http://www.openwall.com/lists/oss-security/2021/04/27/4
- https://lists.apache.org/thread.html/r108a964764b8bd21ebd32ccd4f51c183ee80a251c105b849154a8e9d%40%3Ccommits.ofbiz.apache.org%3E
- https://lists.apache.org/thread.html/r708351f1a8af7adb887cc3d8a92bed8fcbff4a9e495e69a9ee546fda%40%3Cnotifications.ofbiz.apache.org%3E
- https://lists.apache.org/thread.html/rbe8439b26a71fc3b429aa793c65dcc4a6e349bc7bb5010746a74fa1d%40%3Ccommits.ofbiz.apache.org%3E
- https://lists.apache.org/thread.html/re21d25d9fb89e36cea910633779c23f144b9b60596b113b7bf1e8097%40%3Cannounce.apache.org%3E
- https://lists.apache.org/thread.html/re21d25d9fb89e36cea910633779c23f144b9b60596b113b7bf1e8097%40%3Cdev.ofbiz.apache.org%3E
- https://lists.apache.org/thread.html/re21d25d9fb89e36cea910633779c23f144b9b60596b113b7bf1e8097%40%3Cdev.ofbiz.apache.org%3E
- https://lists.apache.org/thread.html/re21d25d9fb89e36cea910633779c23f144b9b60596b113b7bf1e8097%40%3Cuser.ofbiz.apache.org%3E
- http://www.openwall.com/lists/oss-security/2021/04/27/4
- https://lists.apache.org/thread.html/r108a964764b8bd21ebd32ccd4f51c183ee80a251c105b849154a8e9d%40%3Ccommits.ofbiz.apache.org%3E
- https://lists.apache.org/thread.html/r708351f1a8af7adb887cc3d8a92bed8fcbff4a9e495e69a9ee546fda%40%3Cnotifications.ofbiz.apache.org%3E
- https://lists.apache.org/thread.html/rbe8439b26a71fc3b429aa793c65dcc4a6e349bc7bb5010746a74fa1d%40%3Ccommits.ofbiz.apache.org%3E
- https://lists.apache.org/thread.html/re21d25d9fb89e36cea910633779c23f144b9b60596b113b7bf1e8097%40%3Cannounce.apache.org%3E
- https://lists.apache.org/thread.html/re21d25d9fb89e36cea910633779c23f144b9b60596b113b7bf1e8097%40%3Cdev.ofbiz.apache.org%3E
- https://lists.apache.org/thread.html/re21d25d9fb89e36cea910633779c23f144b9b60596b113b7bf1e8097%40%3Cdev.ofbiz.apache.org%3E
- https://lists.apache.org/thread.html/re21d25d9fb89e36cea910633779c23f144b9b60596b113b7bf1e8097%40%3Cuser.ofbiz.apache.org%3E