CVE-2023-50968

7.5 HIGH

📋 TL;DR

This vulnerability in Apache OFBiz allows unauthenticated attackers to read arbitrary file properties via unauthorized URI calls, potentially exposing sensitive system information. The same URI can be exploited for Server-Side Request Forgery (SSRF) attacks, enabling attackers to make requests to internal systems. All Apache OFBiz users running affected versions are impacted.

💻 Affected Systems

Products:
  • Apache OFBiz
Versions: All versions before 18.12.11
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all deployments where the vulnerable URI endpoints are accessible without proper authorization checks.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could read sensitive file metadata, perform SSRF to access internal services, potentially leading to data exfiltration, internal network reconnaissance, or chained attacks with other vulnerabilities.

🟠

Likely Case

Unauthenticated attackers reading file properties to gather system information and performing SSRF attacks against internal services accessible from the OFBiz server.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to file property disclosure and SSRF attempts against allowed internal targets only.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability description indicates exploitation requires no authentication and involves simple URI calls.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 18.12.11

Vendor Advisory: https://ofbiz.apache.org/release-notes-18.12.11.html

Restart Required: Yes

Instructions:

1. Download Apache OFBiz 18.12.11 from https://ofbiz.apache.org/download.html
2. Backup current installation and data
3. Stop OFBiz services
4. Replace with patched version
5. Restart OFBiz services
6. Verify functionality

🔧 Temporary Workarounds

Network Access Control

all

Restrict access to OFBiz endpoints using firewall rules or web application firewall (WAF) to block unauthorized URI patterns.

Authentication Enforcement

all

Configure OFBiz to require authentication for all URI endpoints, especially those handling file operations.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate OFBiz from sensitive internal systems
  • Deploy web application firewall with rules to detect and block SSRF attempts and unauthorized file property requests

🔍 How to Verify

Check if Vulnerable:

Check if Apache OFBiz version is earlier than 18.12.11 by examining version files or running the version check command.

Check Version:

Check the OFBiz installation directory for version files or examine web interface footer for version information.

Verify Fix Applied:

Confirm version is 18.12.11 or later and test that unauthorized URI calls to file property endpoints are properly blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unusual URI patterns accessing file properties
  • Multiple failed authentication attempts followed by file property requests
  • Outbound requests from OFBiz to internal IP ranges

Network Indicators:

  • HTTP requests to OFBiz with file-related parameters from unauthenticated sources
  • OFBiz server making requests to internal services not typically accessed

SIEM Query:

source="ofbiz-logs" AND (uri="*file*" OR uri="*property*") AND auth_status="failed"

🔗 References

📤 Share & Export