Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-51467 PoC — Apache OFBiz: Pre-authentication Remote Code Execution (RCE) vulnerability

Source
Associated Vulnerability
Title:Apache OFBiz: Pre-authentication Remote Code Execution (RCE) vulnerability (CVE-2023-51467)
Description:The vulnerability permits attackers to circumvent authentication processes, enabling them to remotely execute arbitrary code
Description
This repo is a PoC with to exploit CVE-2023-51467 and CVE-2023-49070 preauth RCE vulnerabilities found in Apache OFBiz.
Readme
# Apache OFBiz Authentication Bypass Vulnerability (CVE-2023-51467 and CVE-2023-49070)

This exploit script and PoC are written for an in-depth CVE analysis on [vsociety](https://www.vicarius.io/vsociety/).

The Apache OFBiz Enterprise Resource Planning (ERP) system, a versatile Java-based web framework widely utilized across industries, is facing a critical security challenge. The SonicWall Threat research team's [discovery](https://blog.sonicwall.com/en-us/2023/12/sonicwall-discovers-critical-apache-ofbiz-zero-day-authbiz/) of CVE-2023-51467, a severe authentication bypass vulnerability with a CVSS score of 9.8, has unveiled an alarming risk to the system's integrity. This vulnerability not only exposes the ERP system to potential exploitation but also opens the door to a Server-Side Request Forgery (SSRF) exploit, presenting a dual threat to organizations relying on Apache OFBiz.

The repo also contains [ysoserial](https://github.com/frohoff/ysoserial) release used to generate serialized data.

## Usage

Run the script in scanner mode:

```bash
python3 exploit.py --url https://localhost:8443
```

Run command on the remote server:
```bash
python3 exploit.py --url https://localhost:8443 --cmd 'CMD'
```

## Disclaimer
This exploit script has been created solely for research and the development of effective defensive techniques. It is not intended to be used for any malicious or unauthorized activities. The script's author and owner disclaim any responsibility or liability for any misuse or damage caused by this software. Just so you know, users are urged to use this software responsibly and only by applicable laws and regulations. Use responsibly.
File Snapshot

[4.0K] /data/pocs/0c21f60ea3c581957d2777e52a81216f4610172d ├── [4.2K] exploit.py ├── [1.6K] README.md ├── [1.3K] xdetection.py └── [ 57M] ysoserial-all.jar 0 directories, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →