Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-38856 PoC — Apache OFBiz: Unauthenticated endpoint could allow execution of screen rendering code

Source
Associated Vulnerability
Title:Apache OFBiz: Unauthenticated endpoint could allow execution of screen rendering code (CVE-2024-38856)
Description:Incorrect Authorization vulnerability in Apache OFBiz. This issue affects Apache OFBiz: through 18.12.14. Users are recommended to upgrade to version 18.12.15, which fixes the issue. Unauthenticated endpoints could allow execution of screen rendering code of screens if some preconditions are met (such as when the screen definitions don't explicitly check user's permissions because they rely on the configuration of their endpoints).
Description
Perform With Massive Apache OFBiz Zero-Day Scanner & RCE
Readme
# CVE-2024-38856 Apache Ofbiz RCE Scanner

## Description

This script is designed to scan for the `CVE-2024-38856` vulnerability in Apache Ofbiz applications, which may allow for remote code execution. It sends HTTP POST requests to specific paths within the Ofbiz application with malicious payloads to exploit the vulnerability.

![Screenshot_1](https://github.com/user-attachments/assets/2c10ebe1-b173-4ad4-a123-66142d9d7a5c)

## Features

- Scans targets for vulnerability using various paths
- Supports multithreading for faster processing
- Uses `coloredlogs` for color-coded, easy-to-read logs
- Supports input from a file containing a list of targets

## Prerequisites

- Python 3.x
- Python Modules:
  - `requests`
  - `coloredlogs`
  - `colorama`
  - `argparse`
  - `urllib3`

You can install the required dependencies using pip:

```bash
pip install requests coloredlogs colorama argparse urllib3
```

# Usage

## Running the Script

To run the script, use the following command:

```bash
python script_name.py [options]
```
# Options

- `-t`, `--threads`: Number of threads to use (default: 1)
- `-p`, `--port`: Target port
- `-c`, `--command`: Command to execute
- `-s`, `--scan`: Perform a scan with ping, curl, and wget
- `-d`, `--domain`: Domain (attacker domain) to scan with ping, curl, and wget
- `-f`, `--file`: File containing a list of targets in the format `http(s)://target,port`

# Examples

- Scan targets with a command:

  ```bash
  python script_name.py -f targets.txt -c "whoami"
  ```

 # Perform a scan with a domain:

```bash
python script_name.py -s -d example.com -p 80
```

# Use a file containing a list of targets:

```bash
python script_name.py -f targets.txt -c "uname -a"
```

# Error Handling
- If targets lack the http:// or https:// prefix, the script will prompt you to choose a prefix to add.
- If there's an error while making an HTTP request, the script will log the error.
File Snapshot

[4.0K] /data/pocs/c238cfca5d4507ff14571f90f420cd42cd866508 ├── [ 10K] CVE-2024-38856.py ├── [1.9K] README.md └── [ 38] requirements.txt 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →