Cloud Threat Landscape
  • Incidents
  • Actors
  • Techniques
  • Defenses
  • Tools
  • Targeted Technologies
  • Posters & Newspapers
  • About
  • RSS
  • STIX
  • Back to wiz.io
Cloud Threat Landscape

Mirai Botnet Exploiting Apache OFBiz Vulnerability

Type
Campaign
Actors
🪞Mirai
Pub. date
July 31, 2024
Initial access
1-day vulnerability
Impact
Resource hijacking
Observed techniques
Vulnerability exploitation
Observed tools
Mirai
Targeted technologies
Apache OFBiz
References
https://isc.sans.edu/diary/Increased%20Activity%20Against%20Apache%20OFBiz%20CVE-2024-32113/31132
Status
Finalized
Last edited
Aug 14, 2024 8:21 AM

The Apache Foundation's OFBiz, an open-source Java-based ERP framework, addressed in May 2024 a critical security vulnerability (CVE-2024-32113) involving path traversal that could lead to remote command execution. Despite its lesser prevalence compared to commercial ERP systems, OFBiz handles sensitive business data, making its security crucial. The exploit involves manipulating URLs to gain unauthorized access and execute arbitrary code, and attackers have already started exploiting this vulnerability.

The vulnerability in OFBiz is a path traversal issue that can be exploited by appending a semicolon to a URL, followed by a restricted URL. Specifically, the exploit targets the /webtools/control/forgotPassword endpoint, which is publicly accessible and doesn't require authentication. Attackers can then append ;/ProgramExport to the URL, allowing arbitrary code execution via the "groovyProgram" parameter. The attack can be initiated using a POST request without a body, simply by including the payload in the URL parameters. An observed exploit uses the curl command to download a shell script from a remote server, while another variation involves the wget command.

The vulnerability was actively exploited, as seen from scans observed by researchers. These scans involved sending the exploit in both URL parameters and request bodies. The malware, possibly a variant of the Mirai botnet, was hosted on the IP 185.196.10.231, which had been involved in previous attacks.

Made with 💙 by Wiz

Last Updated: April 3, 2025