CVE-2024-45195
Apache
CVE-2024-45195 is a Direct Request ('Forced Browsing') vulnerability in Apache OFBiz, allowing unauthorized access. This Apache OFBiz vulnerability affects versions prior to 18.12.16 and could allow attackers to bypass intended access controls. While the CVSS score is 7.5, the SOCRadar Vulnerability Risk Score (SVRS) of 71 indicates a significant risk level, nearing critical. Although not in the critical range (>80), the presence of active exploits and the CISA KEV tag indicates the potential for exploitation is high. Users should upgrade to version 18.12.16 immediately to mitigate this threat. This vulnerability's significance is amplified by its presence "In The Wild" and the availability of exploits, increasing the likelihood of it being targeted. Immediate patching is strongly advised.
Description
CVE-2024-45195 is a Direct Request ('Forced Browsing') vulnerability in Apache OFBiz, affecting versions prior to 18.12.16. This vulnerability allows an attacker to force a user to browse to a specific URL, potentially leading to phishing attacks or malware distribution. The SVRS score of 73 indicates a high severity, highlighting the urgency of addressing this threat.
Key Insights
- Exploitation in the Wild: This vulnerability is actively exploited by hackers, making it crucial for organizations to take immediate action.
- CISA Warning: The Cybersecurity and Infrastructure Security Agency (CISA) has warned of this vulnerability, emphasizing the need for immediate mitigation measures.
- Threat Actors: Specific threat actors or APT groups actively exploiting this vulnerability have not been identified.
- Impact: This vulnerability can lead to phishing attacks, malware distribution, and other malicious activities, posing a significant risk to organizations and individuals.
Mitigation Strategies
- Upgrade to the Latest Version: Upgrade to Apache OFBiz version 18.12.16 or later to address this vulnerability.
- Implement Web Application Firewall (WAF): Deploy a WAF to block malicious requests and protect against forced browsing attacks.
- Enable Content Security Policy (CSP): Configure CSP to restrict the loading of external resources and prevent phishing attempts.
- Educate Users: Train users to be aware of phishing scams and to avoid clicking on suspicious links or opening attachments from unknown sources.
Additional Information
If users have additional queries regarding this incident, they can use the 'Ask to Analyst' feature, contact SOCRadar directly, or open a support ticket for more information if necessary.
Indicators of Compromise
Exploits
News
Social Media
Affected Software
References
CWE Details
CVE Radar
Real-time CVE Intelligence & Vulnerability Management Platform
CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.