Apache OFBiz Security Flaw: Remote Code Execution Nightmare or Just Another Day?
Apache OFBiz has patched a high-severity vulnerability, CVE-2024-45195, which could allow unauthenticated remote code execution. This flaw affects all versions prior to 18.12.16 and is part of a series of issues that have been actively exploited. Update now to avoid becoming the latest victim of code chaos!

Hot Take:
Looks like Apache OFBiz just got a major security makeover! If your ERP system was a house, it just found out it left the front door wide open. Time to change the locks!
Key Points:
- New high-severity vulnerability, CVE-2024-45195, found in Apache OFBiz
- Allows unauthenticated remote code execution on both Linux and Windows
- Related to previously identified issues CVE-2024-32113, CVE-2024-36104, and CVE-2024-38856
- Older vulnerabilities led to the deployment of the Mirai botnet malware
- Apache OFBiz version 18.12.16 also addresses a critical SSRF vulnerability (CVE-2024-45507)
The Vulnerability Parade
In the latest episode of “Cyber Dramas,” Apache OFBiz found itself at the center of attention with CVE-2024-45195, a vulnerability that could give an attacker god-like powers over your ERP system. This bug, with a CVSS score of 7.5, basically invites hackers to a remote code execution party without needing to RSVP. Rapid7’s Ryan Emmons spilled the beans, revealing that this flaw allows unauthenticated attackers to execute arbitrary code on your server, making your valuable data as accessible as an all-you-can-eat buffet.
The Prequel Problem
But wait, there’s more! CVE-2024-45195 isn’t just a lone wolf; it’s part of a dysfunctional family. This vulnerability bypasses older issues, namely CVE-2024-32113, CVE-2024-36104, and CVE-2024-38856. These siblings were problematic enough on their own, with CVE-2024-32113 being actively exploited in the wild to deploy the infamous Mirai botnet malware. Talk about a family legacy! All three of these flaws stem from the ability to desynchronize the controller and view map state – a problem that previous patches just couldn’t quite fix.
Patch It Up
Now, what’s a good drama without a resolution? Apache OFBiz version 18.12.16 rides to the rescue, bringing a patch that finally checks if a view should permit anonymous access when a user is unauthenticated. This change ensures that authorization checks are no longer based solely on the target controller. Basically, the ERP system has learned to ask for ID at the door.
SSRF: The Uninvited Guest
Just when you thought it was safe to go back into your ERP system, another monster appears: CVE-2024-45507, a critical SSRF vulnerability with a jaw-dropping CVSS score of 9.8. This flaw could allow unauthorized access and system compromise through a specially crafted URL. It’s like leaving your credit card details on a public billboard. Thankfully, the latest patch also addresses this issue, ensuring your ERP system doesn’t become an all-access pass for cybercriminals.