Apache OFBiz uses the Birt project plugin (https://eclipse.github.io/birt-website/) to create data visualizations and reports. By leveraging a bug in Birt (https://bugs.eclipse.org/bugs/show_bug.cgi?id=538142) it is possible to perform a remote code execution (RCE) attack in Apache OFBiz, release 18.12.05 and earlier.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
https://lists.apache.org/thread/bvp3sczqq863lxr1wh7wjvdtjbkcwspq | mailing list patch vendor advisory |
http://www.openwall.com/lists/oss-security/2022/09/02/7 | mailing list third party advisory patch |
http://www.openwall.com/lists/oss-security/2022/09/03/1 | mailing list third party advisory patch |
http://www.openwall.com/lists/oss-security/2022/09/08/2 | third party advisory mailing list |