""ET WEB_SPECIFIC_APPS Apache OFBiz Authentication Bypass Vulnerability (CVE-2023-49070)""
SID: 2050067
Revision: 1
Class Type: trojan-activity
Metadata: affected_product Web_Server_Applications, attack_target Web_Server, created_at 2024_01_12, cve CVE_2023_49070, deployment Perimeter, deployment SSLDecrypt, performance_impact Low, confidence High, signature_severity Major, updated_at 2024_01_12
Reference:
-
cve
-
2023-49070
Protocol: tcp
Source Network: $EXTERNAL_NET
Source Port: any
Destination Network: $HOME_NET
Destination Port: $HTTP_PORTS
Flow: established,to_server
Contents:
-
Value: "POST"
-
Value: "/webtools/control/xmlrpc" Depth: 24
-
Value: "/?"
-
Value: "USERNAME"
-
Value: "PASSWORD"
-
Value: "requirePasswordChange=Y"
-
Value: "|3c 3f|xml version|3d 22|1.0|22 3f 3e|" Depth: 21
-
Value: "|3c|methodCall|3e|"
-
Value: "|3c|serializable xmlns|3d 22|http|3a 2f 2f|ws.apache.org/xmlrpc/namespaces/extensions|22 3e|"
Within: 500
PCRE:
Special Options:
-
http_method
-
http_uri
-
fast_pattern
-
http_uri
-
http_uri
-
http_uri
-
http_uri
-
http_client_body
-
http_client_body
-
http_client_body