""ET WEB_SPECIFIC_APPS Apache OFBiz Authentication Bypass Vulnerability (CVE-2023-49070)""

SID: 2050067

Revision: 1

Class Type: trojan-activity

Metadata: affected_product Web_Server_Applications, attack_target Web_Server, created_at 2024_01_12, cve CVE_2023_49070, deployment Perimeter, deployment SSLDecrypt, performance_impact Low, confidence High, signature_severity Major, updated_at 2024_01_12

Reference:

  • cve

  • 2023-49070

Protocol: tcp

Source Network: $EXTERNAL_NET

Source Port: any

Destination Network: $HOME_NET

Destination Port: $HTTP_PORTS

Flow: established,to_server

Contents:

  • Value: "POST"

  • Value: "/webtools/control/xmlrpc" Depth: 24

  • Value: "/?"

  • Value: "USERNAME"

  • Value: "PASSWORD"

  • Value: "requirePasswordChange=Y"

  • Value: "|3c 3f|xml version|3d 22|1.0|22 3f 3e|" Depth: 21

  • Value: "|3c|methodCall|3e|"

  • Value: "|3c|serializable xmlns|3d 22|http|3a 2f 2f|ws.apache.org/xmlrpc/namespaces/extensions|22 3e|"

Within: 500

PCRE:

Special Options:

  • http_method

  • http_uri

  • fast_pattern

  • http_uri

  • http_uri

  • http_uri

  • http_uri

  • http_client_body

  • http_client_body

  • http_client_body

source