// For flags

CVE-2018-8033

 

Time Line
Published
2024-03-19
Updated
2024-03-19
Firt exploit
2024-03-19
Overview
Descriptions (2)
NVD, NVD
CWE (1)
CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CAPEC (-)
Risk
CVSS Score
7.5 High
SSVC
-
KEV
-
EPSS
4.6%
Affected Products (-)
Vendors (1)
apache
Products (1)
ofbiz
Versions (1)
>= 16.11.01 <= 16.11.04
Intel Resources (-)
Advisories (-)
-
Exploits (-)
-
Plugins (-)
-
References (2)
General (1)
apache
Exploits & POcs (1)
github
Patches (-)
Advisories (-)
Summary
Descriptions

In Apache OFBiz 16.11.01 to 16.11.04, the OFBiz HTTP engine (org.apache.ofbiz.service.engine.HttpEngine.java) handles requests for HTTP services via the /webtools/control/httpService endpoint. Both POST and GET requests to the httpService endpoint may contain three parameters: serviceName, serviceMode, and serviceContext. The exploitation occurs by having DOCTYPEs pointing to external references that trigger a payload that returns secret information from the host.

En Apache OFBiz, desde la versión 16.11.01 hasta la 16.11.04, el motor HTTP OFBiz (org.apache.ofbiz.service.engine.HttpEngine.java) gestiona las peticiones a servicios HTTP mediante el endpoint /webtools/control/httpService. Tanto las peticiones POST como las GET al endpoint httpService podrían contener 3 parámetros: serviceName, serviceMode y serviceContext. La explotación ocurre haciendo que DOCTYPE señale a referencias externas que desencadenan una carga útil que devuelve información secreta desde el host.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2018-03-09 CVE Reserved
  • 2018-12-13 CVE Published
  • 2024-05-21 First Exploit
  • 2024-08-05 CVE Updated
  • 2025-02-07 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CAPEC
Threat Intelligence Resources (0)
Security Advisory details:

Select an advisory to view details here.

Select an exploit to view details here.

Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Apache
Search vendor "Apache"
Ofbiz
Search vendor "Apache" for product "Ofbiz"
>= 16.11.01 <= 16.11.04
Search vendor "Apache" for product "Ofbiz" and version " >= 16.11.01 <= 16.11.04"
-
Affected