/CVE-2023-51467

Apache OfBiz Auth Bypass Scanner for CVE-2023-51467

Primary LanguagePython

CVE-2023-51467 Scanner ๐Ÿ•ต๏ธโ€โ™‚๏ธ

Description ๐Ÿ“œ

CVE-2023-51467 Scanner is a Python-based command-line tool ๐Ÿ› ๏ธ that scans URLs for a specific vulnerability in the Apache OfBiz ERP system. This zero-day security flaw, tracked as CVE-2023-51467, allows attackers to bypass authentication protections due to an incomplete patch for the critical vulnerability CVE-2023-49070.

Vulnerability Details ๐Ÿ”

The CVE-2023-51467 vulnerability resides in the login functionality of Apache OfBiz versions prior to 18.12.10. It can be exploited by sending an HTTP request with empty or invalid USERNAME and PASSWORD parameters, which results in an authentication success message, allowing unauthorized access to internal resources.

Installation ๐Ÿ’ป

To use the CVE-2023-51467 Scanner, you need Python 3.x.

You can install the required packages using pip ๐Ÿ“ฆ:

pip install -r requirements.txt 

Usage ๐Ÿš€

To scan a single URL ๐ŸŽฏ:

python exploit.py -u http://example.com

To scan a list of URLs from a file ๐Ÿ“Š:

python exploit.py -f urls.txt -o output.txt -t 50

Options โš™๏ธ

  • -u, --url: Single URL to send the GET request to ๐ŸŒ.
  • -f, --file: File containing a list of base URLs to scan ๐Ÿ“„.
  • -o, --output: File to write vulnerable systems to (default is output.txt) ๐Ÿ“.
  • -t, --threads: Number of concurrent threads to use (default is 10) ๐Ÿงต.

Disclaimer โš ๏ธ

This tool is intended for security research and should not be used for illegal activities. The authors of this tool cannot be held responsible for any misuse or damage from its use.