Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the easy-accordion-free domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the zoho-flow domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wordpress-seo domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893
{"id":28071,"date":"2024-08-27T22:51:12","date_gmt":"2024-08-27T22:51:12","guid":{"rendered":"https:\/\/jacksonholdingcompany.com\/cve-2024-38856-pre-auth-rce-vulnerability-in-apache-ofbiz-nataraja-gundale\/"},"modified":"2024-08-27T22:51:12","modified_gmt":"2024-08-27T22:51:12","slug":"cve-2024-38856-pre-auth-rce-vulnerability-in-apache-ofbiz-nataraja-gundale","status":"publish","type":"post","link":"https:\/\/jacksonholdingcompany.com\/cve-2024-38856-pre-auth-rce-vulnerability-in-apache-ofbiz-nataraja-gundale\/","title":{"rendered":"CVE-2024-38856: Pre-Auth RCE Vulnerability in Apache OFBiz Nataraja Gundale"},"content":{"rendered":"

IntroductionOn August 5, 2024, researchers at SonicWall discovered a zero-day security flaw in Apache OFBiz tracked as CVE-2024-38856. The vulnerability, which has been assigned a CVSS score of 9.8, allows threat actors to perform pre-authentication remote code execution (RCE). While testing a patch for CVE-2024-36104, SonicWall researchers discovered that unauthenticated access was permitted to the ProgramExport endpoint, potentially enabling the execution of arbitrary code. These vulnerabilities arise from a flaw in the override view functionality, which can be exploited by unauthorized threat actors through maliciously crafted requests, leading to the remote code execution.<\/p>\n

RecommendationsZscaler ThreatLabz strongly advises users of the Apache OFBiz application to promptly upgrade to version 18.12.15, as this version contains fixes to mitigate the security vulnerabilities identified in CVE-2024-38856 and CVE-2024-36104.<\/p>\n

Affected VersionsThe following versions of Apache OFBiz are affected by the disclosed vulnerabilities and should be updated immediately: <\/p>\n

All versions 18.12.13 and below are impacted by CVE-2024-36104
\nAll versions 18.12.14 and below are impacted by CVE-2024-38856<\/p>\n

BackgroundApache OFBiz is an open-source Enterprise Resource Planning (ERP) system that provides business solutions for various industries. This includes tools to manage operations like customer relationships, order processing, human resource functions, warehouse management, and more.<\/p>\n

During the analysis of CVE-2024-36104, a vulnerability disclosed on June 3, 2024, SonicWall researchers discovered the ControlServlet and RequestHandler functions received different endpoints when handling the same request. Ideally, both functions should process the same endpoint. CVE-2024-38856 allows unauthenticated access to the ProgramExport endpoint, which should have been restricted.<\/p>\n

How It WorksIn the previous vulnerability, CVE-2024-36104, Apache OFBiz was found to have a flaw that enabled remote attackers to access system directories due to inadequate validation of user requests. Exploiting this flaw involved sending a malformed URL containing ‘..’ sequences, which could result in the execution of arbitrary code on the system.<\/p>\n

An example of a malformed POST request and request-body is shown below.<\/p>\n

POST \/webtools\/control\/forgotPassword\/;%2e%2e\/ProgramExport<\/p>\n

POST-Body: groovyProgram=throw new Exception(‘whoami’.execute().text);<\/p>\n

In the figure below, the example malformed request is shown. This request includes a command ‘whoami’ that is being executed, and the resulting output of the command is displayed in the error message. The output of the command is highlighted in the green box.<\/p>\n

Figure 1: An example of a POST request related to CVE-2024-36104. The request includes an encoded request body, along with its corresponding output.<\/p>\n

The most recent vulnerability, CVE-2024-38856, permits unauthorized access to the ProgramExport endpoint without the need for a path traversal vector. This means that access is granted even when it should have been restricted. <\/p>\n

The figure below shows an attack chain exploiting CVE-2024-38856.<\/p>\n

Figure 2: The attack chain depicting an attacker exploiting CVE-2024-38856.<\/p>\n

The figure below shows the malformed request, without a path traversal vector, being executed, and the resulting output of the command is displayed in the error message.<\/p>\n

Figure 3: An example of a POST request related to CVE-2024-38856. The request includes an encoded request body, and the output associated with it.<\/p>\n

Further investigation revealed that unauthenticated access to the ProgramExport endpoint was possible by combining it with any other endpoint that does not require authentication. Examples of such endpoints include:<\/p>\n

forgotPassword
\nshowDateTime
\nTestService
\nview
\nmain<\/p>\n

URLs that could be used to exploit this vulnerability are:<\/p>\n

POST \/webtools\/control\/forgotPassword\/ProgramExport
\nPOST \/webtools\/control\/showDateTime\/ProgramExport
\nPOST \/webtools\/control\/TestService\/ProgramExport
\nPOST \/webtools\/control\/view\/ProgramExport
\nPOST \/webtools\/control\/main\/ProgramExport<\/p>\n

ConclusionTo protect against CVE-2024-38856, it is important to update Apache OFBiz systems to version 18.12.15 as soon as possible. Neglecting to upgrade promptly exposes systems to significant security risks, which could enable threat actors to manipulate login parameters and execute arbitrary code on the target server.<\/p>\n

Zscaler CoverageThe Zscaler ThreatLabz team has deployed the following.<\/p>\n

Zscaler Advanced Threat Protection<\/p>\n

App.Exploit.CVE-2024-38856
\nApp.Exploit.CVE-2024-36104<\/p>\n

Zscaler Private Access AppProtection<\/p>\n

HTML.Exploit.CommandInjection:6000004<\/p>\n

For more details, visit the Zscaler Threat Library.\u00a0\u00a0<\/p>\n

\u200b[#item_full_content]\u00a0[[{“value”:”IntroductionOn August 5, 2024, researchers at SonicWall discovered a zero-day security flaw in Apache OFBiz tracked as CVE-2024-38856. The vulnerability, which has been assigned a CVSS score of 9.8, allows threat actors to perform pre-authentication remote code execution (RCE). While testing a patch for CVE-2024-36104, SonicWall researchers discovered that unauthenticated access was permitted to the ProgramExport endpoint, potentially enabling the execution of arbitrary code. These vulnerabilities arise from a flaw in the override view functionality, which can be exploited by unauthorized threat actors through maliciously crafted requests, leading to the remote code execution.<\/p>\n

RecommendationsZscaler ThreatLabz strongly advises users of the Apache OFBiz application to promptly upgrade to version 18.12.15, as this version contains fixes to mitigate the security vulnerabilities identified in CVE-2024-38856 and CVE-2024-36104.<\/p>\n

Affected VersionsThe following versions of Apache OFBiz are affected by the disclosed vulnerabilities and should be updated immediately: <\/p>\n

All versions 18.12.13 and below are impacted by CVE-2024-36104
\nAll versions 18.12.14 and below are impacted by CVE-2024-38856<\/p>\n

BackgroundApache OFBiz is an open-source Enterprise Resource Planning (ERP) system that provides business solutions for various industries. This includes tools to manage operations like customer relationships, order processing, human resource functions, warehouse management, and more.<\/p>\n

During the analysis of CVE-2024-36104, a vulnerability disclosed on June 3, 2024, SonicWall researchers discovered the ControlServlet and RequestHandler functions received different endpoints when handling the same request. Ideally, both functions should process the same endpoint. CVE-2024-38856 allows unauthenticated access to the ProgramExport endpoint, which should have been restricted.<\/p>\n

How It WorksIn the previous vulnerability, CVE-2024-36104, Apache OFBiz was found to have a flaw that enabled remote attackers to access system directories due to inadequate validation of user requests. Exploiting this flaw involved sending a malformed URL containing ‘..’ sequences, which could result in the execution of arbitrary code on the system.<\/p>\n

An example of a malformed POST request and request-body is shown below.<\/p>\n

POST \/webtools\/control\/forgotPassword\/;%2e%2e\/ProgramExport<\/p>\n

POST-Body: groovyProgram=throw new Exception(‘whoami’.execute().text);<\/p>\n

In the figure below, the example malformed request is shown. This request includes a command ‘whoami’ that is being executed, and the resulting output of the command is displayed in the error message. The output of the command is highlighted in the green box.<\/p>\n

Figure 1: An example of a POST request related to CVE-2024-36104. The request includes an encoded request body, along with its corresponding output.<\/p>\n

The most recent vulnerability, CVE-2024-38856, permits unauthorized access to the ProgramExport endpoint without the need for a path traversal vector. This means that access is granted even when it should have been restricted. <\/p>\n

The figure below shows an attack chain exploiting CVE-2024-38856.<\/p>\n

Figure 2: The attack chain depicting an attacker exploiting CVE-2024-38856.<\/p>\n

The figure below shows the malformed request, without a path traversal vector, being executed, and the resulting output of the command is displayed in the error message.<\/p>\n

Figure 3: An example of a POST request related to CVE-2024-38856. The request includes an encoded request body, and the output associated with it.<\/p>\n

Further investigation revealed that unauthenticated access to the ProgramExport endpoint was possible by combining it with any other endpoint that does not require authentication. Examples of such endpoints include:<\/p>\n

forgotPassword
\nshowDateTime
\nTestService
\nview
\nmain<\/p>\n

URLs that could be used to exploit this vulnerability are:<\/p>\n

POST \/webtools\/control\/forgotPassword\/ProgramExport
\nPOST \/webtools\/control\/showDateTime\/ProgramExport
\nPOST \/webtools\/control\/TestService\/ProgramExport
\nPOST \/webtools\/control\/view\/ProgramExport
\nPOST \/webtools\/control\/main\/ProgramExport<\/p>\n

ConclusionTo protect against CVE-2024-38856, it is important to update Apache OFBiz systems to version 18.12.15 as soon as possible. Neglecting to upgrade promptly exposes systems to significant security risks, which could enable threat actors to manipulate login parameters and execute arbitrary code on the target server.<\/p>\n

Zscaler CoverageThe Zscaler ThreatLabz team has deployed the following.<\/p>\n

Zscaler Advanced Threat Protection<\/p>\n

App.Exploit.CVE-2024-38856
\nApp.Exploit.CVE-2024-36104<\/p>\n

Zscaler Private Access AppProtection<\/p>\n

HTML.Exploit.CommandInjection:6000004<\/p>\n

For more details, visit the Zscaler Threat Library.”}]]\u00a0<\/p>","protected":false},"excerpt":{"rendered":"

IntroductionOn August 5, 2024, researchers at SonicWall discovered a zero-day […]<\/p>\n","protected":false},"author":0,"featured_media":3787,"comment_status":"","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[],"class_list":["post-28071","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zenith-zscaler"],"yoast_head":"\nCVE-2024-38856: Pre-Auth RCE Vulnerability in Apache OFBiz Nataraja Gundale - JHC<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jacksonholdingcompany.com\/cve-2024-38856-pre-auth-rce-vulnerability-in-apache-ofbiz-nataraja-gundale\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CVE-2024-38856: Pre-Auth RCE Vulnerability in Apache OFBiz Nataraja Gundale\" \/>\n<meta property=\"og:description\" content=\"IntroductionOn August 5, 2024, researchers at SonicWall discovered a zero-day […]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jacksonholdingcompany.com\/cve-2024-38856-pre-auth-rce-vulnerability-in-apache-ofbiz-nataraja-gundale\/\" \/>\n<meta property=\"og:site_name\" content=\"JHC\" \/>\n<meta property=\"article:published_time\" content=\"2024-08-27T22:51:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/08\/blog-GettyImages-128117948020copy-i32gD0.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"700\" \/>\n\t<meta property=\"og:image:height\" content=\"467\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/cve-2024-38856-pre-auth-rce-vulnerability-in-apache-ofbiz-nataraja-gundale\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/cve-2024-38856-pre-auth-rce-vulnerability-in-apache-ofbiz-nataraja-gundale\/\"},\"author\":{\"name\":\"\",\"@id\":\"\"},\"headline\":\"CVE-2024-38856: Pre-Auth RCE Vulnerability in Apache OFBiz Nataraja Gundale\",\"datePublished\":\"2024-08-27T22:51:12+00:00\",\"dateModified\":\"2024-08-27T22:51:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/cve-2024-38856-pre-auth-rce-vulnerability-in-apache-ofbiz-nataraja-gundale\/\"},\"wordCount\":1308,\"publisher\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/cve-2024-38856-pre-auth-rce-vulnerability-in-apache-ofbiz-nataraja-gundale\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/08\/blog-GettyImages-128117948020copy-i32gD0.jpeg\",\"articleSection\":[\"Zenith: Zscaler\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/cve-2024-38856-pre-auth-rce-vulnerability-in-apache-ofbiz-nataraja-gundale\/\",\"url\":\"https:\/\/jacksonholdingcompany.com\/cve-2024-38856-pre-auth-rce-vulnerability-in-apache-ofbiz-nataraja-gundale\/\",\"name\":\"CVE-2024-38856: Pre-Auth RCE Vulnerability in Apache OFBiz Nataraja Gundale - JHC\",\"isPartOf\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/cve-2024-38856-pre-auth-rce-vulnerability-in-apache-ofbiz-nataraja-gundale\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/cve-2024-38856-pre-auth-rce-vulnerability-in-apache-ofbiz-nataraja-gundale\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/08\/blog-GettyImages-128117948020copy-i32gD0.jpeg\",\"datePublished\":\"2024-08-27T22:51:12+00:00\",\"dateModified\":\"2024-08-27T22:51:12+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/cve-2024-38856-pre-auth-rce-vulnerability-in-apache-ofbiz-nataraja-gundale\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/jacksonholdingcompany.com\/cve-2024-38856-pre-auth-rce-vulnerability-in-apache-ofbiz-nataraja-gundale\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/cve-2024-38856-pre-auth-rce-vulnerability-in-apache-ofbiz-nataraja-gundale\/#primaryimage\",\"url\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/08\/blog-GettyImages-128117948020copy-i32gD0.jpeg\",\"contentUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/08\/blog-GettyImages-128117948020copy-i32gD0.jpeg\",\"width\":700,\"height\":467},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/cve-2024-38856-pre-auth-rce-vulnerability-in-apache-ofbiz-nataraja-gundale\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/jacksonholdingcompany.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CVE-2024-38856: Pre-Auth RCE Vulnerability in Apache OFBiz Nataraja Gundale\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/#website\",\"url\":\"https:\/\/jacksonholdingcompany.com\/\",\"name\":\"JHC\",\"description\":\"Your Business Is Our Business\",\"publisher\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/jacksonholdingcompany.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/#organization\",\"name\":\"JHC\",\"url\":\"https:\/\/jacksonholdingcompany.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png\",\"contentUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png\",\"width\":452,\"height\":149,\"caption\":\"JHC\"},\"image\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"CVE-2024-38856: Pre-Auth RCE Vulnerability in Apache OFBiz Nataraja Gundale - JHC","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jacksonholdingcompany.com\/cve-2024-38856-pre-auth-rce-vulnerability-in-apache-ofbiz-nataraja-gundale\/","og_locale":"en_US","og_type":"article","og_title":"CVE-2024-38856: Pre-Auth RCE Vulnerability in Apache OFBiz Nataraja Gundale","og_description":"IntroductionOn August 5, 2024, researchers at SonicWall discovered a zero-day […]","og_url":"https:\/\/jacksonholdingcompany.com\/cve-2024-38856-pre-auth-rce-vulnerability-in-apache-ofbiz-nataraja-gundale\/","og_site_name":"JHC","article_published_time":"2024-08-27T22:51:12+00:00","og_image":[{"width":700,"height":467,"url":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/08\/blog-GettyImages-128117948020copy-i32gD0.jpeg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/jacksonholdingcompany.com\/cve-2024-38856-pre-auth-rce-vulnerability-in-apache-ofbiz-nataraja-gundale\/#article","isPartOf":{"@id":"https:\/\/jacksonholdingcompany.com\/cve-2024-38856-pre-auth-rce-vulnerability-in-apache-ofbiz-nataraja-gundale\/"},"author":{"name":"","@id":""},"headline":"CVE-2024-38856: Pre-Auth RCE Vulnerability in Apache OFBiz Nataraja Gundale","datePublished":"2024-08-27T22:51:12+00:00","dateModified":"2024-08-27T22:51:12+00:00","mainEntityOfPage":{"@id":"https:\/\/jacksonholdingcompany.com\/cve-2024-38856-pre-auth-rce-vulnerability-in-apache-ofbiz-nataraja-gundale\/"},"wordCount":1308,"publisher":{"@id":"https:\/\/jacksonholdingcompany.com\/#organization"},"image":{"@id":"https:\/\/jacksonholdingcompany.com\/cve-2024-38856-pre-auth-rce-vulnerability-in-apache-ofbiz-nataraja-gundale\/#primaryimage"},"thumbnailUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/08\/blog-GettyImages-128117948020copy-i32gD0.jpeg","articleSection":["Zenith: Zscaler"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/jacksonholdingcompany.com\/cve-2024-38856-pre-auth-rce-vulnerability-in-apache-ofbiz-nataraja-gundale\/","url":"https:\/\/jacksonholdingcompany.com\/cve-2024-38856-pre-auth-rce-vulnerability-in-apache-ofbiz-nataraja-gundale\/","name":"CVE-2024-38856: Pre-Auth RCE Vulnerability in Apache OFBiz Nataraja Gundale - JHC","isPartOf":{"@id":"https:\/\/jacksonholdingcompany.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/jacksonholdingcompany.com\/cve-2024-38856-pre-auth-rce-vulnerability-in-apache-ofbiz-nataraja-gundale\/#primaryimage"},"image":{"@id":"https:\/\/jacksonholdingcompany.com\/cve-2024-38856-pre-auth-rce-vulnerability-in-apache-ofbiz-nataraja-gundale\/#primaryimage"},"thumbnailUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/08\/blog-GettyImages-128117948020copy-i32gD0.jpeg","datePublished":"2024-08-27T22:51:12+00:00","dateModified":"2024-08-27T22:51:12+00:00","breadcrumb":{"@id":"https:\/\/jacksonholdingcompany.com\/cve-2024-38856-pre-auth-rce-vulnerability-in-apache-ofbiz-nataraja-gundale\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jacksonholdingcompany.com\/cve-2024-38856-pre-auth-rce-vulnerability-in-apache-ofbiz-nataraja-gundale\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jacksonholdingcompany.com\/cve-2024-38856-pre-auth-rce-vulnerability-in-apache-ofbiz-nataraja-gundale\/#primaryimage","url":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/08\/blog-GettyImages-128117948020copy-i32gD0.jpeg","contentUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/08\/blog-GettyImages-128117948020copy-i32gD0.jpeg","width":700,"height":467},{"@type":"BreadcrumbList","@id":"https:\/\/jacksonholdingcompany.com\/cve-2024-38856-pre-auth-rce-vulnerability-in-apache-ofbiz-nataraja-gundale\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/jacksonholdingcompany.com\/"},{"@type":"ListItem","position":2,"name":"CVE-2024-38856: Pre-Auth RCE Vulnerability in Apache OFBiz Nataraja Gundale"}]},{"@type":"WebSite","@id":"https:\/\/jacksonholdingcompany.com\/#website","url":"https:\/\/jacksonholdingcompany.com\/","name":"JHC","description":"Your Business Is Our Business","publisher":{"@id":"https:\/\/jacksonholdingcompany.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/jacksonholdingcompany.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/jacksonholdingcompany.com\/#organization","name":"JHC","url":"https:\/\/jacksonholdingcompany.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/","url":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png","contentUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png","width":452,"height":149,"caption":"JHC"},"image":{"@id":"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/posts\/28071","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/comments?post=28071"}],"version-history":[{"count":0,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/posts\/28071\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/media\/3787"}],"wp:attachment":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/media?parent=28071"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/categories?post=28071"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/tags?post=28071"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}