First published: Wed Sep 11 2019(Updated: )
The java.io.ObjectInputStream is known to cause Java serialisation issues. This issue here is exposed by the "webtools/control/httpService" URL, and uses Java deserialization to perform code execution. In the HttpEngine, the value of the request parameter "serviceContext" is passed to the "deserialize" method of "XmlSerializer". Apache Ofbiz is affected via two different dependencies: "commons-beanutils" and an out-dated version of "commons-fileupload" Mitigation: Upgrade to 16.11.06 or manually apply the commits from OFBIZ-10770 and OFBIZ-10837 on branch 16
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache OFBiz | >=16.11.01<16.11.06 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-0189 is a vulnerability that affects Apache OFBiz software versions between 16.11.01 and 16.11.06.
CVE-2019-0189 has a severity rating of 9.8 out of 10, which is considered critical.
CVE-2019-0189 allows an attacker to execute arbitrary code by exploiting the Java deserialization vulnerability in the "webtools/control/httpService" URL of Apache OFBiz.
To fix CVE-2019-0189, it is recommended to upgrade your Apache OFBiz software to a version later than 16.11.06.
You can find more information about CVE-2019-0189 in the references provided: [Reference 1](https://lists.apache.org/thread.html/7316b4fa811e1ec27604cda3c30560e7389fc6b8c91996c9640fabb8@%3Cnotifications.ofbiz.apache.org%3E), [Reference 2](https://lists.apache.org/thread.html/986ed5f1a0e209f87ed4a2d348ae5735054f9188912bb2fed7a5543f@%3Cnotifications.ofbiz.apache.org%3E), [Reference 3](https://lists.apache.org/thread.html/r11fd9562dbdfc0be95e40518cbef70ab2565129f6f542a870ab82c69@%3Cnotifications.ofbiz.apache.org%3E).