Vulnerability CVE-2016-0492


Published: 2016-01-20   Modified: 2016-01-21

Description:
Unspecified vulnerability in the Oracle Application Testing Suite component in Oracle Enterprise Manager Grid Control 12.4.0.2 and 12.5.0.2 allows remote attackers to affect confidentiality and integrity via unknown vectors related to Load Testing for Web Apps, a different vulnerability than CVE-2016-0488. NOTE: the previous information is from the January 2016 CPU. Oracle has not commented on third-party claims that this is a directory traversal vulnerability in the isAllowedUrl function, which allows remote attackers to bypass authentication via directory traversal sequences following a URI entry that does not require authentication, as demonstrated by olt/Login.do/../../olt/UploadFileUpload.do.

See advisories in our WLB2 database:
Topic
Author
Date
High
Oracle ATS Arbitrary File Upload
wvu
25.05.2016

Type:

CWE-264

(Permissions, Privileges, and Access Controls)

CVSS2 => (AV:N/AC:L/Au:N/C:P/I:P/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
6.4/10
4.9/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
None
Affected software
Oracle -> Application testing suite 

 References:
http://packetstormsecurity.com/files/137175/Oracle-ATS-Arbitrary-File-Upload.html
http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
http://www.rapid7.com/db/modules/exploit/multi/http/oracle_ats_file_upload
http://www.securityfocus.com/bid/81158
http://www.securitytracker.com/id/1034734
http://www.zerodayinitiative.com/advisories/ZDI-16-042
https://www.exploit-db.com/exploits/39691/
https://www.exploit-db.com/exploits/39852/

Copyright 2024, cxsecurity.com

 

Back to Top