Oracle E-Business Suite 12.1.3 / 12.2.x Open Redirect

Credit: author
Risk: Low
Local: No
Remote: Yes
CWE: CWE-601

CVSS Base Score: 5.8/10
Impact Subscore: 4.9/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: Partial
Integrity impact: Partial
Availability impact: None

# Exploit Title: Oracle E-Business suite Open Redirect # Google Dork: inurl:OA_HTML/cabo/ # Date: April 2017 # Exploit Author: [author] # Vendor Homepage: # Software Link: [download link if available] # Version: Oracle E-Business Suite (REQUIRED) # Tested on: [relevant os] # CVE : CVE-2017-3528 The exploit can be leveraged for an open redirect using the following exploit path: https://targetsite/OA_HTML/cabo/jsps/a.jsp?_t=fredRC&configName=&redirect=/\ Oracle E-Business suite is vulnerable to an open redirect issue, specifically the redirect parameter allows any domain to be supplied and it will be rendered on the target's site. Note I was also credited for this CVE, see the Oracle CPU(

Vote for this issue:


Thanks for you vote!


Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.

(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2019,


Back to Top