// For flags

CVE-2015-2605

Oracle Endeca Information Discovery Integrator ETL Server MoveFile Remote Code Execution Vulnerability

Severity Score

7.5
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Unspecified vulnerability in the Oracle Endeca Information Discovery Studio component in Oracle Fusion Middleware 2.2.2, 2.3, 2.4, 3.0, and 3.1 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Integrator, a different vulnerability than CVE-2015-2602, CVE-2015-2603, CVE-2015-2604, CVE-2015-2606, and CVE-2015-4745.

Vulnerabilidad no especificada en el componente Oracle Endeca Information Discovery Studio en Oracle Fusion Middleware de las versiones 2.2.2, 2.3, 2.4, 3.0 y 3.1, permite a atacantes remotos afectar la confidencialidad, integridad y disponibilidad a través de vectores desconocidos relacionados con Integrator, una vulnerabilidad diferente a CVE-2015-2602, CVE-2015-2603, CVE-2015-2604, CVE-2015-2605 y CVE-2015-4745.

This vulnerability allows remote attackers the ability to execute arbitrary code on vulnerable instances of Oracle Endeca Information Discovery. Authentication is required to exploit this vulnerability but an authentication bypass is known.
The specific flaw exists in the handling of the MoveFile endpoint. The issue lies in the failure to properly sanitize the path of files. A remote attacker can exploit this vulnerability to read server configuration files. This exfiltrated information can then be used to access the system with the privileges of the clover server.

*Credits: Steven Seeley of Source Incite
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
Attack Vector
Network
Attack Complexity
Low
Authentication
Single
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2015-03-20 CVE Reserved
  • 2015-07-16 CVE Published
  • 2024-08-06 CVE Updated
  • 2024-08-09 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Oracle
Search vendor "Oracle"
Fusion Middleware
Search vendor "Oracle" for product "Fusion Middleware"
2.2.2
Search vendor "Oracle" for product "Fusion Middleware" and version "2.2.2"
-
Affected
Oracle
Search vendor "Oracle"
Fusion Middleware
Search vendor "Oracle" for product "Fusion Middleware"
2.3
Search vendor "Oracle" for product "Fusion Middleware" and version "2.3"
-
Affected
Oracle
Search vendor "Oracle"
Fusion Middleware
Search vendor "Oracle" for product "Fusion Middleware"
2.4
Search vendor "Oracle" for product "Fusion Middleware" and version "2.4"
-
Affected
Oracle
Search vendor "Oracle"
Fusion Middleware
Search vendor "Oracle" for product "Fusion Middleware"
3.0
Search vendor "Oracle" for product "Fusion Middleware" and version "3.0"
-
Affected
Oracle
Search vendor "Oracle"
Fusion Middleware
Search vendor "Oracle" for product "Fusion Middleware"
3.1
Search vendor "Oracle" for product "Fusion Middleware" and version "3.1"
-
Affected