CVE-2016-0482
Oracle Application Testing Suite DownloadServlet file Parameter Directory Traversal Information Disclosure Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Unspecified vulnerability in the Oracle Application Testing Suite component in Oracle Enterprise Manager Grid Control 12.4.0.2 and 12.5.0.2 allows remote attackers to affect confidentiality via unknown vectors related to Test Manager for Web Apps, a different vulnerability than CVE-2016-0480, CVE-2016-0481, CVE-2016-0485, and CVE-2016-0486. NOTE: the previous information is from the January 2016 CPU. Oracle has not commented on third-party claims that this is a directory traversal vulnerability in the DownloadServlet servlet, which allows remote attackers to read arbitrary files via directory traversal sequences in the file parameter.
Vulnerabilidad no especificada en el componente Oracle Application Testing Suite en Oracle Enterprise Manager Grid Control 12.4.0.2 y 12.5.0.2 permite a atacantes remotos afectar a la confidencialidad a través de vectores desconocidos relacionados con Test Manager for Web Apps, una vulnerabilidad diferente a CVE-2016-0480, CVE-2016-0481, CVE-2016-0485 y CVE-2016-0486. NOTA: la información anterior es de la CPU de Enero de 2016. Oracle no ha comentado sobre las reclamaciones de terceros que esto es una vulnerabilidad de salto de directorio en el servlet DownloadServlet, lo que permite a atacantes remotos leer archivos arbitrarios a través de secuencias de salto de directorio en el parámetro file.
This vulnerability allows remote attackers to exfiltrate arbitrary files on vulnerable installations of Oracle Application Testing Suite. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the DownloadServlet servlet. By providing a file parameter containing a directory traversal where the downloadType is specified as subReport, an attacker can exfiltrate arbitrary files from the system.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2015-12-09 CVE Reserved
- 2016-01-21 CVE Published
- 2024-08-05 CVE Updated
- 2024-11-10 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
CAPEC
References (4)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/81100 | Vdb Entry | |
http://www.securitytracker.com/id/1034734 | Vdb Entry | |
http://www.zerodayinitiative.com/advisories/ZDI-16-037 | X_refsource_misc |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html | 2016-12-07 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Oracle Search vendor "Oracle" | Application Testing Suite Search vendor "Oracle" for product "Application Testing Suite" | 12.4.0.2 Search vendor "Oracle" for product "Application Testing Suite" and version "12.4.0.2" | - |
Affected
| ||||||
Oracle Search vendor "Oracle" | Application Testing Suite Search vendor "Oracle" for product "Application Testing Suite" | 12.5.0.2 Search vendor "Oracle" for product "Application Testing Suite" and version "12.5.0.2" | - |
Affected
|