// For flags

CVE-2016-0487

Oracle Application Testing Suite Authentication Bypass Vulnerability

Severity Score

6.4
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Unspecified vulnerability in the Oracle Application Testing Suite component in Oracle Enterprise Manager Grid Control 12.4.0.2 and 12.5.0.2 allows remote attackers to affect confidentiality and integrity via unknown vectors related to Test Manager for Web Apps, a different vulnerability than CVE-2016-0490. NOTE: the previous information is from the January 2016 CPU. Oracle has not commented on third-party claims that this is a directory traversal vulnerability in the process method in the ActionServlet servlet, which allows remote attackers to bypass authentication via directory traversal sequences following an unspecified URI string.

Vulnerabilidad no especificada en el componente Oracle Application Testing Suite en Oracle Enterprise Manager Grid Control 12.4.0.2 y 12.5.0.2 permite a atacantes remotos afectar a la confidencialidad y la integridad a través de vectores desconocidos relacionados con Test Manager for Web Apps, una vulnerabilidad diferente a CVE-2016-0490. NOTA: la información anterior es de la CPU de Enero de 2016. Oracle no ha comentado sobre las reclamaciones de terceros que esto es una vulnerabilidad de salto de directorio en el método process en el servlet ActionServlet, lo que permite a atacantes remotos eludir la autenticación a través de secuencias de salto de directorio siguiendo una cadena URI no especificada.

This vulnerability allows remote attackers to bypass authentication on vulnerable installations of Oracle Application Testing Suite.
The specific flaw exists within the ActionServlet servlet. The process method for this servlet will bypass authentication if the URI starts with a specific string. By providing that string, and a directory traversal that follows it, an attacker is able to reach any URI that would map to that servlet without authentication.

*Credits: rgod
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2015-12-09 CVE Reserved
  • 2016-01-21 CVE Published
  • 2024-04-22 EPSS Updated
  • 2024-08-05 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Oracle
Search vendor "Oracle"
Application Testing Suite
Search vendor "Oracle" for product "Application Testing Suite"
12.4.0.2
Search vendor "Oracle" for product "Application Testing Suite" and version "12.4.0.2"
-
Affected
Oracle
Search vendor "Oracle"
Application Testing Suite
Search vendor "Oracle" for product "Application Testing Suite"
12.5.0.2
Search vendor "Oracle" for product "Application Testing Suite" and version "12.5.0.2"
-
Affected