CVE-2016-0491
Oracle Application Testing Suite UploadFileAction Servlet Remote Code Execution Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
3Exploited in Wild
-Decision
Descriptions
Unspecified vulnerability in the Oracle Application Testing Suite component in Oracle Enterprise Manager Grid Control 12.4.0.2 and 12.5.0.2 allows remote attackers to affect integrity and availability via unknown vectors related to Load Testing for Web Apps. NOTE: the previous information is from the January 2016 CPU. Oracle has not commented on third-party claims that the UploadFileAction servlet allows remote authenticated users to upload and execute arbitrary files via an * (asterisk) character in the fileType parameter.
Vulnerabilidad no especificada en el componente Oracle Application Testing Suite en Oracle Enterprise Manager Grid Control 12.4.0.2 y 12.5.0.2 permite a atacantes remotos afectar a la integridad y la disponibilidad a través de vectores desconocidos relacionados con Load Testing for Web Apps. NOTA: la información anterior es de la CPU de Enero de 2016. Oracle no ha comentado sobre las reclamaciones de terceros que el servlet UploadFileAction permite a usuarios remotos autenticados cargar y ejecutar archivos arbitrarios a través de un caracter * (asterisco) en el parámetro fileType.
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Oracle Application Testing Suite. Authentication is required but can be bypassed.
The specific vulnerability is in the UploadFileAction servlet. By providing a fileType parameter of "*", an attacker is able to upload a file to an arbitrary location on the system. An attacker could leverage this to execute arbitrary code under the context of SYSTEM.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2015-12-09 CVE Reserved
- 2016-01-21 CVE Published
- 2024-07-05 EPSS Updated
- 2024-08-05 CVE Updated
- 2024-08-05 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
CAPEC
References (8)
URL | Tag | Source |
---|---|---|
http://www.rapid7.com/db/modules/exploit/multi/http/oracle_ats_file_upload | Third Party Advisory | |
http://www.securityfocus.com/bid/81169 | Third Party Advisory | |
http://www.securitytracker.com/id/1034734 | Third Party Advisory | |
http://www.zerodayinitiative.com/advisories/ZDI-16-047 | Third Party Advisory |
URL | Date | SRC |
---|---|---|
https://www.exploit-db.com/exploits/39852 | 2024-08-05 | |
https://www.exploit-db.com/exploits/39691 | 2024-08-05 | |
http://packetstormsecurity.com/files/137175/Oracle-ATS-Arbitrary-File-Upload.html | 2024-08-05 |
URL | Date | SRC |
---|---|---|
http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html | 2016-12-22 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Oracle Search vendor "Oracle" | Application Testing Suite Search vendor "Oracle" for product "Application Testing Suite" | 12.4.0.2 Search vendor "Oracle" for product "Application Testing Suite" and version "12.4.0.2" | - |
Affected
| ||||||
Oracle Search vendor "Oracle" | Application Testing Suite Search vendor "Oracle" for product "Application Testing Suite" | 12.5.0.2 Search vendor "Oracle" for product "Application Testing Suite" and version "12.5.0.2" | - |
Affected
|