2021-11-06 00:24:41 +00:00
id : CVE-2019-2578
info :
2022-05-09 16:12:52 +00:00
name : Oracle Fusion Middleware WebCenter Sites 12.2.1.3.0 - Broken Access Control
2021-11-06 00:24:41 +00:00
author : leovalcante
severity : high
2022-05-09 16:12:52 +00:00
description : Oracle Fusion Middleware WebCenter Sites 12.2.1.3.0 suffers from broken access control. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle WebCenter Sites accessible data.
2023-09-06 12:53:28 +00:00
remediation : |
Apply the necessary patches or updates provided by Oracle to fix the Broken Access Control vulnerability (CVE-2019-2578).
2022-04-07 13:53:15 +00:00
reference :
2022-05-09 16:12:52 +00:00
- https://www.oracle.com/security-alerts/cpuapr2019.html
2022-04-07 13:53:15 +00:00
- https://outpost24.com/blog/Vulnerabilities-discovered-in-Oracle-WebCenter-Sites
- https://nvd.nist.gov/vuln/detail/CVE-2019-2578
2022-05-17 09:18:12 +00:00
- http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
2021-11-06 08:18:29 +00:00
classification :
cvss-metrics : CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
2022-04-22 10:38:41 +00:00
cvss-score : 8.6
2021-11-06 08:18:29 +00:00
cve-id : CVE-2019-2578
2023-10-14 11:27:55 +00:00
epss-score : 0.01062
2023-11-07 14:54:31 +00:00
epss-percentile : 0.82583
2023-09-06 12:53:28 +00:00
cpe : cpe:2.3:a:oracle:webcenter_sites:12.2.1.3.0:*:*:*:*:*:*:*
2023-04-28 08:11:21 +00:00
metadata :
max-request : 2
2023-07-11 19:49:27 +00:00
vendor : oracle
product : webcenter_sites
tags : cve,cve2019,oracle,wcs,auth-bypass
2021-11-06 00:24:41 +00:00
2023-04-27 04:28:59 +00:00
http :
2021-11-06 00:24:41 +00:00
- raw :
- |
GET /cs/Satellite?pagename=OpenMarket/Xcelerate/Admin/WebReferences HTTP/1.1
2021-11-06 08:11:08 +00:00
Host : {{Hostname}}
2021-11-06 00:24:41 +00:00
- |
GET /cs/Satellite?pagename=OpenMarket/Xcelerate/Admin/Slots HTTP/1.1
2021-11-06 08:11:08 +00:00
Host : {{Hostname}}
stop-at-first-match : true
2021-11-06 00:24:41 +00:00
matchers :
- type : regex
part : body
2021-11-06 08:11:08 +00:00
regex :
2022-04-07 13:53:15 +00:00
- '<script[\d\D]*<throwexception/>'
2023-11-07 17:58:22 +00:00
# digest: 4a0a00473045022031968cfec4a8a23cf1d7a4a9ef8752b799c8339d1dd3d05f89a4ef7379fee97b022100820555c411e6f16121798f60d0a9fde52569068db0732dcdf09dd48c55db25e5:922c64590222798bb761d5b6d8e72950