Merge pull request #8663 from j4vaovo/patch-4

fix oast fp CVE-2014-4210.yaml
patch-1
pussycat0x 2023-11-28 10:59:56 +05:30 committed by GitHub
commit 45645d752a
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 11 additions and 5 deletions

View File

@ -1,12 +1,12 @@
id: CVE-2014-4210 id: CVE-2014-4210
info: info:
name: Oracle Weblogic - SSRF in SearchPublicRegistries.jsp name: Oracle Weblogic - Server-Side Request Forgery
author: princechaddha author: princechaddha
severity: medium severity: medium
description: An unspecified vulnerability in the Oracle WebLogic Server component in Oracle Fusion Middleware 10.0.2.0 and 10.3.6.0 allows remote attackers to affect confidentiality via vectors related to WLS - Web Services. description: |
remediation: | An unspecified vulnerability in the Oracle WebLogic Server component in Oracle Fusion Middleware 10.0.2.0 and 10.3.6.0 allows remote attackers to affect confidentiality via vectors related to WLS - Web Services.
Apply the latest patches and updates provided by Oracle to fix the SSRF vulnerability remediation: Apply the latest patches and updates provided by Oracle to fix the SSRF vulnerability
reference: reference:
- https://www.oracle.com/security-alerts/cpujul2014.html - https://www.oracle.com/security-alerts/cpujul2014.html
- https://nvd.nist.gov/vuln/detail/CVE-2014-4210 - https://nvd.nist.gov/vuln/detail/CVE-2014-4210
@ -25,7 +25,8 @@ info:
max-request: 1 max-request: 1
vendor: oracle vendor: oracle
product: fusion_middleware product: fusion_middleware
tags: seclists,cve,cve2014,weblogic,oracle,ssrf,oast shodan-query: title:"Weblogic"
tags: cve,cve2014,weblogic,oracle,ssrf,oast
http: http:
- method: GET - method: GET
@ -39,6 +40,11 @@ http:
words: words:
- "http" - "http"
- type: word
part: body
words:
- "Search public registries"
- type: status - type: status
status: status:
- 200 - 200