[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248268

 
 

909

 
 

195051

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2016-0492Date: (C)2016-02-11   (M)2023-12-22


Unspecified vulnerability in the Oracle Application Testing Suite component in Oracle Enterprise Manager Grid Control 12.4.0.2 and 12.5.0.2 allows remote attackers to affect confidentiality and integrity via unknown vectors related to Load Testing for Web Apps, a different vulnerability than CVE-2016-0488. NOTE: the previous information is from the January 2016 CPU. Oracle has not commented on third-party claims that this is a directory traversal vulnerability in the isAllowedUrl function, which allows remote attackers to bypass authentication via directory traversal sequences following a URI entry that does not require authentication, as demonstrated by olt/Login.do/../../olt/UploadFileUpload.do.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 6.4
Exploit Score: 10.0
Impact Score: 4.9
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: LOW
Authentication: NONE
Confidentiality: PARTIAL
Integrity: PARTIAL
Availability: NONE
  
Reference:
SECTRACK-1034734
EXPLOIT-DB-39691
EXPLOIT-DB-39852
BID-81158
http://packetstormsecurity.com/files/137175/Oracle-ATS-Arbitrary-File-Upload.html
http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
http://www.rapid7.com/db/modules/exploit/multi/http/oracle_ats_file_upload
http://www.zerodayinitiative.com/advisories/ZDI-16-042

CPE    2
cpe:/a:oracle:application_testing_suite:12.5.0.2
cpe:/a:oracle:application_testing_suite:12.4.0.2

© SecPod Technologies