Oracle Reports Server 6.0.8/9.0.x – Unauthorized Report Execution

Oracle Reports Server 6.0.8/9.0.x – Unauthorized Report Execution

漏洞ID 1055264 漏洞类型
发布时间 2005-07-19 更新时间 2005-07-19
图片[1]-Oracle Reports Server 6.0.8/9.0.x – Unauthorized Report Execution-安全小百科CVE编号 N/A
图片[2]-Oracle Reports Server 6.0.8/9.0.x – Unauthorized Report Execution-安全小百科CNNVD-ID N/A
漏洞平台 Multiple CVSS评分 N/A
|漏洞来源
https://www.exploit-db.com/exploits/26006
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
source: http://www.securityfocus.com/bid/14316/info

Oracle Reports Server is susceptible to an unauthorized report execution vulnerability.

By placing a report file in a globally accessible location, users can trigger the execution of the report by issuing an HTTP GET request to the affected servlet containing the full path of the file.

Attackers may exploit this vulnerability to execute arbitrary commands, or read/write arbitrary files with the privileges of the Oracle account under which the server is executing.

It should be noted that this issue may be remotely exploited if an attacker has means to write files to the serving computer (WebDAV, FTP, CIFS, etc.) without local access. 

http://www.example.com:7779/reports/rwservlet?server=repserv+report=/tmp/hacker.rdf+destype=cache+desformat=PDF

相关推荐: Sawmill Add User Cross-Site Scripting Vulnerability

Sawmill Add User Cross-Site Scripting Vulnerability 漏洞ID 1096545 漏洞类型 Input Validation Error 发布时间 2005-06-06 更新时间 2005-06-06 CVE编号…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享