TippingPoint Zero Day Initiative

Oracle Endeca Tools and Frameworks Script.action Remote Code Execution Vulnerability

ZDI-15-146: April 16th, 2015


CVSS Score

Affected Vendors

Affected Products

Vulnerability Details

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Oracle Endeca Tools and Frameworks. Authentication is required to exploit this vulnerability, but authentication is easily bypassed.

This product installs a web application called Oracle Endeca Workbench, which includes a handler for requests to Script.action. This handler fails to properly authenticate the user, so that an attacker can access this handler using the built-in and undocumented "anonymous" user account. This handler allows an attacker to specify arbitrary code that will execute on the Endeca Tools and Frameworks installation, under the context of the "endeca" user.

Vendor Response

Oracle has issued an update to correct this vulnerability. More details can be found at:

Disclosure Timeline

    2014-12-23 - Vulnerability reported to vendor
    2015-04-16 - Coordinated public release of advisory


This vulnerability was discovered by:
    Steven Seeley of Source Incite