Oracle Endeca Tools and Frameworks Script.action Remote Code Execution VulnerabilityZDI-15-146: April 16th, 2015
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Oracle Endeca Tools and Frameworks. Authentication is required to exploit this vulnerability, but authentication is easily bypassed.
This product installs a web application called Oracle Endeca Workbench, which includes a handler for requests to Script.action. This handler fails to properly authenticate the user, so that an attacker can access this handler using the built-in and undocumented "anonymous" user account. This handler allows an attacker to specify arbitrary code that will execute on the Endeca Tools and Frameworks installation, under the context of the "endeca" user.
Vendor ResponseOracle has issued an update to correct this vulnerability. More details can be found at:
2014-12-23 - Vulnerability reported to vendor
2015-04-16 - Coordinated public release of advisory
CreditThis vulnerability was discovered by:
Steven Seeley of Source Incite