TippingPoint Zero Day Initiative
 

Oracle Endeca Tools and Frameworks Script.action Remote Code Execution Vulnerability

ZDI-15-146: April 16th, 2015

CVE ID

CVSS Score

Affected Vendors

Affected Products

Vulnerability Details


This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Oracle Endeca Tools and Frameworks. Authentication is required to exploit this vulnerability, but authentication is easily bypassed.

This product installs a web application called Oracle Endeca Workbench, which includes a handler for requests to Script.action. This handler fails to properly authenticate the user, so that an attacker can access this handler using the built-in and undocumented "anonymous" user account. This handler allows an attacker to specify arbitrary code that will execute on the Endeca Tools and Frameworks installation, under the context of the "endeca" user.

Vendor Response

Oracle has issued an update to correct this vulnerability. More details can be found at:

Disclosure Timeline

    2014-12-23 - Vulnerability reported to vendor
    2015-04-16 - Coordinated public release of advisory

Credit

This vulnerability was discovered by:
    Steven Seeley of Source Incite