Advisory Details

October 16th, 2013

Oracle BPEL Process Manager ScriptServlet Remote Code Execution Vulnerability

ZDI-13-249
ZDI-CAN-1761

CVE ID CVE-2013-3828
CVSS SCORE 5.0, AV:N/AC:L/Au:N/C:P/I:N/A:N
AFFECTED VENDORS Oracle
AFFECTED PRODUCTS BPEL Process Manager
TREND MICRO CUSTOMER PROTECTION Trend Micro TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID ['13204']. For further product information on the TippingPoint IPS: http://www.tippingpoint.com
VULNERABILITY DETAILS


This vulnerability allows remote attackers to obtain sensitive information on vulnerable installations of Oracle BPEL Process Manager. Authentication is not required to exploit this vulnerability.

The specific flaw exists within the ScriptServlet. It suffers of a directory traversal vulnerability inside the query string which can lead to disclosure of credentials. By abusing this behavior an attacker can disclose administrative credentials and possibly leverage this situation to achieve remote code execution.

ADDITIONAL DETAILS Oracle has issued an update to correct this vulnerability. More details can be found at:
http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html
DISCLOSURE TIMELINE
  • 2013-02-22 - Vulnerability reported to vendor
  • 2013-10-16 - Coordinated public release of advisory
CREDIT Andrea Micalizzi aka rgod
BACK TO ADVISORIES