Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

This site is deprecated. Please CLICK HERE for latest updates

Short Name

HTTP:DIR:ORACLE-OTM-DT

Severity

Major

Recommended

Yes

Recommended Action

Drop

Category

HTTP

Keywords

Oracle ATS DownloadServlet OTM reportName Directory Traversal

Release Date

2017/12/21

Update Number

3019

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+

HTTP: Oracle ATS DownloadServlet OTM reportName Directory Traversal


This signature detects attempts to exploit a known vulnerability against Oracle apllication Testing Suite.Successful exploitation results in arbitrary file download from the target server.

Extended Description

Unspecified vulnerability in the Oracle Application Testing Suite component in Oracle Enterprise Manager Grid Control 12.4.0.2 and 12.5.0.2 allows remote attackers to affect confidentiality via unknown vectors related to Test Manager for Web Apps, a different vulnerability than CVE-2016-0480, CVE-2016-0481, CVE-2016-0482, and CVE-2016-0486. NOTE: the previous information is from the January 2016 CPU. Oracle has not commented on third-party claims that this is a directory traversal vulnerability in the DownloadServlet servlet, which allows remote attackers to read arbitrary files via directory traversal sequences in the reportName parameter.

Affected Products

  • Oracle application_testing_suite 12.4.0.2
  • Oracle application_testing_suite 12.5.0.2

References

  • CVE: CVE-2016-0485
  • URL: http://www.zerodayinitiative.com/advisories/zdi-16-046/
  • URL: http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out