Short Name |
HTTP:ORACLE:BACKUP-CMD-INJ |
---|---|
Severity |
Critical |
Recommended |
No |
Recommended Action |
Drop |
Category |
HTTP |
Keywords |
Oracle Secure Backup Administration Command Injection |
Release Date |
2010/10/01 |
Update Number |
1784 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+ |
This signature detects attempts to exploit a known vulnerability in Oracle Secure Backup. It is due to an insufficient sanitizing when handling the $selector variable. A remote authenticated attacker can exploit this vulnerability by sending a specially crafted HTTP request to the index.php on the target server. Successful exploitation of this can allow a remote authenticated attacker to execute arbitrary commands under the credentials of the SYSTEM account.
Oracle Secure Backup is prone to a remote vulnerability. The vulnerability can be exploited over the 'HTTP' protocol. For an exploit to succeed, the attacker must have 'Valid Session' privileges. This vulnerability affects the following supported versions: 10.3.0.1