Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

This site is deprecated. Please CLICK HERE for latest updates

Short Name

HTTP:ORACLE:REPORTS-RCE

Severity

Major

Recommended

No

Recommended Action

Drop

Category

HTTP

Keywords

Oracle Forms and Reports Remote Code Execution

Release Date

2014/03/07

Update Number

2352

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+

HTTP: Oracle Forms and Reports Remote Code Execution


This signature detects attempts to exploit a known vulnerability against Oracle Forms and Reports. A successful attack can lead to arbitrary code execution.

Extended Description

Unspecified vulnerability in the Oracle Reports Developer component in Oracle Fusion Middleware 11.1.1.4, 11.1.1.6, and 11.1.2.0 allows remote attackers to affect confidentiality and integrity via unknown vectors related to Servlet. NOTE: the previous information is from the October 2012 CPU. Oracle has not commented on claims from the original researcher that the PARSEQUERY function allows remote attackers to obtain database credentials via reports/rwservlet/parsequery, and that this issue occurs in earlier versions. NOTE: this can be leveraged with CVE-2012-3152 to execute arbitrary code by uploading a .jsp file.

Affected Products

  • Oracle fusion_middleware 11.1.1.4.0
  • Oracle fusion_middleware 11.1.1.6.0
  • Oracle fusion_middleware 11.1.2.0

References

  • BugTraq: 55961
  • CVE: CVE-2012-3152
  • CVE: CVE-2012-3153

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out