Unspecified vulnerability in the Oracle Application Testing Suite component in Oracle Enterprise Manager Grid Control 12.4.0.2 and 12.5.0.2 allows remote attackers to affect integrity and availability via unknown vectors related to Load Testing for Web Apps. NOTE: the previous information is from the January 2016 CPU. Oracle has not commented on third-party claims that the UploadFileAction servlet allows remote authenticated users to upload and execute arbitrary files via an * (asterisk) character in the fileType parameter.
References
Link | Resource |
---|---|
http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html | Patch Vendor Advisory |
http://www.zerodayinitiative.com/advisories/ZDI-16-047 | Third Party Advisory VDB Entry |
https://www.exploit-db.com/exploits/39691/ | Exploit Third Party Advisory VDB Entry |
http://packetstormsecurity.com/files/137175/Oracle-ATS-Arbitrary-File-Upload.html | Exploit |
http://www.securityfocus.com/bid/81169 | Third Party Advisory VDB Entry |
https://www.exploit-db.com/exploits/39852/ | Exploit Third Party Advisory VDB Entry |
http://www.rapid7.com/db/modules/exploit/multi/http/oracle_ats_file_upload | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1034734 | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
Information
Published : 2016-01-20 19:00
Updated : 2016-12-22 06:38
NVD link : CVE-2016-0491
Mitre link : CVE-2016-0491
JSON object : View
CWE
Products Affected
oracle
- application_testing_suite