Oracle Identity Manager (October 2014 CPU

high Nessus Plugin ID 78542

Synopsis

The remote host has an application installed that is affected by multiple vulnerabilities.

Description

The remote host is missing the October 2014 Critical Patch Update for Oracle Identity Manager. It is, therefore, affected by multiple vulnerabilities :

- The application is affected by a vulnerability in Apache Commons BeanUtils in which ClassLoader objects can be set via the class attribute of an ActionForm object. This can be used to manipulate the ClassLoader or execute arbitrary code. (CVE-2014-0114)

- The application is subject to a cross-site redirection attack because user-supplied input to the 'backUrl' parameter is not properly validated. (CVE-2014-2880)

- An unspecified vulnerability exists in the End User Self Service component. (CVE-2014-6487).

Solution

Apply the appropriate patch according to the October 2014 Oracle Critical Patch Update advisory.

See Also

http://www.nessus.org/u?1ada40cc

Plugin Details

Severity: High

ID: 78542

File Name: oracle_identity_management_cpu_oct_2014.nasl

Version: 1.13

Type: local

Agent: windows, macosx, unix

Family: Misc.

Published: 10/17/2014

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Critical

Score: 9.5

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.2

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/a:oracle:identity_manager

Required KB Items: installed_sw/Oracle Identity Manager

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 10/14/2014

Vulnerability Publication Date: 4/3/2014

Exploitable With

Metasploit (Apache Struts ClassLoader Manipulation Remote Code Execution)

Reference Information

CVE: CVE-2014-0114, CVE-2014-2880, CVE-2014-6487

BID: 66615, 67121, 70458