Oracle WebCenter Sites Apache Xalan-Java Library Security Bypass (January 2016 CPU)

This script is Copyright (C) 2016 Tenable Network Security, Inc.


Synopsis :

The website content management system installed on the remote host is
affected by a security bypass vulnerability.

Description :

The version Oracle WebCenter Sites installed on the remote host is
missing a security patch from the January 2016 Critical Patch Update
(CPU). It is, therefore, affected by a security bypass vulnerability
in the Apache Xalan-Java library due to a failure to properly restrict
access to certain properties when FEATURE_SECURE_PROCESSING is
enabled. A remote attacker can exploit this to bypass restrictions and
load arbitrary classes or access external resources.

See also :

http://www.nessus.org/u?efa5c48c

Solution :

Apply the appropriate patch according to the January 2016 Oracle
Critical Patch Update advisory.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVSS Temporal Score : 5.5
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Family: Windows

Nessus Plugin ID: 88044 ()

Bugtraq ID: 66397

CVE ID: CVE-2014-0107

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now