Oracle WebCenter Sites Multiple Vulnerabilities (April 2017 CPU)

Critical Nessus Plugin ID 136998

New! Vulnerability Priority Rating (VPR)

Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it's different from CVSS.

VPR Score: 10

Synopsis

An application running on the remote host is affected by multiple security vulnerabilities.

Description

Oracle WebCenter Sites component of Oracle Fusion Middleware is vulnerable to multiple vulnerabilities.

- A remote code execution in the Oracle WebCenter Sites component of Oracle Fusion Middleware (subcomponent:
Install (Apache Common Collections)). An unauthenticated, remote attacker can exploit this, via a crafted serialized Java object, to bypass authentication and execute arbitrary commands. (CVE-2015-7501)

- An unspecified vulnerability in the Oracle WebCenter Sites component of Oracle Fusion Middleware (subcomponent: Server). An unauthenticated, remote attacker can exploit this, via HTTP, to obtain access to critical data or complete access to all Oracle WebCenter Sites accessible data as well as unauthorized update, insert or delete access to some of Oracle WebCenter Sites accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle WebCenter Sites. (CVE-2017-3542)

- A remote code execution in the Oracle WebCenter Sites component of Oracle Fusion Middleware (subcomponent:
Third Party Tools (Struts 2)) due to incorrect exception handling and error-message generation during file-upload attempts. An unauthenticated, remote attacker can exploit this, via a crafted Content-Type, Content-Disposition, or Content-Length HTTP header, to bypass authentication and execute arbitrary commands. (CVE-2017-5638)

In addition, Oracle WebCenter Sites is also affected by several additional vulnerabilities including code execution, denial of service, information disclosure, and other unspecified vulnerabilities. Note that Nessus has not attempted to exploit these issues but has instead relied only on the application's self-reported version number.

Solution

Apply the appropriate patch according to the April 2017 Oracle Critical Patch Update advisory.

See Also

https://www.oracle.com/security-alerts/cpuapr2017.html

Plugin Details

Severity: Critical

ID: 136998

File Name: oracle_webcenter_sites_apr_2017_cpu.nasl

Version: 1.5

Type: local

Agent: windows

Family: Windows

Published: 2020/06/01

Updated: 2020/10/09

Dependencies: 72776

Risk Information

Risk Factor: Critical

VPR Score: 10

CVSS Score Source: CVE-2017-5638

CVSS v2.0

Base Score: 10

Temporal Score: 8.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:H/RL:OF/RC:C

CVSS v3.0

Base Score: 10

Temporal Score: 9.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:oracle:fusion_middleware

Required KB Items: SMB/WebCenter_Sites/Installed

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2017/04/18

Vulnerability Publication Date: 2017/04/18

Exploitable With

CANVAS (CANVAS)

Core Impact

Metasploit (Apache Struts Jakarta Multipart Parser OGNL Injection)

Reference Information

CVE: CVE-2015-7501, CVE-2016-0714, CVE-2017-3540, CVE-2017-3541, CVE-2017-3542, CVE-2017-3543, CVE-2017-3545, CVE-2017-3554, CVE-2017-3591, CVE-2017-3593, CVE-2017-3594, CVE-2017-3595, CVE-2017-3596, CVE-2017-3597, CVE-2017-3598, CVE-2017-3602, CVE-2017-3603, CVE-2017-5638

IAVA: 2017-A-0113