Oracle Application Testing Suite Java Object Deserialization RCE (April 2016 CPU)

Critical Nessus Plugin ID 90859


The remote host has a web application installed that is affected by a remote code execution vulnerability.


The version of Oracle Application Testing Suite installed on the remote host is affected by a remote code execution vulnerability due to unsafe deserialize calls of unauthenticated Java objects to the Apache Commons Collections (ACC) library. An unauthenticated, remote attacker can exploit this, by sending a crafted SOAP request, to execute arbitrary code on the target host.


Apply the appropriate patch according to the April 2016 Oracle Critical Patch Update advisory.

See Also

Plugin Details

Severity: Critical

ID: 90859

File Name: oracle_oats_cpu_apr_2016.nasl

Version: 1.14

Type: local

Family: Misc.

Published: 2016/05/03

Updated: 2019/11/20

Dependencies: 90860

Risk Information

Risk Factor: Critical

CVSS Score Source: CVE-2015-7501

CVSS v2.0

Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

CVSS v3.0

Base Score: 9.8

Temporal Score: 9

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:oracle:application_testing_suite

Required KB Items: installed_sw/Oracle Application Testing Suite

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2016/04/19

Vulnerability Publication Date: 2015/01/28

Exploitable With


Reference Information

CVE: CVE-2015-7501

BID: 78215

CERT: 576313