Oracle Application Testing Suite Java Object Deserialization RCE (April 2016 CPU)

Critical Nessus Plugin ID 90859


The remote host has a web application installed that is affected by a remote code execution vulnerability.


The version of Oracle Application Testing Suite installed on the remote host is affected by a remote code execution vulnerability due to unsafe deserialize calls of unauthenticated Java objects to the Apache Commons Collections (ACC) library. An unauthenticated, remote attacker can exploit this, by sending a crafted SOAP request, to execute arbitrary code on the target host.


Apply the appropriate patch according to the April 2016 Oracle Critical Patch Update advisory.

See Also

Plugin Details

Severity: Critical

ID: 90859

File Name: oracle_oats_cpu_apr_2016.nasl

Version: $Revision: 1.10 $

Type: local

Family: Misc.

Published: 2016/05/03

Modified: 2016/07/25

Dependencies: 90860

Risk Information

Risk Factor: Critical


Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:ND

Vulnerability Information

CPE: cpe:/a:oracle:application_testing_suite

Required KB Items: installed_sw/Oracle Application Testing Suite

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2016/04/19

Vulnerability Publication Date: 2015/01/28

Exploitable With


Reference Information

CVE: CVE-2015-7501

BID: 78215

OSVDB: 129952, 130424

CERT: 576313