Oracle Application Testing Suite Java Object Deserialization RCE (April 2016 CPU)

Critical Nessus Plugin ID 90859

Synopsis

The remote host has a web application installed that is affected by a remote code execution vulnerability.

Description

The version of Oracle Application Testing Suite installed on the remote host is affected by a remote code execution vulnerability due to unsafe deserialize calls of unauthenticated Java objects to the Apache Commons Collections (ACC) library. An unauthenticated, remote attacker can exploit this, by sending a crafted SOAP request, to execute arbitrary code on the target host.

Solution

Apply the appropriate patch according to the April 2016 Oracle Critical Patch Update advisory.

See Also

http://www.nessus.org/u?ffb7b96f

http://www.nessus.org/u?9c6d83db

Plugin Details

Severity: Critical

ID: 90859

File Name: oracle_oats_cpu_apr_2016.nasl

Version: 1.12

Type: local

Family: Misc.

Published: 2016/05/03

Modified: 2018/11/15

Dependencies: 90860

Risk Information

Risk Factor: Critical

CVSS v2.0

Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:oracle:application_testing_suite

Required KB Items: installed_sw/Oracle Application Testing Suite

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2016/04/19

Vulnerability Publication Date: 2015/01/28

Exploitable With

CANVAS (CANVAS)

Reference Information

CVE: CVE-2015-7501

BID: 78215

CERT: 576313