Advisory Details

April 21st, 2014

Oracle Event Processing FileUploadServlet Remote Code Execution Vulnerability

ZDI-14-106
ZDI-CAN-2048

CVE ID CVE-2014-2424
CVSS SCORE 7.5, AV:N/AC:L/Au:N/C:P/I:P/A:P
AFFECTED VENDORS Oracle
AFFECTED PRODUCTS Event Processing
TREND MICRO CUSTOMER PROTECTION Trend Micro TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID ['13425']. For further product information on the TippingPoint IPS: http://www.tippingpoint.com
VULNERABILITY DETAILS


This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Oracle Event Processing. Authentication is not required to exploit this vulnerability.

The specific flaw exists within the FileUploadServlet class. The class contains a method that does not properly sanitize input allowing for directory traversal. An attacker can leverage this vulnerability to write files under the context of the user and achieve remote code execution.

ADDITIONAL DETAILS Oracle has issued an update to correct this vulnerability. More details can be found at:
http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html
DISCLOSURE TIMELINE
  • 2013-12-09 - Vulnerability reported to vendor
  • 2014-04-21 - Coordinated public release of advisory
CREDIT Andrea Micalizzi (rgod)
BACK TO ADVISORIES