6.4
CVSSv2

CVE-2012-3152

Published: 16/10/2012 Updated: 29/08/2017
CVSS v2 Base Score: 6.4 | Impact Score: 4.9 | Exploitability Score: 10
VMScore: 651
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:N

Vulnerability Summary

Unspecified vulnerability in the Oracle Reports Developer component in Oracle Fusion Middleware 11.1.1.4, 11.1.1.6, and 11.1.2.0 allows remote malicious users to affect confidentiality and integrity via unknown vectors related to Report Server Component. NOTE: the previous information is from the October 2012 CPU. Oracle has not commented on claims from the original researcher that the URLPARAMETER functionality allows remote malicious users to read and upload arbitrary files to reports/rwservlet, and that this issue occurs in earlier versions. NOTE: this can be leveraged with CVE-2012-3153 to execute arbitrary code by uploading a .jsp file.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

oracle fusion middleware 11.1.1.4.0

oracle fusion middleware 11.1.1.6.0

oracle fusion middleware 11.1.2.0

Exploits

This Metasploit module uses two vulnerabilities in Oracle forms and reports to get remote code execution on the host The showenv url can be used to disclose information about a server A second vulnerability that allows arbitrary reading and writing to the host filesystem can then be used to write a shell from a remote url to a known local path di ...
## # This module requires Metasploit: http//metasploitcom/download # Current source: githubcom/rapid7/metasploit-framework ## require 'msf/core' require 'uri' class Metasploit3 < Msf::Exploit::Remote include Msf::Exploit::Remote::HttpClient include Msf::Exploit::Remote::HttpServer::HTML include Msf::Exploit::EXE Rank = Grea ...
#!/usr/bin/env ruby # Exploit Title: Oracle Reports 111 # About: Automated exploit for CVE-2012-3153/CVE-2012-3152 # Google Dork: inurl:/reports/rwservlet/ # Date: 01/28/2014 # Exploit Author: Mekanismen <mattias@gotrooteu> # Credits to: @miss_sudo for initial disclosure # Reference: netinfiltrationcom/ # Vendor Homepage: ww ...

Github Repositories

Automated exploit for CVE-2012-3153 / CVE-2012-3152

pwnacle-fusion Automated exploit for Oracle Reports, CVE-2012-3153 / CVE-2012-3152 Credits to @miss_sudo for the disclosure Usage: /pwnaclerb target_url payload_url This exploit uses both CVEs to upload a jsp shell from your payload_url which is then reachable from /reports/images/shelljsp payload_url should contain a jsp payload but it could be anything really with some m

Python tutorials

python系列教程(翻译) ~# python >>> import urllib >>> from bs4 import BeautifulSoup >>> url = urlliburlopen("wwwprimalsecuritynet") >>> output = BeautifulSoup(urlread(), 'lxml') >>> outputtitle <title>Primal Security Podcast

##python系列教程(翻译) ~# python >>> import urllib >>> from bs4 import BeautifulSoup >>> url = urlliburlopen("wwwprimalsecuritynet") >>> output = BeautifulSoup(urlread(), 'lxml') >>> outputtitle <title>Primal Security Podca

##python系列教程(翻译) ~# python >>> import urllib >>> from bs4 import BeautifulSoup >>> url = urlliburlopen("wwwprimalsecuritynet") >>> output = BeautifulSoup(urlread(), 'lxml') >>> outputtitle <title>Primal Security Podca