585
VMScore

CVE-2018-2791

Published: 19/04/2018 Updated: 03/10/2019
CVSS v2 Base Score: 5.8 | Impact Score: 4.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 8.2 | Impact Score: 4.7 | Exploitability Score: 2.8
VMScore: 585
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:N

Vulnerability Summary

Vulnerability in the Oracle WebCenter Sites component of Oracle Fusion Middleware (subcomponent: Advanced UI). Supported versions that are affected are 11.1.1.8.0, 12.2.1.2.0 and 12.2.1.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebCenter Sites. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle WebCenter Sites, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle WebCenter Sites accessible data as well as unauthorized update, insert or delete access to some of Oracle WebCenter Sites accessible data. CVSS 3.0 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N).

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

oracle webcenter sites 12.2.1.3.0

oracle webcenter sites 12.2.1.2.0

oracle webcenter sites 11.1.1.8.0

Exploits

# Exploit Title: Multiple XSS Oracle WebCenter Sites (FatWire Content Server) 7x < 11gR1 # Dork: inurl:Satellite?c # Date: 1812201 # Exploit Author: Richard Alviarez # Vendor Homepage: oraclecom # Version: 7x < 11gR1 # CVE: CVE-2018-2791 # Category: Webapps # Tested on: Kali linux ================================================== ...
Oracle WebCenter versions 7x prior to 11gR1 suffer from multiple cross site scripting vulnerabilities ...

Github Repositories

Oracle WebCenter Sites Vulnerability Scanner

wcs_scanner WebCenter Sites Vulnerability Scanner Scan Oracle WebCenter Sites platform looking for its known vulnerabilities Usage python3 wcs_scannerpy examplecom Example output [!] Start scanning examplecom [*] Using proxies={'http': 'localhost:8080', 'https': 'localhost: