Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2012-3153 | First vendor Publication | 2012-10-16 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:N) | |||
---|---|---|---|
Cvss Base Score | 6.4 | Attack Range | Network |
Cvss Impact Score | 4.9 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Unspecified vulnerability in the Oracle Reports Developer component in Oracle Fusion Middleware 11.1.1.4, 11.1.1.6, and 11.1.2.0 allows remote attackers to affect confidentiality and integrity via unknown vectors related to Servlet. NOTE: the previous information is from the October 2012 CPU. Oracle has not commented on claims from the original researcher that the PARSEQUERY function allows remote attackers to obtain database credentials via reports/rwservlet/parsequery, and that this issue occurs in earlier versions. NOTE: this can be leveraged with CVE-2012-3152 to execute arbitrary code by uploading a .jsp file. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3153 |
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 3 |
ExploitDB Exploits
id | Description |
---|---|
2014-02-18 | Oracle Forms and Reports Remote Code Execution |
2014-01-29 | Oracle Forms and Reports 11.1 - Remote Exploit |
Snort® IPS/IDS
Date | Description |
---|---|
2017-08-23 | Oracle Reports Servlet information disclosure attempt RuleID : 43662 - Revision : 2 - Type : SERVER-ORACLE |
2017-08-23 | Oracle Reports Servlet information disclosure attempt RuleID : 43661 - Revision : 2 - Type : SERVER-ORACLE |
2014-03-22 | Oracle Reports server remote code execution attempt RuleID : 29871 - Revision : 5 - Type : SERVER-ORACLE |
2014-01-10 | Oracle Reports Servlet information disclosure attempt RuleID : 24597 - Revision : 2 - Type : SERVER-ORACLE |
2014-01-10 | Oracle Reports Servlet information disclosure attempt RuleID : 24596 - Revision : 2 - Type : SERVER-ORACLE |
Metasploit Database
id | Description |
---|---|
2014-01-15 | Oracle Forms and Reports Remote Code Execution |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2014-03-20 | Name : The remote web server hosts a web application that has a file access vulnerab... File : oracle_reports_file_access.nasl - Type : ACT_ATTACK |
2014-03-20 | Name : The remote host is running a web application that exposes database credentials. File : oracle_reports_password_disclosure.nasl - Type : ACT_ATTACK |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 22:59:20 |
|
2024-11-28 12:30:32 |
|
2021-05-04 12:20:46 |
|
2021-04-22 01:24:47 |
|
2020-05-23 13:17:00 |
|
2020-05-23 00:34:04 |
|
2017-08-29 09:23:54 |
|
2016-03-04 05:23:48 |
|
2016-03-04 01:34:15 |
|
2014-03-22 21:20:52 |
|
2014-03-21 13:21:25 |
|
2014-02-19 17:18:48 |
|
2014-02-17 17:18:58 |
|
2014-02-07 13:19:58 |
|
2014-01-30 17:18:45 |
|
2014-01-19 21:28:48 |
|
2013-10-11 13:24:11 |
|
2013-05-10 22:41:33 |
|