Description: | Summary: Oracle Application Testing Suite is prone to multiple vulnerabilities.
Vulnerability Insight: Multiple flaws are due to:
- An error in the UploadFileAction servlet when fileType parameter is set as '*'.
- Errors within the 'isAllowedUrl' function which has a list of URI entries which do not require authentication.
- An error within the ActionServlet servlet which bypasses authentication if the URI starts with a specific string.
- Another error within ActionServlet servlet.
- An error within the UploadServlet servletin the filename header.
- An error within the DownloadServlet in the reportName parameter.
- An error exists within the DownloadServlet n the repository, workspace, or scenario parameters.
- An error within the DownloadServlet in the scriptName parameter if downloadType is specified as oseScript.
- An error within the DownloadServlet servlet in TMAPReportImage where the downloadType is specified as TMAPReportImage.
- An error within the DownloadServlet servlet in the scheduleReportName parameter where the downloadType is specified as scheduleTaskResults.
- An error within the DownloadServlet servlet in file parameter where the downloadType is specified as subReport.
- An error within the DownloadServlet servlet in the scriptPath parameter where the downloadType is specified as otmPkg.
- An error within the DownloadServlet servlet in the reportName parameter where the downloadType is specified as OTMReport.
- An error within the DownloadServlet servlet in exportFileName parameter where the downloadType is specified as OTMExportFile.
Vulnerability Impact: Successful exploitation will allow remote attackers to bypass authentication, gain access to potentially sensitive files and execute arbitrary code on the affected system.
Affected Software/OS: Oracle Application Testing Suite versions 12.4.0.2 and 12.5.0.2 are known to be affected. Other versions might be affected as well.
Solution: Apply the update from the referenced advisory.
CVSS Score: 6.5
CVSS Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P
|