The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a critical vulnerability impacting Oracle Fusion Middleware, tracked as CVE-2021-35587 (CVSS 3.1 Base Score 9.8), to its Known Exploited Vulnerabilities Catalog.
An unauthenticated attacker with network access via HTTP can exploit the vulnerability to compromise Oracle Access Manager.
“Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Access Manager. Successful attacks of this vulnerability can result in takeover of Oracle Access Manager. CVSS 3.1 Base Score 9.8” states the NIST.
The flaw was reported in March and affects versions 184.108.40.206.0, 220.127.116.11.0 and 18.104.22.168.0. The IT giant fixed the issue in January with the release of the Critical Patch Update.
“This vulnerability was discovered by accident by me and Peterjson while we were analyzing and building PoC for another mega-0day (which is still not fixed by now 😉 ).” reads the post published security researcher Nguyen Jang (Janggggg) who reported the flaw alongside peterjson. “It’s quiet easy to access the entrypoint and exploit the vulnerability, so it’s recommend to apply the patch now! It may give the attacker access to OAM server, to create any user with any privileges, or just get code execution in the victim’s server.”
Below is the video PoC published by Nguyen Jang.
CISA orders federal agencies to fix these vulnerabilities by December 19, 2022.
|[adrotate banner=”9″]||[adrotate banner=”12″]|
(SecurityAffairs – hacking, CISA)