Vulnerabilities > CVE-2010-4417 - Unspecified vulnerability in Oracle Beehive

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
oracle
exploit available
metasploit

Summary

Unspecified vulnerability in the Services for Beehive component in Oracle Fusion Middleware 2.0.1.0, 2.0.1.1, 2.0.1.2, 2.0.1.2.1, and 2.0.1.3 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the January 2011 CPU. Oracle has not commented on claims from a reliable third party coordinator that voice-servlet/prompt-qa/Index.jspf does not properly handle null (%00) bytes in the evaluation parameter that is used in a filename, which allows attackers to create a file with an executable extension and execute arbitrary JSP code.

Exploit-Db

descriptionOracle BeeHive 2 voice-servlet processEvaluation() Vulnerability. CVE-2010-4417. Remote exploit for windows platform
fileexploits/windows/remote/38859.rb
idEDB-ID:38859
last seen2016-02-04
modified2015-12-03
platformwindows
port7777
published2015-12-03
reportermetasploit
sourcehttps://www.exploit-db.com/download/38859/
titleOracle BeeHive 2 voice-servlet processEvaluation Vulnerability
typeremote

Metasploit

descriptionThis module exploits a vulnerability found in Oracle BeeHive. The processEvaluation method found in voice-servlet can be abused to write a malicious file onto the target machine, and gain remote arbitrary code execution under the context of SYSTEM.
idMSF:EXPLOIT/WINDOWS/HTTP/ORACLE_BEEHIVE_EVALUATION
last seen2020-06-10
modified2017-07-24
published2015-11-25
references
reporterRapid7
sourcehttps://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/windows/http/oracle_beehive_evaluation.rb
titleOracle BeeHive 2 voice-servlet processEvaluation() Vulnerability

Packetstorm

data sourcehttps://packetstormsecurity.com/files/download/134613/oracle_beehive_evaluation.rb.txt
idPACKETSTORM:134613
last seen2016-12-05
published2015-12-03
reportermr_me
sourcehttps://packetstormsecurity.com/files/134613/Oracle-BeeHive-2-Code-Execution.html
titleOracle BeeHive 2 Code Execution