Vulnerabilities > CVE-2010-4417 - Beehive Remote Code Execution vulnerability in Oracle Fusion Middleware

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
oracle
exploit available
metasploit

Summary

Unspecified vulnerability in the Services for Beehive component in Oracle Fusion Middleware 2.0.1.0, 2.0.1.1, 2.0.1.2, 2.0.1.2.1, and 2.0.1.3 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the January 2011 CPU. Oracle has not commented on claims from a reliable third party coordinator that voice-servlet/prompt-qa/Index.jspf does not properly handle null (%00) bytes in the evaluation parameter that is used in a filename, which allows attackers to create a file with an executable extension and execute arbitrary JSP code. Per: http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html 'Oracle Beehive, versions 2.0.1.0, 2.0.1.1, 2.0.1.2, 2.0.1.2.1, 2.0.1.3'

Exploit-Db

descriptionOracle BeeHive 2 voice-servlet processEvaluation() Vulnerability. CVE-2010-4417. Remote exploit for windows platform
fileexploits/windows/remote/38859.rb
idEDB-ID:38859
last seen2016-02-04
modified2015-12-03
platformwindows
port7777
published2015-12-03
reportermetasploit
sourcehttps://www.exploit-db.com/download/38859/
titleOracle BeeHive 2 voice-servlet processEvaluation Vulnerability
typeremote

Metasploit

descriptionThis module exploits a vulnerability found in Oracle BeeHive. The processEvaluation method found in voice-servlet can be abused to write a malicious file onto the target machine, and gain remote arbitrary code execution under the context of SYSTEM.
idMSF:EXPLOIT/WINDOWS/HTTP/ORACLE_BEEHIVE_EVALUATION
last seen2020-06-10
modified2017-07-24
published2015-11-25
references
reporterRapid7
sourcehttps://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/windows/http/oracle_beehive_evaluation.rb
titleOracle BeeHive 2 voice-servlet processEvaluation() Vulnerability

Packetstorm

data sourcehttps://packetstormsecurity.com/files/download/134613/oracle_beehive_evaluation.rb.txt
idPACKETSTORM:134613
last seen2016-12-05
published2015-12-03
reportermr_me
sourcehttps://packetstormsecurity.com/files/134613/Oracle-BeeHive-2-Code-Execution.html
titleOracle BeeHive 2 Code Execution