Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
PARTIAL Availability impact
PARTIAL network
low complexity
oracle
exploit available
metasploit
Published: 2011-01-19
Updated: 2017-08-17
Summary
Unspecified vulnerability in the Services for Beehive component in Oracle Fusion Middleware 2.0.1.0, 2.0.1.1, 2.0.1.2, 2.0.1.2.1, and 2.0.1.3 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the January 2011 CPU. Oracle has not commented on claims from a reliable third party coordinator that voice-servlet/prompt-qa/Index.jspf does not properly handle null (%00) bytes in the evaluation parameter that is used in a filename, which allows attackers to create a file with an executable extension and execute arbitrary JSP code. Per: http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html 'Oracle Beehive, versions 2.0.1.0, 2.0.1.1, 2.0.1.2, 2.0.1.2.1, 2.0.1.3'
Vulnerable Configurations
Part | Description | Count |
Application | Oracle | 5 |
Exploit-Db
description | Oracle BeeHive 2 voice-servlet processEvaluation() Vulnerability. CVE-2010-4417. Remote exploit for windows platform |
file | exploits/windows/remote/38859.rb |
id | EDB-ID:38859 |
last seen | 2016-02-04 |
modified | 2015-12-03 |
platform | windows |
port | 7777 |
published | 2015-12-03 |
reporter | metasploit |
source | https://www.exploit-db.com/download/38859/ |
title | Oracle BeeHive 2 voice-servlet processEvaluation Vulnerability |
type | remote |