Vulnerabilities > CVE-2013-1559 - Remote Code Execution vulnerability in Oracle Fusion Middleware 10.1.3.5.1/11.1.1.6.0
Attack vector
NETWORK Attack complexity
LOW Privileges required
SINGLE Confidentiality impact
NONE Integrity impact
NONE Availability impact
PARTIAL Summary
Unspecified vulnerability in the Oracle WebCenter Content component in Oracle Fusion Middleware 10.1.3.5.1 and 11.1.1.6.0 allows remote authenticated users to affect availability via unknown vectors related to Content Server.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 2 |
Exploit-Db
description | Oracle WebCenter Content CheckOutAndOpen.dll ActiveX Remote Code Execution. CVE-2013-1559. Remote exploit for windows platform |
id | EDB-ID:25979 |
last seen | 2016-02-03 |
modified | 2013-06-05 |
published | 2013-06-05 |
reporter | metasploit |
source | https://www.exploit-db.com/download/25979/ |
title | Oracle WebCenter Content CheckOutAndOpen.dll ActiveX Remote Code Execution |
Metasploit
description | This module exploits a vulnerability found in the Oracle WebCenter Content CheckOutAndOpenControl ActiveX. This vulnerability exists in openWebdav(), where user controlled input is used to call ShellExecuteExW(). This module abuses the control to execute an arbitrary HTA from a remote location. This module has been tested successfully with the CheckOutAndOpenControl ActiveX installed with Oracle WebCenter Content 11.1.1.6.0. |
id | MSF:EXPLOIT/WINDOWS/BROWSER/ORACLE_WEBCENTER_CHECKOUTANDOPEN |
last seen | 2020-06-10 |
modified | 2019-08-02 |
published | 2013-06-01 |
references | |
reporter | Rapid7 |
source | https://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/windows/browser/oracle_webcenter_checkoutandopen.rb |
title | Oracle WebCenter Content CheckOutAndOpen.dll ActiveX Remote Code Execution |
Nessus
NASL family | CGI abuses |
NASL id | ORACLE_WEBCENTER_CONTENT_APR_2013_CPU.NASL |
description | The version of Oracle WebCenter Content installed on the remote host is potentially affected by multiple vulnerabilities in the Content Server component. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 69478 |
published | 2013-08-20 |
reporter | This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/69478 |
title | Oracle WebCenter Content (April 2013 CPU) |
code |
|
Packetstorm
data source | https://packetstormsecurity.com/files/download/121848/oracle_webcenter_checkoutandopen.rb.txt |
id | PACKETSTORM:121848 |
last seen | 2016-12-05 |
published | 2013-06-02 |
reporter | rgod |
source | https://packetstormsecurity.com/files/121848/Oracle-WebCenter-Content-CheckOutAndOpen.dll-ActiveX-Remote-Code-Execution.html |
title | Oracle WebCenter Content CheckOutAndOpen.dll ActiveX Remote Code Execution |
Saint
bid | 59122 |
description | Oracle WebCenter Content CheckOutAndOpen.dll ActiveX Control Vulnerability |
osvdb | 92386 |
title | oracle_webcenter_content_checkoutandopendll_openwebdav |
type | client |