Vulnerabilities > CVE-2014-2424 - Remote Code Execution vulnerability in Oracle Fusion Middleware 11.1.1.7.0

047910
CVSS 4.0 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
SINGLE
Confidentiality impact
NONE
Integrity impact
PARTIAL
Availability impact
NONE
network
low complexity
oracle
exploit available
metasploit

Summary

Unspecified vulnerability in the Oracle Event Processing component in Oracle Fusion Middleware 11.1.1.7.0 allows remote authenticated users to affect integrity via vectors related to CEP system.

Vulnerable Configurations

Part Description Count
Application
Oracle
1

Exploit-Db

descriptionOracle Event Processing FileUploadServlet Arbitrary File Upload. CVE-2014-2424. Remote exploit for windows platform
fileexploits/windows/remote/33989.rb
idEDB-ID:33989
last seen2016-02-03
modified2014-07-07
platformwindows
port9002
published2014-07-07
reportermetasploit
sourcehttps://www.exploit-db.com/download/33989/
titleOracle Event Processing FileUploadServlet Arbitrary File Upload
typeremote

Metasploit

descriptionThis module exploits an arbitrary file upload vulnerability in Oracle Event Processing 11.1.1.7.0. The FileUploadServlet component, which requires no authentication, can be abused to upload a malicious file onto an arbitrary location due to a directory traversal flaw, and compromise the server. By default Oracle Event Processing uses a Jetty Application Server without JSP support, which limits the attack to WbemExec. The current WbemExec technique only requires arbitrary write to the file system, but at the moment the module only supports Windows 2003 SP2 or older.
idMSF:EXPLOIT/WINDOWS/HTTP/ORACLE_EVENT_PROCESSING_UPLOAD
last seen2020-06-02
modified2017-07-24
published2014-06-29
references
reporterRapid7
sourcehttps://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/windows/http/oracle_event_processing_upload.rb
titleOracle Event Processing FileUploadServlet Arbitrary File Upload

Packetstorm

data sourcehttps://packetstormsecurity.com/files/download/127365/oracle_event_processing_upload.rb.txt
idPACKETSTORM:127365
last seen2016-12-05
published2014-07-06
reporterrgod
sourcehttps://packetstormsecurity.com/files/127365/Oracle-Event-Processing-FileUploadServlet-Arbitrary-File-Upload.html
titleOracle Event Processing FileUploadServlet Arbitrary File Upload