Vulnerabilities > CVE-2016-0491 - Remote Code Execution vulnerability in Oracle Application Testing Suite 12.4.0.2/12.5.0.2

047910
CVSS 6.4 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
oracle
exploit available
metasploit

Summary

Unspecified vulnerability in the Oracle Application Testing Suite component in Oracle Enterprise Manager Grid Control 12.4.0.2 and 12.5.0.2 allows remote attackers to affect integrity and availability via unknown vectors related to Load Testing for Web Apps. NOTE: the previous information is from the January 2016 CPU. Oracle has not commented on third-party claims that the UploadFileAction servlet allows remote authenticated users to upload and execute arbitrary files via an * (asterisk) character in the fileType parameter.

Vulnerable Configurations

Part Description Count
Application
Oracle
2

D2sec

nameOracle Application Testing Suite 12.4.0.2.0 File Upload
urlhttp://www.d2sec.com/exploits/oracle_application_testing_suite_12.4.0.2.0_file_upload.html

Exploit-Db

  • descriptionOracle ATS Arbitrary File Upload. CVE-2016-0491,CVE-2016-0492. Remote exploit for java platform
    fileexploits/java/remote/39852.rb
    idEDB-ID:39852
    last seen2016-05-25
    modified2016-05-25
    platformjava
    port8088
    published2016-05-25
    reportermetasploit
    sourcehttps://www.exploit-db.com/download/39852/
    titleOracle ATS Arbitrary File Upload
    typeremote
  • descriptionOracle Application Testing Suite 12.4.0.2.0 - Authentication Bypass and Arbitrary File Upload Exploit. CVE-2016-0491,CVE-2016-0492. Webapps exploit for jsp p...
    fileexploits/jsp/webapps/39691.py
    idEDB-ID:39691
    last seen2016-04-13
    modified2016-04-13
    platformjsp
    port8088
    published2016-04-13
    reporterZhou Yu
    sourcehttps://www.exploit-db.com/download/39691/
    titleOracle Application Testing Suite 12.4.0.2.0 - Authentication Bypass and Arbitrary File Upload Exploit
    typewebapps

Metasploit

descriptionThis module exploits an authentication bypass and arbitrary file upload in Oracle Application Testing Suite (OATS), version 12.4.0.2.0 and unknown earlier versions, to upload and execute a JSP shell.
idMSF:EXPLOIT/MULTI/HTTP/ORACLE_ATS_FILE_UPLOAD
last seen2020-06-10
modified2019-02-25
published2016-04-25
references
reporterRapid7
sourcehttps://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/multi/http/oracle_ats_file_upload.rb
titleOracle ATS Arbitrary File Upload