Skip to content

Oracle Access Manager - Remote Code Execution

ID: CVE-2021-35587

Severity: critical

Author: cckuailong

Tags: cve2021,cve,oam,rce,java,unauth,oracle,kev

The Oracle Access Manager portion of Oracle Fusion Middleware (component: OpenSSO Agent) is vulnerable to remote code execution. Supported versions that are affected are 11.1.2.3.0, 12.2.1.3.0 and 12.2.1.4.0. This is an easily exploitable vulnerability that allows unauthenticated attackers with network access via HTTP to compromise Oracle Access Manager.

id: CVE-2021-35587
info:
name: Oracle Access Manager - Remote Code Execution
author: cckuailong
severity: critical
description: |
The Oracle Access Manager portion of Oracle Fusion Middleware (component: OpenSSO Agent) is vulnerable to remote code execution. Supported versions that are affected are 11.1.2.3.0, 12.2.1.3.0 and 12.2.1.4.0. This is an easily exploitable vulnerability that allows unauthenticated attackers with network access via HTTP to compromise Oracle Access Manager.
impact: |
Successful exploitation of this vulnerability could allow an attacker to execute arbitrary code on the affected system.
remediation: |
Apply the latest security patches provided by Oracle to mitigate this vulnerability.
reference:
- https://testbnull.medium.com/oracle-access-manager-pre-auth-rce-cve-2021-35587-analysis-1302a4542316
- https://nvd.nist.gov/vuln/detail/CVE-2021-35587
- https://www.oracle.com/security-alerts/cpujan2022.html
- https://github.com/ARPSyndicate/kenzer-templates
- https://github.com/GrrrDog/Java-Deserialization-Cheat-Sheet
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2021-35587
cwe-id: CWE-502
epss-score: 0.95643
epss-percentile: 0.99283
cpe: cpe:2.3:a:oracle:access_manager:11.1.2.3.0:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
vendor: oracle
product: access_manager
shodan-query:
- http.title:"Oracle Access Management"
- http.title:"oracle access management"
- http.html:"/oam/pages/css/login_page.css"
fofa-query:
- body="/oam/pages/css/login_page.css"
- title="oracle access management"
google-query: intitle:"oracle access management"
tags: cve2021,cve,oam,rce,java,unauth,oracle,kev
http:
- method: GET
path:
- '{{BaseURL}}/oam/server/opensso/sessionservice'
matchers-condition: and
matchers:
- type: word
part: header
words:
- "x-oracle-dms-ecid"
- "x-oracle-dms-rid"
case-insensitive: true
condition: or
- type: word
part: body
words:
- "/oam/pages/css/general.css"
- type: status
status:
- 200
# digest: 4a0a00473045022100d275ba1d55f9ae486d9d5f81411a597e82b6fcd8d84597c38b5ec73c0d88be0202201b145b0ac5a731020c4cfccaadec94b796e0ac225086a61c2baa738e73c21a2f:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/cves/2021/CVE-2021-35587.yaml"

View on Github