Oracle Primavera Contract Management 13.1/14.0 Web Access commons-beanutils-1.8.0.jar this input validation
CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
---|---|---|
6.0 | $0-$5k | 0.00 |
A vulnerability, which was classified as critical, was found in Oracle Primavera Contract Management 13.1/14.0. This affects an unknown part in the library lib/commons-beanutils-1.8.0.jar of the component Web Access. The manipulation of the argument this
with an unknown input leads to a input validation vulnerability. CWE is classifying the issue as CWE-20. The product receives input or data, but it does
not validate or incorrectly validates that the input has the
properties that are required to process the data safely and
correctly. This is going to have an impact on confidentiality, integrity, and availability. The summary by CVE is:
Apache Commons BeanUtils, as distributed in lib/commons-beanutils-1.8.0.jar in Apache Struts 1.x through 1.3.10 and in other products requiring commons-beanutils through 1.9.2, does not suppress the class property, which allows remote attackers to "manipulate" the ClassLoader and execute arbitrary code via the class parameter, as demonstrated by the passing of this parameter to the getClass method of the ActionForm object in Struts 1.
The weakness was disclosed 10/15/2014 as Oracle Critical Patch Update Advisory - October 2014 as confirmed advisory (Website). The advisory is shared at oracle.com. This vulnerability is uniquely identified as CVE-2014-0114 since 12/03/2013. The exploitability is told to be easy. It is possible to initiate the attack remotely. A authentication is necessary for exploitation. Technical details are known, but no exploit is available.
It is declared as highly functional. We expect the 0-day to have been worth approximately $5k-$25k. The vulnerability scanner Nessus provides a plugin with the ID 73922 (CentOS 5 : struts (CESA-2014:0474)), which helps to determine the existence of the flaw in a target environment. It is assigned to the family CentOS Local Security Checks. The commercial vulnerability scanner Qualys is able to test this issue with plugin 87268 (Oracle WebLogic Server Multiple Unspecified Vulnerabilities (CPUOCT2014)).
Upgrading eliminates this vulnerability. A possible mitigation has been published immediately after the disclosure of the vulnerability.
The vulnerability is also documented in the vulnerability database at Tenable (73922). Further details are available at krebsonsecurity.com. The entries 13086, 67115, 67116 and 67117 are pretty similar.
Product
Vendor
Name
Version
License
CPE 2.3
CPE 2.2
CVSSv4
VulDB CVSS-B Score: 🔍VulDB CVSS-BT Score: 🔍
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 6.3VulDB Meta Temp Score: 6.0
VulDB Base Score: 6.3
VulDB Temp Score: 6.0
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
AV | AC | Au | C | I | A |
---|---|---|---|---|---|
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
---|---|---|---|---|---|
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Input validationCWE: CWE-20
ATT&CK: Unknown
Local: No
Remote: Yes
Availability: 🔍
Status: Highly functional
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
0-Day | unlock | unlock | unlock | unlock |
---|---|---|---|---|
Today | unlock | unlock | unlock | unlock |
Nessus ID: 73922
Nessus Name: CentOS 5 : struts (CESA-2014:0474)
Nessus File: 🔍
Nessus Risk: 🔍
Nessus Family: 🔍
Nessus Port: 🔍
OpenVAS ID: 702940
OpenVAS Name: Debian Security Advisory DSA 2940-1 (libstruts1.2-java - security update)
OpenVAS File: 🔍
OpenVAS Family: 🔍
Qualys ID: 🔍
Qualys Name: 🔍
MetaSploit ID: struts_code_exec_classloader.rb
MetaSploit Name: Apache Struts ClassLoader Manipulation Remote Code Execution
MetaSploit File: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
Reaction Time: 🔍
Exposure Time: 🔍
Timeline
12/03/2013 🔍04/03/2014 🔍
04/30/2014 🔍
05/09/2014 🔍
10/15/2014 🔍
10/15/2014 🔍
10/15/2014 🔍
02/22/2022 🔍
Sources
Vendor: oracle.comAdvisory: Oracle Critical Patch Update Advisory - October 2014
Status: Confirmed
Confirmation: 🔍
CVE: CVE-2014-0114 (🔍)
OVAL: 🔍
IAVM: 🔍
SecurityFocus: 66615 - Oracle Identity Manager 'backUrl' Parameter URL Redirection Vulnerability
Secunia: 58851
Misc.: 🔍
See also: 🔍
Entry
Created: 10/15/2014 13:40Updated: 02/22/2022 19:14
Changes: 10/15/2014 13:40 (78), 08/23/2017 11:42 (2), 02/22/2022 19:14 (3)
Complete: 🔍
No comments yet. Languages: en.
Please log in to comment.