Oracle PeopleSoft Enterprise 8.46 PeopleTools Remote Code Execution
| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 9.3 | $0-$5k | 0.00 |
Summary
A vulnerability classified as very critical has been found in Oracle PeopleSoft Enterprise 8.46. Impacted is an unknown function of the component PeopleTools. Performing a manipulation results in Remote Code Execution. This vulnerability is cataloged as CVE-2006-5375. Furthermore, there is an exploit available.
Details
A vulnerability was found in Oracle PeopleSoft Enterprise 8.46 (Enterprise Resource Planning Software). It has been classified as very critical. This affects some unknown processing of the component PeopleTools. The manipulation with an unknown input leads to a remote code execution vulnerability. This is going to have an impact on confidentiality, integrity, and availability. The summary by CVE is:
Multiple unspecified vulnerabilities in PeopleTools component in Oracle PeopleSoft Enterprise 8.46 GA, 8.47 GA, 8.48 GA, 8.46.15, 8.47.09, and 8.48.03 have unknown impact and remote attack vectors, aka Vuln# (1) PSE01, (2) PSE02, and (3) PSE03.
The weakness was shared 10/17/2006 by Esteban Martinez Fayo (Alex) with Application Security, Inc. (Website). The advisory is shared at us-cert.gov. This vulnerability is uniquely identified as CVE-2006-5375 since 10/17/2006. The exploitability is told to be easy. It is possible to initiate the attack remotely. No form of authentication is needed for exploitation. Technical details are unknown but a public exploit is available. The price for an exploit might be around USD $0-$5k at the moment (estimation calculated on 07/10/2019).
The exploit is shared for download at securityfocus.com. It is declared as proof-of-concept. We expect the 0-day to have been worth approximately $25k-$100k.
There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product. Furthermore it is possible to detect and prevent this kind of attack with TippingPoint and the filter 9066.
The vulnerability is also documented in the databases at SecurityFocus (BID 20588†), OSVDB (31384†), Secunia (SA22396†), SecurityTracker (ID 1017077†) and Vulnerability Center (SBV-12952†). The entries VDB-2615, VDB-2614, VDB-33021 and VDB-32832 are related to this item. If you want to get the best quality for vulnerability data then you always have to consider VulDB.
Product
Type
Vendor
Name
Version
License
Website
- Vendor: https://www.oracle.com
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 9.8VulDB Meta Temp Score: 9.3
VulDB Base Score: 9.8
VulDB Temp Score: 9.3
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Remote Code ExecutionCWE: Unknown
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Access: Public
Status: Proof-of-Concept
Download: 🔍
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: no mitigation knownStatus: 🔍
0-Day Time: 🔍
TippingPoint: 🔍
SourceFire IPS: 🔍
Timeline
10/17/2006 🔍10/17/2006 🔍
10/17/2006 🔍
10/17/2006 🔍
10/17/2006 🔍
10/17/2006 🔍
10/18/2006 🔍
10/19/2006 🔍
03/12/2015 🔍
07/10/2019 🔍
Sources
Vendor: oracle.comAdvisory: us-cert.gov
Researcher: Esteban Martinez Fayo (Alex)
Organization: Application Security, Inc.
Status: Confirmed
Confirmation: 🔍
CVE: CVE-2006-5375 (🔍)
GCVE (CVE): GCVE-0-2006-5375
GCVE (VulDB): GCVE-100-32829
SecurityFocus: 20588 - Oracle October 2006 Security Update Multiple Vulnerabilities
Secunia: 22396 - Oracle Products Multiple Vulnerabilities, Highly Critical
OSVDB: 31384 - Oracle PeopleSoft PeopleTools Unspecified Authenticated HTTP Complete Compromise
SecurityTracker: 1017077
Vulnerability Center: 12952 - Oracle Critical Patch Update Oct2006- Unspecified Vulnerabilities in PeopleSoft Enterprise, High
Vupen: ADV-2006-4065
scip Labs: https://www.scip.ch/en/?labs.20161013
See also: 🔍
Entry
Created: 03/12/2015 22:21Updated: 07/10/2019 07:26
Changes: 03/12/2015 22:21 (73), 07/10/2019 07:26 (3)
Complete: 🔍
Cache ID: 216:C2A:103
If you want to get the best quality for vulnerability data then you always have to consider VulDB.
No comments yet. Languages: en.
Please log in to comment.