ID CVE-2006-7141
Summary Absolute path traversal vulnerability in Oracle Database Server, when utl_file_dir is set to a wildcard value or "CREATE ANY DIRECTORY to PUBLIC" privileges exist, allows remote authenticated users to read and modify arbitrary files via full filepaths to utl_file functions such as (1) utl_file.put_line and (2) utl_file.get_line, a related issue to CVE-2005-0701. NOTE: this issue is disputed by third parties who state that this is due to an insecure configuration instead of an inherent vulnerability
References
Vulnerable Configurations
  • cpe:2.3:a:oracle:database_server:*:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:database_server:*:*:*:*:*:*:*:*
CVSS
Base: 6.0 (as of 11-04-2024 - 00:41)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK MEDIUM SINGLE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:M/Au:S/C:P/I:P/A:P
refmap via4
bugtraq
  • 20061219 Oracle <= 9i / 10g File System Access via utl_file Exploit
  • 20061220 Re: Oracle <= 9i / 10g File System Access via utl_file Exploit
  • 20061221 Re: Oracle <= 9i / 10g File System Access via utl_file Exploit
misc http://www.0xdeadbeef.info/exploits/raptor_orafile.sql
Last major update 11-04-2024 - 00:41
Published 07-03-2007 - 20:19
Last modified 11-04-2024 - 00:41
Back to Top