ID |
CVE-2006-7141
|
Summary |
Absolute path traversal vulnerability in Oracle Database Server, when utl_file_dir is set to a wildcard value or "CREATE ANY DIRECTORY to PUBLIC" privileges exist, allows remote authenticated users to read and modify arbitrary files via full filepaths to utl_file functions such as (1) utl_file.put_line and (2) utl_file.get_line, a related issue to CVE-2005-0701. NOTE: this issue is disputed by third parties who state that this is due to an insecure configuration instead of an inherent vulnerability |
References |
|
Vulnerable Configurations |
|
CVSS |
Base: | 6.0 (as of 11-04-2024 - 00:41) |
Impact: | |
Exploitability: | |
|
CWE |
NVD-CWE-Other |
CAPEC |
|
Access |
Vector | Complexity | Authentication |
NETWORK |
MEDIUM |
SINGLE |
|
Impact |
Confidentiality | Integrity | Availability |
PARTIAL |
PARTIAL |
PARTIAL |
|
cvss-vector
via4
|
AV:N/AC:M/Au:S/C:P/I:P/A:P
|
refmap
via4
|
bugtraq | - 20061219 Oracle <= 9i / 10g File System Access via utl_file Exploit
- 20061220 Re: Oracle <= 9i / 10g File System Access via utl_file Exploit
- 20061221 Re: Oracle <= 9i / 10g File System Access via utl_file Exploit
| misc | http://www.0xdeadbeef.info/exploits/raptor_orafile.sql |
|
Last major update |
11-04-2024 - 00:41 |
Published |
07-03-2007 - 20:19 |
Last modified |
11-04-2024 - 00:41 |