HTTP: Oracle Secure Backup Administration Command Injection
This signature detects attempts to exploit a known vulnerability in Oracle Secure Backup. It is due to an insufficient sanitizing when handling the $selector variable. A remote authenticated attacker can exploit this vulnerability by sending a specially crafted HTTP request to the index.php on the target server. Successful exploitation of this can allow a remote authenticated attacker to execute arbitrary commands under the credentials of the SYSTEM account.
Extended Description
Oracle Secure Backup is prone to a remote vulnerability. The vulnerability can be exploited over the 'HTTP' protocol. For an exploit to succeed, the attacker must have 'Valid Session' privileges. This vulnerability affects the following supported versions: 10.3.0.1
Affected Products
Oracle secure_backup
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3
Oracle
9.0