HTTP: Oracle Secure Backup Administration Command Injection

This signature detects attempts to exploit a known vulnerability in Oracle Secure Backup. It is due to an insufficient sanitizing when handling the $selector variable. A remote authenticated attacker can exploit this vulnerability by sending a specially crafted HTTP request to the index.php on the target server. Successful exploitation of this can allow a remote authenticated attacker to execute arbitrary commands under the credentials of the SYSTEM account.

Extended Description

Oracle Secure Backup is prone to a remote vulnerability. The vulnerability can be exploited over the 'HTTP' protocol. For an exploit to succeed, the attacker must have 'Valid Session' privileges. This vulnerability affects the following supported versions: 10.3.0.1

Affected Products

Oracle secure_backup

Short Name
HTTP:ORACLE:BACKUP-CMD-INJ
Severity
Critical
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
Administration Backup CVE-2010-0906 Command Injection Oracle Secure bid:41597
Release Date
10/01/2010
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3336
False Positive
Unknown
Vendors

Oracle

CVSS Score

9.0

Found a potential security threat?