CVE-2006-7141

Current Description

** DISPUTED ** Absolute path traversal vulnerability in Oracle Database Server, when utl_file_dir is set to a wildcard value or "CREATE ANY DIRECTORY to PUBLIC" privileges exist, allows remote authenticated users to read and modify arbitrary files via full filepaths to utl_file functions such as (1) utl_file.put_line and (2) utl_file.get_line, a related issue to CVE-2005-0701. NOTE: this issue is disputed by third parties who state that this is due to an insecure configuration instead of an inherent vulnerability.

Referenced by CVEs:CVE-2008-6065

Basic Data

PublishedMarch 07, 2007
Last ModifiedOctober 16, 2018
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeNVD-CWE-Other
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:N/AC:M/Au:S/C:P/I:P/A:P
CVSS 2 - Access VectorNETWORK
CVSS 2 - Access ComplexityMEDIUM
CVSS 2 - AuthenticationSINGLE
CVSS 2 - Confidentiality ImpactPARTIAL
CVSS 2 - Availability ImpactPARTIAL
CVSS 2 - Base Score6.0
SeverityMEDIUM
Exploitability Score6.8
Impact Score6.4
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationOracleDatabase Server********

Vulnerable Software List

VendorProductVersions
Oracle Database Server *

References

NameSourceURLTags
http://www.0xdeadbeef.info/exploits/raptor_orafile.sqlhttp://www.0xdeadbeef.info/exploits/raptor_orafile.sqlMISCExploit
20061219 Oracle <= 9i / 10g File System Access via utl_file Exploithttp://www.securityfocus.com/archive/1/454862/100/0/threadedBUGTRAQ
20061220 Re: Oracle <= 9i / 10g File System Access via utl_file Exploithttp://www.securityfocus.com/archive/1/454964/100/0/threadedBUGTRAQ
20061221 Re: Oracle <= 9i / 10g File System Access via utl_file Exploithttp://www.securityfocus.com/archive/1/455047/100/0/threadedBUGTRAQ