Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-h3q5-7899-7pxx

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Oracle Forms 4.5 through 10g starts form executables from arbitrary directories and executes them as the Oracle or System user, which allows attackers to execute arbitrary code by uploading a malicious .fmx file and referencing it using an absolute pathname argument in the (1) form or (2) module parameters to f90servlet.

Oracle Forms 4.5 through 10g starts form executables from arbitrary directories and executes them as the Oracle or System user, which allows attackers to execute arbitrary code by uploading a malicious .fmx file and referencing it using an absolute pathname argument in the (1) form or (2) module parameters to f90servlet.

EPSS

Процентиль: 85%
0.02589
Низкий

Связанные уязвимости

nvd
больше 20 лет назад

Oracle Forms 4.5 through 10g starts form executables from arbitrary directories and executes them as the Oracle or System user, which allows attackers to execute arbitrary code by uploading a malicious .fmx file and referencing it using an absolute pathname argument in the (1) form or (2) module parameters to f90servlet.

EPSS

Процентиль: 85%
0.02589
Низкий