"Researchers: Oracle Took 6 Months to Patch 'Mega' Vulnerability Affecting Many Systems"

Security researchers PeterJson of VNG Corporation and Nguyen Jang of VNPT have published technical details on a critical Fusion Middleware vulnerability that Oracle took six months to patch.  Tracked as CVE-2022–21445 (CVSS score of 9.8), the vulnerability is described as a deserialization of untrusted data, which could be exploited to achieve arbitrary code execution.  The researchers noted that identified in the ADF Faces component, the issue can be exploited remotely, without authentication.  The researchers reported the vulnerability to Oracle in October 2021, and Oracle released a fix as part of its April 2022 Critical Patch Update six months after the initial report.  According to the researchers, the pre-authentication RCE issue, which they described as a “mega” vulnerability, impacts all applications that rely on ADF Faces, including Business Intelligence, Enterprise Manager, Identity Management, SOA Suite, WebCenter Portal, Application Testing Suite, and Transportation Management.  The researchers also discovered CVE-2022–21497 (CVSS score of 8.1), a server-side request forgery (SSRF) vulnerability that could be chained with CVE-2022–21445 to achieve pre-authentication remote code execution in Oracle Access Manager, a component used for SSO in numerous Oracle online services.  The researchers named their attack  “The Miracle Exploit” and said that all of Oracle’s online systems and cloud services that rely on ADF Faces are impacted.   They also noted that any website that uses the ADF Faces framework is vulnerable.

 

SecurityWeek reports: "Researchers: Oracle Took 6 Months to Patch 'Mega' Vulnerability Affecting Many Systems"

Submitted by Anonymous on