Check Point Reference: | CPAI-2015-1121 |
Date Published: | 30 Sep 2015 |
Severity: | Medium |
Last Updated: | Thursday 01 October, 2015 |
Source: | Oracle |
Industry Reference: | CVE-2015-2606 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | Oracle Endeca Information Discovery Integrator ETL Server 3.1.1 and prior |
Vulnerability Description | A directory traversal vulnerability exists in Oracle Endeca Information Discovery Integrator ETL Server. The vulnerability is due to insufficient input validation while processing SOAP requests to the RenameFile operation. By sending crafted SOAP requests to the target system, a remote authenticated attacker can leverage this vulnerability to rename and move arbitrary files on a target system with System privileges. This can further lead to information disclosure and eventually arbitrary code execution. |
This protection will detect and block attempts to exploit this vulnerability.
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: Oracle Protection Violation.
Attack Information: Oracle Endeca Information Discovery Integrator ETL Server RenameFile Directory Traversal