module
Oracle Application Testing Suite Post-Auth DownloadServlet Directory Traversal
Disclosed | Created |
---|---|
2019-04-16 | 2019-05-24 |
Disclosed
2019-04-16
Created
2019-05-24
Description
This module exploits a vulnerability in Oracle Application Testing Suite (OATS). In the Load
Testing interface, a remote user can abuse the custom report template selector, and cause the
DownloadServlet class to read any file on the server as SYSTEM. Since the Oracle application
contains multiple configuration files that include encrypted credentials, and that there are
public resources for decryption, it is actually possible to gain remote code execution
by leveraging this directory traversal attack.
Please note that authentication is required. By default, OATS has two built-in accounts:
default and administrator. You could try to target those first.
Testing interface, a remote user can abuse the custom report template selector, and cause the
DownloadServlet class to read any file on the server as SYSTEM. Since the Oracle application
contains multiple configuration files that include encrypted credentials, and that there are
public resources for decryption, it is actually possible to gain remote code execution
by leveraging this directory traversal attack.
Please note that authentication is required. By default, OATS has two built-in accounts:
default and administrator. You could try to target those first.
Authors
Steven Seeley
sinn3r sinn3r@metasploit.com
sinn3r sinn3r@metasploit.com
References
Module Options
To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.