POSTED BY: Dimitrios Glynos / 12.05.2014

Oracle WebCenter information exposure vulnerability

CENSUS ID:CENSUS-2014-0001
CVE ID:CVE-2014-0450
Oracle Tracking #:S0388414 (CPUApr2014)
Affected Products:Oracle Fusion Middleware (versions 11.1.1.7 and 11.1.1.8)
Class:Information Exposure (CWE-200), Privacy Violation (CWE-359)
Remote:Yes
Discovered by:Alex Zaharis
Researched by:Alex Zaharis, Patroklos Argyroudis

The Oracle WebCenter portal component in Oracle Fusion Middleware (versions 11.1.1.7 and 11.1.1.8) is vulnerable to an information exposure vulnerability. A malicious user may utilize this vulnerability to gain unauthenticated access to the list of valid usernames of the system, the users’ personal information and files linked to the users’ profiles.

Details

Oracle WebCenter is a platform for building web applications, web portals and collaboration web sites. It is owned and developed by Oracle targeting the enterprise portal market.

We have discovered an information exposure vulnerability in the Oracle WebCenter portal component in Oracle Fusion Middleware (versions 11.1.1.7 and 11.1.1.8) that leads to disclosure of user information. Specifically, an unauthenticated attacker can retrieve all information related to the users of the platform via a default user account of the Oracle WebCenter installation. This includes usernames, emails, phone numbers and files linked to the users’ profiles.

The attack can be achieved via the following steps:

1. The attacker visits the following URL on the target Oracle WebCenter installation (URL edited for readability):

http://www.vulnsite.com/webcenter/faces/oracle/webcenter/page/
scopedMD/s8bba98ff_4cbb_40b8_beee_296c916a23ed/businessRolePages/
UserProfileMainView.jspx?immediate=true&wc.username=weblogic

2. The attacker has now gained unauthenticated access to the Oracle WebCenter backend interface as the default user “weblogic”. From the backend interface the attacker may then navigate to the “Documents” tab.

3. In the “Filter” field the attacker selects “Advanced” as illustrated in the following screenshot.

4. The attacker then clicks the binoculars icon next to the “Created By” field.

5. In the search field the attacker enters “*” and retrieves the complete list of the system’s usernames along with emails and phone numbers, as shown in the following screenshot:

Moreover, once the list of all valid usernames has been retrieved, an attacker will be able to gain unauthenticated read access to files linked to each user profile on the Oracle WebCenter installation via the following URL (edited for readability):

http://www.vulnsite.com/webcenter/faces/oracle/webcenter/page/
scopedMD/s8bba98ff_4cbb_40b8_beee_296c916a23ed/businessRolePages/
UserProfileMainView.jspx?immediate=true&wc.username=<valid_username>

Oracle has responded to this advisory with an update to WebCenter included in the Critical Patch Update Advisory — April 2014. Administrators of affected installations are advised to proceed with the Critical Patch Update patch.

Disclosure Timeline

Discovery:August 20th, 2013
Vendor Contact:August 22nd, 2013
CVE Assignment:December 12th, 2013
Public Disclosure:April 15th, 2014