|Oracle Tracking #:||S0388414 (CPUApr2014)|
|Affected Products:||Oracle Fusion Middleware (versions 126.96.36.199 and 188.8.131.52)|
|Class:||Information Exposure (CWE-200), Privacy Violation (CWE-359)|
|Discovered by:||Alex Zaharis|
|Researched by:||Alex Zaharis, Patroklos Argyroudis|
The Oracle WebCenter portal component in Oracle Fusion Middleware (versions 184.108.40.206 and 220.127.116.11) is vulnerable to an information exposure vulnerability. A malicious user may utilize this vulnerability to gain unauthenticated access to the list of valid usernames of the system, the users’ personal
information and files linked to the users’ profiles.
Oracle WebCenter is a platform for building web applications, web portals and
collaboration web sites. It is owned and developed by Oracle targeting the enterprise portal market.
We have discovered an information exposure vulnerability in the Oracle WebCenter portal component in Oracle Fusion Middleware (versions 18.104.22.168 and 22.214.171.124) that leads to disclosure of user information.
Specifically, an unauthenticated attacker can retrieve all information related
to the users of the platform via a default user account of the Oracle WebCenter installation.
This includes usernames, emails, phone numbers and files linked to the
The attack can be achieved via the following steps:
1. The attacker visits the following URL on the target Oracle WebCenter installation (URL edited for readability):
2. The attacker has now gained unauthenticated access to the Oracle WebCenter backend interface
as the default user “weblogic”. From the backend interface the attacker may then
navigate to the “Documents” tab.
3. In the “Filter” field the attacker selects “Advanced” as illustrated
in the following screenshot.
4. The attacker then clicks the binoculars icon next to the “Created By” field.
5. In the search field the attacker enters “*” and retrieves the complete list
of the system’s usernames along with emails and phone numbers, as shown in the
Moreover, once the list of all valid usernames has been retrieved,
an attacker will be able to gain unauthenticated read access to files linked to each user profile
on the Oracle WebCenter installation via the following URL (edited for readability):
Oracle has responded to this advisory with an update to WebCenter included in the Critical Patch Update Advisory — April 2014. Administrators of affected installations
are advised to proceed with the Critical Patch Update patch.
|Discovery:||August 20th, 2013|
|Vendor Contact:||August 22nd, 2013|
|CVE Assignment:||December 12th, 2013|
|Public Disclosure:||April 15th, 2014|