Security restrictions bypass in Oracle Adaptive Access Manager - CVE-2018-2770
Published: April 19, 2018
Vulnerability identifier: #VU11925
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:H/VI:L/VA:N/SC:H/SI:L/SA:N/E:U/U:Clear
CVE-ID: CVE-2018-2770
CWE-ID: CWE-264
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vendor: Oracle
Affected software:
Oracle Adaptive Access Manager
Oracle Adaptive Access Manager
Detailed vulnerability description
The vulnerability allows a remote authenticated attacker to obtain potentially sensitive information and write arbitrary files on the target system.
The weakness exists in the Oracle Adaptive Access Manager component of Oracle Fusion Middleware due to improper security restrictions. A remote attacker can trick the victim into opening a specially crafted file, gain unauthorized access to critical data or complete access to all Oracle Adaptive Access Manager accessible data and unauthorized update, insert or delete access to some of Oracle Adaptive Access Manager accessible data.
The weakness exists in the Oracle Adaptive Access Manager component of Oracle Fusion Middleware due to improper security restrictions. A remote attacker can trick the victim into opening a specially crafted file, gain unauthorized access to critical data or complete access to all Oracle Adaptive Access Manager accessible data and unauthorized update, insert or delete access to some of Oracle Adaptive Access Manager accessible data.
How to mitigate CVE-2018-2770
Install update from vendor's website.