How to detect the vulnerability-CVE-2020-14723?
Posted on 3rd Sep, 2020 | By Bhavithra
A new zero-day vulnerability, CVE-2020-14723, was discovered by Cyber Security Works in Oracle Help Technologies related to the Web UIX component. CVE-2020-14723 has a base score of 5.8 and an exploitability score of 8.6 in the CVSSv2 vulnerability severity scale. This vulnerability was discovered in our research lab on January 11, 2020, and we found that it has affected geographic locations such as the United States, Ireland, Germany, Netherlands, and Brazil.
You can use the following script to detect this vulnerability -
Python 2.7+ Required
Multi os support
- Python pip install -r requirements.txt - Please install necessary modules
- Scanning IPs have to be added in a text file saved as IP.txt under the same script executing folder.
- Payloads.txt - The default text file has to be present in the same folder and if users want to check with other payload types for Firewall bypass they can add in this file as per need.
- Once both the txt are present, The script can be executed directly from the command line Python Oracle.py
- The script will send an HTTP request to the IPs present in the IP list file and examine the response for the presence of the vulnerability.
- Post the validation and completion of the script for the list of IPs provided, an excel file will be generated automatically with the output - Results.xls
- The Generated Excel Sheet will have the details of the vulnerable and not vulnerable hosts for the CVE-2020-14723.
CVE-2020-14723 was detected using an IAST tool to capture the Request, which showed that a simple payload reflects in Response.
The vulnerability was disclosed to Oracle in January 2020. The vendor responded and released a patch in June 2020 to mitigate this vulnerability.
|Jan 11, 2020||
Discovered in our research lab
|Jan 12, 2020||
Reported to Oracle
|Jun 23, 2020||Oracle notified that the issue is addressed in the main code line and scheduled a future CPU - Critical Patch Update Releases.|
|Jul 14, 2020||The date of public disclosure|
|Jul 15, 2020||Published in NVD|
|Jul 20, 2020||Last modified on NVD|
|Oracle||Help Technologies||188.8.131.52.0, 184.108.40.206.0|
CVE-2020-14723 is a vulnerability in the Oracle Help Technologies product of Oracle Fusion Middleware (component: Web UIX). Supported versions that are affected are 220.127.116.11.0 and 18.104.22.168.0.
Proof of Concept
|Product||Oracle Web Content Management|
|Privilege||Any user who has access to the Help Page|
Steps to Reproduce:
Step 1: Click on the Help docs page in the Oracle Web content.
Step 2: Navigate to any of the help topics shown below and intercept using the proxy tool (Burp).
Step 3: Capturing the Request and a simple Payload reflects in the Response without sanitization.
Step 4: While triggering the Print page event, the payload gets stored and is assigned with the path URL. Whenever the user clicks the print page, the payload will be automatically executed in the user’s browser.
Oracle recommends that customers apply the Critical Patch Update July 2020 to the Oracle Database components of Oracle Fusion Middleware products. Click this link for the patch updates: https://www.oracle.com/security-alerts/cpujul2020.html
If this vulnerability is exploited successfully, it may result in the blocking of network protocols and may break application functionality. It may also result in unauthorized access to critical data, complete access to Oracle Help Technologies’ accessible data, unauthorized updates (insert or delete access to Oracle Help Technologies accessible data).
Based on the CSW team's recommendations, Oracle strongly advised its customers to remain on actively supported versions and apply critical security patches without delay.
Test your defense to know how secure you are… Signup for free pentesting service*
* A limited period offer