Unspecified vulnerability in the Oracle Application Testing Suite component in Oracle Enterprise Manager Grid Control and allows remote attackers to affect confidentiality and integrity via unknown vectors related to Load Testing for Web Apps, a different vulnerability than CVE-2016-0488. NOTE: the previous information is from the January 2016 CPU. Oracle has not commented on third-party claims that this is a directory traversal vulnerability in the isAllowedUrl function, which allows remote attackers to bypass authentication via directory traversal sequences following a URI entry that does not require authentication, as demonstrated by olt/Login.do/../../olt/UploadFileUpload.do.
Published 2016-01-21 03:00:40
Updated 2016-12-22 14:39:31
Source Oracle
View at NVD,   CVE.org
Vulnerability category: Directory traversal

Exploit prediction scoring system (EPSS) score for CVE-2016-0492

Probability of exploitation activity in the next 30 days EPSS Score History
~ 100 %
Percentile, the proportion of vulnerabilities that are scored at or less

Metasploit modules for CVE-2016-0492

  • Oracle ATS Arbitrary File Upload
    Disclosure Date: 2016-01-20
    First seen: 2020-04-26
    This module exploits an authentication bypass and arbitrary file upload in Oracle Application Testing Suite (OATS), version and unknown earlier versions, to upload and execute a JSP shell. Authors: - Zhou Yu - wvu <wvu@metasploit.com>

CVSS scores for CVE-2016-0492

Base Score Base Severity CVSS Vector Exploitability Score Impact Score Score Source First Seen

References for CVE-2016-0492

Products affected by CVE-2016-0492

This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!