Oracle Virtual Directory is vulnerable to information disclosure, data manipulation or Denial of Service attack, and can be exploited by a malicious user with low privileges.
PUBLISH DATE: 23-10-2018
A vulnerability was found in Oracle Virtual Directory, which if exploited by malicious users may lead to disclosure of sensitive information, manipulation of data, or may cause a DoS (Denial of Service). Oracle has released updates for patching the vulnerability.
The Vulnerability lies in the Oracle Virtual Directory component of Oracle Fusion Middleware (subcomponent: Virtual Directory Manager). A successful exploit can lead to disclosure of sensitive information or data manipulation like unauthorized updates, manipulation of access privileges to the oracle virtual directory, unauthorized read access or partial denial of service of the Oracle Virtual Directory.
The vulnerability has been reported in two of the supported versions of Oracle virtual directory, that are 18.104.22.168.0 and 22.214.171.124.0.
The Active directory password hash was found to be stored on the oracle virtual directory which was readable for all authenticated users and computer objects by default, including the ones with low privileges. Researchers were able to exploit it to crack passwords.
The vulnerability can be exploited by a malicious user with network access via HTTP to compromise the directory. In short, an attack on the Oracle Virtual Directory may impact the confidentiality, Integrity and Availability of the organization using a vulnerable version of the directory.
Oracle Virtual Directory 11.x
The vulnerability is reported in versions 126.96.36.199.0 and 188.8.131.52.0.
Oracle has recently released updates to patch this vulnerability. Apply the available updates to ensure proper and timely precautionary measures. Follow the link for help:
(users may need to log-in to access the contents of the URL)
If you think you’re a victim of a cyber-attack, immediately send an email to firstname.lastname@example.org.