Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-61884 PoC — Oracle E-Business Suite 安全漏洞

Source
Associated Vulnerability
Title:Oracle E-Business Suite 安全漏洞 (CVE-2025-61884)
Description:Vulnerability in the Oracle Configurator product of Oracle E-Business Suite (component: Runtime UI). Supported versions that are affected are 12.2.3-12.2.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Configurator. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Configurator accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
Description
🚨 CVE-2025-61884 — High-Risk Oracle EBS Configurator Info Disclosure
Readme
# 🚨 CVE-2025-61884 — High-Risk Oracle EBS Configurator Info Disclosure

## *🌡️ CVE‑2025‑61884 — At a Glance*

```
╔════════════════════════════════════════════════════════════════╗
║ CVE: CVE-2025-61884       ▪ Severity: HIGH (Info Disclosure)   ║
║ Product: Oracle E-Business Suite — Configurator Runtime UI     ║
║ Impact: Unauthorized access to business/configuration data     ║
╚════════════════════════════════════════════════════════════════╝
```

|        ⚙️ Field | 📌 Summary                                                                      |
| --------------: | :------------------------------------------------------------------------------ |
|          CVE ID | **CVE-2025-61884**                                                              |
|        Severity | High (CVSS ~7.5) — unauthenticated info disclosure                              |
|        Affected | Oracle EBS 12.2.3 – 12.2.14 (Configurator Runtime UI)                           |
|   Attack Vector | Network (HTTP), no credentials needed                                           |
| Typical Outcome | Unauthorized access to configuration/business data, potential follow-on attacks |

---

# 🔬 What it *is*

> An unauthenticated attacker can craft HTTP requests to the Runtime UI, causing Oracle Configurator to return sensitive configuration or business data that should not be exposed.

```
[ Attacker ]
     │ crafted HTTP requests
     ▼
[ Oracle Configurator Runtime UI ]
     │ returns sensitive config/business data
     ▼
[ Data disclosed to attacker ]
```

---

# 🧩 Exploit Building Blocks

<img width="1920" height="958" alt="CVE-2025-61884-1" src="https://github.com/user-attachments/assets/c8ac7a93-6d2d-4d5b-a7df-a1c02663498f" />

* 🔗 SSRF-style requests (target internal API endpoints)
* 🔐 Missing authentication / access checks
* 📄 Endpoint returns sensitive config/business LOBs
* 🛡️ Exposure can enable follow-on attacks or data exfiltration

---

# 🕵️‍♀️ Indicators of Compromise (IOCs)

| 🔎 Category | 🔔 Example                                                         |
| ----------- | ------------------------------------------------------------------ |
| Network     | Requests to Configurator Runtime UI from external/unexpected IPs   |
| HTTP        | Unusual query parameters, large response bodies, repeated probes   |
| App logs    | Successful unauthenticated access returning configuration payloads |
| DB          | Unexpected reads of configurator tables/LOBs                       |
| Files       | Exported JSON/XML files with sensitive configuration data          |

---

# 🛠 Detection & Forensics

```
┌──────────────────────── DETECTION STEPS ─────────────────────────┐
│ 1) Review HTTP access logs for Configurator Runtime UI calls.    │
│ 2) Inspect app logs for unauthenticated responses returning      │
│    configuration payloads.                                       │
│ 3) Monitor outbound flows for exfiltration patterns.             │
│ 4) Query DB audit logs for reads of configurator tables/LOBs.    │
│ 5) Snapshot systems before remediation if compromise suspected.  │
└──────────────────────────────────────────────────────────────────┘
```

---

# 🛡 Mitigation & Response Playbook

**Immediate (0–24h)**

* Apply Oracle emergency patch for CVE‑2025‑61884
* Restrict access to Runtime UI endpoints (IP allowlist / firewall / VPN)
* Strengthen logging and capture HTTP access for review

**Short Term (1–7 days)**

* Hunt using IOC checklist; block offending IPs
* Limit application privileges; rotate credentials if compromise suspected
* Enable alerting on anomalous read patterns

**Medium Term (1–4 weeks)**

* Fully patch & validate in staging
* Rebuild compromised hosts if exfiltration detected
* External penetration test / purple-team exercise

**Long Term**

* Network segmentation for public vs internal tiers
* Harden input validation / WAF tuned for EBS Runtime UI
* Maintain automated patch & vulnerability management

---

# 🧾 Quick Hunting Commands

```
# Logs: filter for Runtime UI accesses
grep -i "configurator\|runtimeui" /var/log/httpd/access_log

# App logs: search for config payloads
grep -R --binary-files=text -E "config|configuration|attribute|property" /u01/oracle/inst

# DB audit: find reads of configurator tables
SELECT user_name, sql_text, timestamp
FROM dba_audit_trail
WHERE sql_text LIKE '%CONFIGURATOR%' AND timestamp > sysdate - 7;
```

---

# ⚖️ Risk & Impact

* 🔥 Probability: High for internet-accessible EBS Runtime UI
* 💥 Impact: High — exposure of sensitive config/business data; follow-on attacks possible
* 🚨 Action: Patch + restrict access + hunt immediately

---

# ✅ Action Summary

1. **Patch** Oracle EBS immediately (emergency update)
2. **Restrict access** to Runtime UI endpoints if patching is delayed
3. **Hunt & remediate** using IOCs and logs for unauthorized data access

---
File Snapshot

[4.0K] /data/pocs/0a8cbc80dc1529ef618446966d30a7592f439cfb └── [5.4K] README.md 1 directory, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →