Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-21587 PoC — Oracle E-Business Suite 访问控制错误漏洞

Source
Associated Vulnerability
Title:Oracle E-Business Suite 访问控制错误漏洞 (CVE-2022-21587)
Description:Vulnerability in the Oracle Web Applications Desktop Integrator product of Oracle E-Business Suite (component: Upload). Supported versions that are affected are 12.2.3-12.2.11. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Web Applications Desktop Integrator. Successful attacks of this vulnerability can result in takeover of Oracle Web Applications Desktop Integrator. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
Description
Oracle E-BS CVE-2022-21587 Exploit
Readme
# Oracle E-BS CVE-2022-21587 Exploit
## 简介
Oracle E-BS CVE-2022-21587 Exploit Plugin for [woodpecker-framwork](https://github.com/woodpecker-framework/woodpecker-framwork-release/releases)

## 免责声明

本工具仅面向**合法授权**的企业安全建设行为,如您需要测试本工具的可用性,请自行搭建靶机环境。

在使用本工具进行检测时,您应确保该行为符合当地的法律法规,并且已经取得了足够的授权。**请勿对非授权目标进行扫描。**

如您在使用本工具的过程中存在任何非法行为,您需自行承担相应后果,我们将不承担任何法律及连带责任。

在安装并使用本工具前,请您**务必审慎阅读、充分理解各条款内容**,限制、免责条款或者其他涉及您重大权益的条款可能会以加粗、加下划线等形式提示您重点注意。 除非您已充分阅读、完全理解并接受本协议所有条款,否则,请您不要安装并使用本工具。您的使用行为或者您以其他任何明示或者默示方式表示接受本协议的,即视为您已阅读并同意本协议的约束。


## 使用

```bash 
mvn clean package -DskipTests 
```
### Exploit

![img2.png](pic/img2.png)

![img3.png](pic/img3.png)

### Payload generator
生成的 `evil zip content` 可直接copy到burp发包 

![img_1.png](pic/img1.png)


## Reference
https://blog.viettelcybersecurity.com/cve-2022-21587-oracle-e-business-suite-unauth-rce/

https://github.com/woodpecker-appstore/zip-tools


File Snapshot

[4.0K] /data/pocs/680ce40a1ef00d9565a51c62d0b4badb24091c0e ├── [4.0K] pic │   ├── [551K] img1.png │   ├── [185K] img2.png │   └── [203K] img3.png ├── [3.3K] pom.xml ├── [1.5K] README.md └── [4.0K] src └── [4.0K] main └── [4.0K] java └── [4.0K] me └── [4.0K] gv7 └── [4.0K] woodpecker └── [4.0K] plugin ├── [2.7K] CommonUtils.java ├── [4.0K] exploits │   ├── [2.6K] CVE_2022_21587_Command_Execution.java │   └── [3.0K] CVE_2022_21587_Zip_Upload.java ├── [4.0K] payloads │   └── [2.4K] CVE_2022_21587_Payload.java ├── [1.5K] VulPluginInfo.java └── [ 329] WoodpeckerPluginManager.java 10 directories, 11 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →