CVE-2005-0701

Oracle Database Server - Path Traversal

Title source: rule
STIX 2.1

Description

Directory traversal vulnerability in Oracle Database Server 8i and 9i allows remote attackers to read or rename arbitrary files via "\\.\\.." (modified dot dot backslash) sequences to UTL_FILE functions such as (1) UTL_FILE.FOPEN or (2) UTL_FILE.frename.

Exploits (1)

exploitdb WORKING POC VERIFIED
by Cesar Cerrudo · textremotewindows
https://www.exploit-db.com/exploits/25195

References (3)

Core 3
Core References
Exploit, Patch, Vendor Advisory mailing-list x_refsource_fulldisc
http://lists.grok.org.uk/pipermail/full-disclosure/2005-March/032273.html
Mailing List mailing-list x_refsource_bugtraq
http://marc.info/?l=bugtraq&m=111023635928211&w=2
Exploit, Patch, Vendor Advisory x_refsource_misc
http://www.argeniss.com/research/ARGENISS-ADV-030501.txt

Scores

EPSS 0.2878
EPSS Percentile 96.6%

Details

Status published
Products (1)
oracle/database_server
Published Mar 07, 2005
Tracked Since Feb 18, 2026