Description
Directory traversal vulnerability in Oracle Database Server 8i and 9i allows remote attackers to read or rename arbitrary files via "\\.\\.." (modified dot dot backslash) sequences to UTL_FILE functions such as (1) UTL_FILE.FOPEN or (2) UTL_FILE.frename.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Cesar Cerrudo · textremotewindows
https://www.exploit-db.com/exploits/25195
References (3)
Core 3
Core References
Exploit, Patch, Vendor Advisory mailing-list
x_refsource_fulldisc
http://lists.grok.org.uk/pipermail/full-disclosure/2005-March/032273.html
Mailing List mailing-list
x_refsource_bugtraq
http://marc.info/?l=bugtraq&m=111023635928211&w=2
Exploit, Patch, Vendor Advisory x_refsource_misc
http://www.argeniss.com/research/ARGENISS-ADV-030501.txt
Scores
EPSS
0.2878
EPSS Percentile
96.6%
Details
Status
published
Products (1)
oracle/database_server
Published
Mar 07, 2005
Tracked Since
Feb 18, 2026