CVE-2006-7141

Oracle Database Server - Path Traversal

Title source: rule
STIX 2.1

Description

Absolute path traversal vulnerability in Oracle Database Server, when utl_file_dir is set to a wildcard value or "CREATE ANY DIRECTORY to PUBLIC" privileges exist, allows remote authenticated users to read and modify arbitrary files via full filepaths to utl_file functions such as (1) utl_file.put_line and (2) utl_file.get_line, a related issue to CVE-2005-0701. NOTE: this issue is disputed by third parties who state that this is due to an insecure configuration instead of an inherent vulnerability

Exploits (1)

exploitdb WORKING POC VERIFIED
by Marco Ivaldi · remotelinux
https://www.exploit-db.com/exploits/2959

References (4)

Core 4
Core References
Third Party Advisory, VDB Entry mailing-list x_refsource_bugtraq
http://www.securityfocus.com/archive/1/455047/100/0/threaded
Third Party Advisory, VDB Entry mailing-list x_refsource_bugtraq
http://www.securityfocus.com/archive/1/454964/100/0/threaded
Third Party Advisory, VDB Entry mailing-list x_refsource_bugtraq
http://www.securityfocus.com/archive/1/454862/100/0/threaded

Scores

EPSS 0.0524
EPSS Percentile 90.0%

Details

Status published
Products (1)
oracle/database_server
Published Mar 07, 2007
Tracked Since Feb 18, 2026