Description
Absolute path traversal vulnerability in Oracle Database Server, when utl_file_dir is set to a wildcard value or "CREATE ANY DIRECTORY to PUBLIC" privileges exist, allows remote authenticated users to read and modify arbitrary files via full filepaths to utl_file functions such as (1) utl_file.put_line and (2) utl_file.get_line, a related issue to CVE-2005-0701. NOTE: this issue is disputed by third parties who state that this is due to an insecure configuration instead of an inherent vulnerability
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Marco Ivaldi · remotelinux
https://www.exploit-db.com/exploits/2959
References (4)
Core 4
Core References
Exploit x_refsource_misc
http://www.0xdeadbeef.info/exploits/raptor_orafile.sql
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/455047/100/0/threaded
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/454964/100/0/threaded
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/454862/100/0/threaded
Scores
EPSS
0.0524
EPSS Percentile
90.0%
Details
Status
published
Products (1)
oracle/database_server
Published
Mar 07, 2007
Tracked Since
Feb 18, 2026