🔍
Notes
TwitterGithub
  • 👋Introduction
  • 📚Research
    • 2024
      • Malware Analysis: Wedding Invitation Scam
      • Android Reverse Engineering (Dynamic Class Loader and Native Library)
    • 2023
      • Reverse Engineering APK Built with Flutter
      • Reverse Engineering Application Protected with Pyarmor
      • Analyzing CVE-2021-22204 Based on Network Traffic (PCAP file)
      • Emulating Android Native Library using Qiling - Part 1
      • Machine Learning Model (XGBoost) Reverse Engineering
      • CVE-2021-2461
      • CVE-2022-31367
      • CVE-2023-0046
      • CVE-2023-0048
      • CVE-2023-0316
    • 2022
      • Attacking Non Avalanche AES (Custom AES Implementation)
      • Cracking CRC32 with Forward Polynomial Constant
      • Cheating Game Built with WASM
      • Reverse Engineering Game Boy
      • Partial Known Plaintext Attack on Custom 3DES
    • 2021
      • Reverse Engineering Erlang BEAM File
      • Reverse Engineering Approach on Python Bytecode with Development Version
Powered by GitBook
On this page
  • Vulnerability Explanation
  • Vulnerability Type
  • CVSS
  • Vendor
  • Affected Version
  • Proof of Concept
  • Exploit Code
  • Tested On
  • Disclosure Timeline
  • Researcher
  • Additional Information
  1. Research
  2. 2023

CVE-2021-2461

Parameter Pollution Lead to Application Takeover

Last updated 1 year ago

Vulnerability Explanation

Vulnerability in the Oracle Communications Interactive Session Recorder product of Oracle Communications (component: Provision API). The supported version that is affected is 6.4. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Communications Interactive Session Recorder. While the vulnerability is in Oracle Communications Interactive Session Recorder, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Communications Interactive Session Recorder accessible data as well as unauthorized read access to a subset of Oracle Communications Interactive Session Recorder accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Communications Interactive Session Recorder.

Vulnerability Type

  • Parameter Pollution

  • Broken Access Control

CVSS

  • (High)

Vendor

Affected Version

  • Oracle Communications Interactive Session Recorder 6.4

Proof of Concept

  1. TBU

Exploit Code

# TBU

Tested On

  • Oracle Communications Interactive Session Recorder Version: 6.4

Disclosure Timeline

  • 2021-07-15: Vulnerability discovered.

  • 2022-10-16: Vulnerability fixed.

  • 2022-10-16: CVE has been assigned.

  • 2022-10-19: Critical Patch Update Released.

Researcher

Additional Information

Achmad Zaenuri Dahlan Putra ()

📚
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L
Oracle
kos0ng
https://www.oracle.com/security-alerts/cpuoct2021verbose.html
https://www.oracle.com/security-alerts/cpuoct2021.html