HomeVulnerabilityOracle OIM zero‑day: Pre‑auth RCE forces fast patching throughout enterprises

Oracle OIM zero‑day: Pre‑auth RCE forces fast patching throughout enterprises

Researchers discovered that appending question strings like “?WSDL” or path parameters like “;.wadl” to protected endpoints ( like “/iam/governance/applicationmanagement/templates;.wadl”), would trigger “SecurityFilter” in OIM’s net.xml to deal with the route as “unauthenticated”—that means that it requires no authentication.

As soon as previous the filter, an attacker can attain the REST endpoint “/software/groovyscriptstatus” meant for syntax-checking Groovy code, not executing it. Nevertheless, attributable to Groovy’s annotation processing, researchers demonstrated the power to inject compile-time code that triggers outbound callbacks and code execution.

The flaw, tracked beneath CVE-2025-61757, acquired a essential severity ranking of 9.8 out of 10, as a result of ease of exploitability and presumably the existence of a zero-day abuse. “Given the complexity of some earlier Oracle Entry Supervisor vulnerabilities, this one is considerably trivial and simply exploitable by menace actors,” researchers famous.

See also  New 5Ghoul assault impacts 5G telephones with Qualcomm, MediaTek chips
- Advertisment -spot_img
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular