Security researchers have published technical details on a critical Fusion Middleware vulnerability that Oracle took six months to patch.
Tracked as CVE-2022–21445 (CVSS score of 9.8), the vulnerability is described as a deserialization of untrusted data, which could be exploited to achieve arbitrary code execution. Identified in the ADF Faces component, the issue can be exploited remotely, without authentication.
The flaw was discovered by security researchers PeterJson of VNG Corporation and Nguyen Jang of VNPT, who reported it to Oracle in October 2021. Oracle released a fix as part of its April 2022 Critical Patch Update, six months after the initial report.
According to the two security researchers, the pre-authentication RCE issue, which they described as a “mega” vulnerability, impacts all applications that rely on ADF Faces, including Business Intelligence, Enterprise Manager, Identity Management, SOA Suite, WebCenter Portal, Application Testing Suite, and Transportation Management.
PeterJson and Jang also discovered CVE-2022–21497 (CVSS score of 8.1), a server-side request forgery (SSRF) vulnerability that could be chained with CVE-2022–21445 to achieve pre-authentication remote code execution in Oracle Access Manager, a component used for SSO in numerous Oracle online services.
The researchers, who named their attack “The Miracle Exploit,” say that all of Oracle’s online systems and cloud services that rely on ADF Faces are impacted. In fact, they say, any website that uses the ADF Faces framework is vulnerable.
In a technical writeup on the two vulnerabilities, PeterJson notes that the ADF Faces vulnerability was also reported to BestBuy, Dell, NAB Group, Regions Bank, Starbucks, USAA, and other impacted organizations.
Oracle’s January 2022 CPU patched another pre-authentication RCE vulnerability in OAM that was reported by Nguyen Jang.