<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cpe:2.3:a:oracle:fusion_middleware:11.1.2.0:*:*:*:*:*:*:* — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/cpes/cpe2.3aoraclefusion_middleware11.1.2.0/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 15 May 2026 22:01:21 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/cpes/cpe2.3aoraclefusion_middleware11.1.2.0/feed.xml" rel="self" type="application/rss+xml"/><item><title>Public Exploit Available for Oracle Reports CVE-2012-3152 and CVE-2012-3153</title><link>https://feed.craftedsignal.io/briefs/2026-05-oracle-reports-rwsploit/</link><pubDate>Fri, 15 May 2026 22:01:21 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-oracle-reports-rwsploit/</guid><description>A public exploit, rwsploit, has been released targeting CVE-2012-3152 and CVE-2012-3153 in Oracle Reports Server versions below 11g, enabling unauthenticated file read, SSRF, and JSP shell upload.</description><content:encoded><![CDATA[<p>A public exploit, named rwsploit, has been released targeting CVE-2012-3152 and CVE-2012-3153 affecting Oracle Reports Server versions prior to 11g. The tool automates the detection and exploitation of vulnerable Oracle Reports Server instances, enabling unauthenticated file reads (LFI), Server-Side Request Forgery (SSRF), and JSP shell uploads. The rwsploit tool, written in Python, allows operators to scan single IPs, CIDR ranges, or lists of targets, and includes features to detect the underlying operating system to tailor LFI payloads. The availability of this exploit significantly increases the risk to unpatched Oracle Reports Server instances, as exploitation can now be easily performed by attackers.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies vulnerable Oracle Reports Server instances using reconnaissance techniques such as Shodan, Censys, or Google dorks.</li>
<li>The attacker uses rwsploit to scan the identified targets, specifying the target IP or CIDR range and desired ports.</li>
<li>Rwsploit attempts to detect the Oracle Reports Server version by sending requests to <code>/reports/rwservlet</code>.</li>
<li>The tool exploits CVE-2012-3152 to perform unauthenticated Local File Inclusion (LFI) attacks to read sensitive files. The OS is detected first to run the matching payloads.</li>
<li>Rwsploit exploits CVE-2012-3153 to perform Server-Side Request Forgery (SSRF) attacks using the <code>rwservlet?JOBTYPE=rwurl&amp;URLPARAMETER=</code> endpoint, verifying the success with webhook.site.</li>
<li>If desired, the attacker uploads a JSP shell using the <code>--shell</code> option, first reading the webroot path using <code>showenv</code> and then writing the shell via <code>rwservlet?report=xyzzy&amp;destype=file&amp;desname=&amp;JOBTYPE=rwurl&amp;URLPARAMETER=</code>.</li>
<li>Rwsploit verifies the JSP shell upload by checking the shell URL for an HTTP 200 response.</li>
<li>The attacker uses the uploaded JSP shell to gain remote code execution on the target server.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to read sensitive files, perform SSRF attacks, and ultimately gain remote code execution on the Oracle Reports Server. This can lead to data theft, system compromise, and further lateral movement within the network. The tool&rsquo;s automated nature means that attackers can efficiently scan and exploit large numbers of vulnerable systems, potentially impacting numerous organizations running older versions of Oracle Reports Server.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the vendor-provided patches for CVE-2012-3152 and CVE-2012-3153 to mitigate the vulnerabilities in Oracle Reports Server versions below 11g.</li>
<li>Deploy the Sigma rule &ldquo;Detect Oracle Reports rwservlet Path Traversal Attempt&rdquo; to identify attempts to exploit CVE-2012-3152 in web server logs.</li>
<li>Monitor network traffic for unusual outbound connections from Oracle Reports Server, especially to external URLs, to detect potential SSRF attacks related to CVE-2012-3153.</li>
<li>Use the provided Shodan, FOFA, Censys, and Google dorks to identify potentially vulnerable Oracle Reports Server instances within your network or exposed to the internet.</li>
<li>Enable Sysmon process creation logging to facilitate detection of suspicious processes spawned from the Oracle Reports Server process.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>oracle</category><category>reports server</category><category>cve-2012-3152</category><category>cve-2012-3153</category><category>lfi</category><category>ssrf</category><category>jsp shell</category><category>rwsploit</category></item></channel></rss>