CVE-2014-6577
Description
Unspecified vulnerability in the XML Developer's Kit for C component in Oracle Database Server 11.2.0.3, 11.2.0.4, 12.1.0.1, and 12.1.0.2 allows remote authenticated users to affect confidentiality via unknown vectors. NOTE: the previous information is from the January 2015 CPU. Oracle has not commented on the original researcher's claim that this is an XML external entity (XXE) vulnerability in the XML parser, which allows attackers to conduct internal port scanning, perform SSRF attacks, or cause a denial of service via a crafted (1) http: or (2) ftp: URI.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
CVE-2014-6577: XXE injection in Oracle Database XML Parser allows authenticated users to perform SSRF, port scanning, or DoS.
Vulnerability
CVE-2014-6577 is an unspecified vulnerability in the XML Developer's Kit for C component of Oracle Database Server, which has been identified as an XML External Entity (XXE) injection issue in the XML parser module. Affected versions include 11.2.0.3, 11.2.0.4, 12.1.0.1, and 12.1.0.2. The vulnerability can be triggered by calling the extractvalue() function for an xmltype object with a crafted http: or ftp: URI [1].
Exploitation
An attacker requires the CREATE SESSION privilege and network access to the database. By sending a specially-crafted SQL query using extractvalue() and xmltype() with an XXE payload that references an external entity via HTTP or FTP, the vulnerable XML resolver will attempt to connect to the attacker-controlled URI. For example, a query like select extractvalue(xmltype('<!ENTITY xxe SYSTEM "https://IP/test">]><xxe;'),'/l') from dual; can trigger outbound connections from the database server [1].
Impact
Successful exploitation allows an authenticated remote attacker to affect confidentiality via unknown vectors (according to Oracle). The researcher's claim indicates that the XXE injection can be used for internal port scanning, Server-Side Request Forgery (SSRF) attacks, out-of-band data exfiltration, or denial-of-service (DoS). The FILE URI handler is converted to an XDB Repository path and fails, but HTTP and FTP URIs cause the server to attempt connections, enabling these attacks [1].
Mitigation
Oracle released a fix as part of the January 2015 Critical Patch Update (CPU). The affected versions should be updated to the patched version corresponding to their release. No workarounds are provided; applying the CPU is the recommended mitigation. There is no indication that this CVE is listed in CISA's Known Exploited Vulnerabilities (KEV) catalog [1].
AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
5cpe:2.3:a:oracle:database_server:11.2.0.3:*:*:*:*:*:*:*+ 3 more
- cpe:2.3:a:oracle:database_server:11.2.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:database_server:11.2.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:database_server:12.1.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:database_server:12.1.0.2:*:*:*:*:*:*:*
- Range: 11.2.0.3, 11.2.0.4, 12.1.0.1, 12.1.0.2
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4News mentions
0No linked articles in our index yet.