---------------------------------------------------------------------- Bist Du interessiert an einem neuen Job in IT-Sicherheit? Secunia hat zwei freie Stellen als Junior und Senior Spezialist in IT- Sicherheit: http://secunia.com/secunia_vacancies/ ---------------------------------------------------------------------- TITLE: Oracle Reports / Forms Multiple Vulnerabilities SECUNIA ADVISORY ID: SA16092 VERIFY ADVISORY: http://secunia.com/advisories/16092/ CRITICAL: Moderately critical IMPACT: Cross Site Scripting, Manipulation of data, Exposure of sensitive information, Privilege escalation, System access WHERE: >From remote SOFTWARE: Oracle9i Developer Suite http://secunia.com/product/5411/ Oracle9i Application Server http://secunia.com/product/443/ Oracle Application Server 10g http://secunia.com/product/3190/ Oracle Developer Suite 10g http://secunia.com/product/5410/ DESCRIPTION: Alexander Kornbrust has reported some vulnerabilities in Oracle Reports and Forms, which can be exploited to gain escalated privileges, gain knowledge of certain information, overwrite arbitrary files, conduct cross-site scripting attacks, or potentially compromise a vulnerable system. 1) Input passed to various parameters is not properly sanitised before being returned to users. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of a vulnerable site. Examples: http://[host]:7778/reports/rwservlet/showenv?server=reptest&debug=[code] http://[host]:7778/reports/rwservlet/parsequery?server=myserver&test=[code] http://[host]:7778/reports/rwservlet?server=myserver+report=test.rdf+userid= user/pass@iasdb+destype=localFile+desformat=delimited+desname= FILE:+CELLWRAPPER=*+delimiter=[code] http://[host]:7778/reports/rwservlet?server=myserver+report=test.rdf+userid= user/pass@iasdb+destype=localFile+desformat=delimited+desname= FILE:+CELLWRAPPER=[code] The vulnerability has been reported in Oracle Reports 9.0.2 with patchset 2. Other versions may also be affected. 2) It's possible to read a small part of the beginning of any XML file on a vulnerable system by passing the path to the file in the "customize" parameter. Example: http://[host]:7778/reports/rwservlet?server=myserver+report=test.rdf+userid= userid=user/pass@iasdb+destype=cache+desformat=xml+CUSTOMIZE=[path_to_file] 3) It's possible to read a small part of the beginning of any file on a vulnerable system by passing the path to the file in the "desformat" parameter. Example: http://[host]:7778/reports/rwservlet?server=myserver+report=test.rdf+userid= userid=user/pass@iasdb+destype=file+MODE=CHARACTER+desformat=[path_to_file] 4) It is possible to overwrite arbitrary files by passing a specially crafted string to the "desname" parameter. On Windows, it is reportedly possible to overwrite any file. On Linux, it possible to overwrite any file belonging to the Oracle Application Server user. The vulnerability has been reported in Oracle Reports 6.0, 6i, 9i, and 10g. 5) It is possible to execute arbitrary reports files (*.rep and *.rdf) by specifying the path to the file in the "report" parameter. This can be exploited to execute arbitrary commands with user "Oracle" or SYSTEM privileges by local users or people, who can place a malicious reports file in a directory on the server. Example: http://[host]:7779/reports/rwservlet?server=repserv+report=[path_to_file] +destype=cache+desformat=PDF The vulnerability has been reported in Oracle Reports 6.0, 6i, 9i, and 10g. 6) It is possible to execute arbitrary forms files (*.fmx) by specifying the path to the file in the "form" or "module" parameter. This can be exploited to execute arbitrary commands with user "Oracle" or SYSTEM privileges by local users or people, who can place a malicious reports file in a directory on the server. Examples: http://[host]:7779/forms90/f90servlet?form=[path_to_file] http://[host]:7779/forms90/f90servlet?module=[path_to_file] The vulnerability has been reported in Oracle Forms 4.5, 5.0, 6.0, 6i, 9i, and 10g. SOLUTION: Filter requests in a proxy or firewall with URL filtering capabilities. Grant only trusted users access to affected systems and do not allow any untrusted users to upload files. PROVIDED AND/OR DISCOVERED BY: Alexander Kornbrust, Red-Database-Security. ORIGINAL ADVISORY: Red-Database-Security: http://www.red-database-security.com/advisory/oracle_reports_various_css.html http://www.red-database-security.com/advisory/oracle_reports_read_any_xml_file.html http://www.red-database-security.com/advisory/oracle_reports_read_any_file.html http://www.red-database-security.com/advisory/oracle_reports_overwrite_any_file.html http://www.red-database-security.com/advisory/oracle_reports_run_any_os_command.html http://www.red-database-security.com/advisory/oracle_forms_run_any_os_command.html ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------