----------------------------------------------------------------------

Bist Du interessiert an einem neuen Job in IT-Sicherheit?


Secunia hat zwei freie Stellen als Junior und Senior Spezialist in IT-
Sicherheit:
http://secunia.com/secunia_vacancies/

----------------------------------------------------------------------

TITLE:
Oracle Reports / Forms Multiple Vulnerabilities

SECUNIA ADVISORY ID:
SA16092

VERIFY ADVISORY:
http://secunia.com/advisories/16092/

CRITICAL:
Moderately critical

IMPACT:
Cross Site Scripting, Manipulation of data, Exposure of sensitive
information, Privilege escalation, System access

WHERE:
>From remote

SOFTWARE:
Oracle9i Developer Suite
http://secunia.com/product/5411/
Oracle9i Application Server
http://secunia.com/product/443/
Oracle Application Server 10g
http://secunia.com/product/3190/
Oracle Developer Suite 10g
http://secunia.com/product/5410/

DESCRIPTION:
Alexander Kornbrust has reported some vulnerabilities in Oracle
Reports and Forms, which can be exploited to gain escalated
privileges, gain knowledge of certain information, overwrite
arbitrary files, conduct cross-site scripting attacks, or potentially
compromise a vulnerable system.

1) Input passed to various parameters is not properly sanitised
before being returned to users. This can be exploited to execute
arbitrary HTML and script code in a user's browser session in context
of a vulnerable site.

Examples:
http://[host]:7778/reports/rwservlet/showenv?server=reptest&debug=[code]
http://[host]:7778/reports/rwservlet/parsequery?server=myserver&test=[code]
http://[host]:7778/reports/rwservlet?server=myserver+report=test.rdf+userid=
user/pass@iasdb+destype=localFile+desformat=delimited+desname=
FILE:+CELLWRAPPER=*+delimiter=[code]
http://[host]:7778/reports/rwservlet?server=myserver+report=test.rdf+userid=
user/pass@iasdb+destype=localFile+desformat=delimited+desname=
FILE:+CELLWRAPPER=[code]

The vulnerability has been reported in Oracle Reports 9.0.2 with
patchset 2. Other versions may also be affected.

2) It's possible to read a small part of the beginning of any XML
file on a vulnerable system by passing the path to the file in the
"customize" parameter.

Example:
http://[host]:7778/reports/rwservlet?server=myserver+report=test.rdf+userid=
userid=user/pass@iasdb+destype=cache+desformat=xml+CUSTOMIZE=[path_to_file]

3) It's possible to read a small part of the beginning of any file on
a vulnerable system by passing the path to the file in the "desformat"
parameter.

Example:
http://[host]:7778/reports/rwservlet?server=myserver+report=test.rdf+userid=
userid=user/pass@iasdb+destype=file+MODE=CHARACTER+desformat=[path_to_file]

4) It is possible to overwrite arbitrary files by passing a specially
crafted string to the "desname" parameter. On Windows, it is
reportedly possible to overwrite any file. On Linux, it possible to
overwrite any file belonging to the Oracle Application Server user.

The vulnerability has been reported in Oracle Reports 6.0, 6i, 9i,
and 10g.

5) It is possible to execute arbitrary reports files (*.rep and
*.rdf) by specifying the path to the file in the "report" parameter.
This can be exploited to execute arbitrary commands with user
"Oracle" or SYSTEM privileges by local users or people, who can place
a malicious reports file in a directory on the server.

Example:
http://[host]:7779/reports/rwservlet?server=repserv+report=[path_to_file]
+destype=cache+desformat=PDF

The vulnerability has been reported in Oracle Reports 6.0, 6i, 9i,
and 10g.

6) It is possible to execute arbitrary forms files (*.fmx) by
specifying the path to the file in the "form" or "module" parameter.
This can be exploited to execute arbitrary commands with user
"Oracle" or SYSTEM privileges by local users or people, who can place
a malicious reports file in a directory on the server.

Examples:
http://[host]:7779/forms90/f90servlet?form=[path_to_file]
http://[host]:7779/forms90/f90servlet?module=[path_to_file]

The vulnerability has been reported in Oracle Forms 4.5, 5.0, 6.0,
6i, 9i, and 10g.

SOLUTION:
Filter requests in a proxy or firewall with URL filtering
capabilities. Grant only trusted users access to affected systems and
do not allow any untrusted users to upload files.

PROVIDED AND/OR DISCOVERED BY:
Alexander Kornbrust, Red-Database-Security.

ORIGINAL ADVISORY:
Red-Database-Security:
http://www.red-database-security.com/advisory/oracle_reports_various_css.html
http://www.red-database-security.com/advisory/oracle_reports_read_any_xml_file.html
http://www.red-database-security.com/advisory/oracle_reports_read_any_file.html
http://www.red-database-security.com/advisory/oracle_reports_overwrite_any_file.html
http://www.red-database-security.com/advisory/oracle_reports_run_any_os_command.html
http://www.red-database-security.com/advisory/oracle_forms_run_any_os_command.html

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

----------------------------------------------------------------------