Secunia CSI7
Advisories
Research
Forums
Create Profile
Our Commitment
Database
Search
Advisories by Product
Advisories by Vendor
Terminology
Report Vulnerability
Insecure Library Loading
Highly critical

Oracle Products Multiple Vulnerabilities

-

Release Date:  2007-07-18    Last Update:  2007-07-25    Views:  17,723

Secunia Advisory SA26114

Where:

From remote

Impact:

Unknown, Security Bypass, Cross Site Scripting, Manipulation of data, Exposure of sensitive information, DoS, System access

Solution Status:

Vendor Patch

CVE Reference(s):

Description


Multiple vulnerabilities have been reported for various Oracle products. Some of these have unknown impacts, while others can be exploited to disclose potentially sensitive information, bypass certain security restrictions and conduct cross-site scripting and SQL injection attacks, cause a DoS (Denial of Service), and potentially compromise a vulnerable system.

Details are available for the following vulnerabilities:

1) Oracle APEX does not correctly sanitise input passed via the password used in the wwv_flow_security.check_db_password function before using it in SQL queries. This can be exploited to modify SQL queries by injecting arbitrary SQL code.

2) Specially crafted views can be exploited to perform updates, deletes and inserts without having proper privileges.

3) Certain input processed by the DBMS_PRVTAQIS package is not correctly sanitised before being used in SQL queries. This can be exploited to modify SQL queries by injecting arbitrary SQL code.

4) Errors within various public procedures exist in the MDSYS.MD package. These can be exploited to cause buffer overflows, resulting in a DoS or potentially the execution of arbitrary code.

5) An error exists within the "GET_PROPERTY" function in the SYS.DBMS_DRS package. This can be exploited to cause a buffer overflow, resulting in a DoS or potentially the execution of arbitrary code.

6) Certain unspecified input passed to the Oracle Configurator of the Oracle E-Business Suite is not properly sanitised before being returned to a user. This can be exploited to execute HTML and script code in a user's browser session in context of a vulnerable site.

7) Certain unspecified input passed to the Oracle Internet Expenses web page of the Oracle E-Business Suite is not properly sanitised before being returned to a user. This can be exploited to execute HTML and script code in a user's browser session in context of a vulnerable site.

Note: By default, this page is blocked by the URL firewall.

8) Certain unspecified input passed to the Oracle On-line help of the Oracle E-Business Suite is not properly sanitised before being returned to a user or used in SQL queries. This can be exploited to execute HTML and script code in a user's browser session in context of a vulnerable site or to manipulate SQL queries by injecting arbitrary SQL code.

9) Certain unspecified input passed to the Costumer Intelligence is not properly sanitised before being used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.

10) An unspecified error within iPayments can be exploited to disclose potentially sensitive information via unknown vectors.

11) Certain unspecified input passed to the Application Object Library is not properly sanitised before being used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.

12) Certain unspecified input passed to the Human Resources is not properly sanitised before being used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.

Successful exploitation of vulnerabilities #6, #7, #9, #10, and #12 requires a valid session.

Note: The password storage in iRecruitment and the storage of taxpayer identification numbers in Payables was enhanced.


Solution:
Apply patches (See vendor's advisory).

Provided and/or discovered by:
The vendor credits:
* Esteban Martinez Fayo of Application Security, Inc.
* Jack Kanter and Stephen Kost of Integrigy
* Guy Karlebach of Imperva
* Joxean Koret
* Alexander Kornbrust of Red Database Security GmbH
* Michael Krax
* David Litchfield and Paul M. Wright of Next Generation Security Software Ltd.

Original Advisory:
Oracle:
http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpujul2007.html

Red Database Security:
http://www.red-database-security.com/advisory/oracle_apex_sql_injection_check_db_password.html
http://www.red-database-security.com/advisory/oracle_view_vulnerability.html
http://www.red-database-security.com/advisory/oracle_sql_injection_dbms_prvtaqis.html

Application Security Inc.:
http://www.appsecinc.com/resources/alerts/oracle/2007-04.shtml
http://www.appsecinc.com/resources/alerts/oracle/2007-05.shtml

Integrigy:
http://www.integrigy.com/security-resources/analysis/Integrigy_Oracle_CPU_July_2007_Analysis.pdf

Deep Links:
Links available to Secunia VIM customers

Do you have additional information related to this advisory?

Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this information to vuln@secunia.com

Subject: Oracle Products Multiple Vulnerabilities

No posts yet

-

You must be logged in to post a comment.



 Products Solutions Customers Partner Resources Company
 
 Corporate
Vulnerability Intelligence Manager (VIM)
Corporate Software Inspector (CSI)
Consumer
Personal Software Inspector (PSI)
Online Software Inspector (OSI)
 Industry
Compliance
Technology
Integration
 Customers
Testimonials
 VARS
MSSP
Technology Partners
References
 Factsheets
Reports
Webinars
Events
 About us
Careers
Memberships
Newsroom


 
© 2002-2014 Secunia ApS - Rued Langgaards Vej 8, 4th floor, DK-2300 Copenhagen, Denmark - +45 7020 5144
Terms & Conditions and Copyright - Privacy - Report Vulnerability