Oracle FAQ Your Portal to the Oracle Knowledge Grid
HOME | ASK QUESTION | ADD INFO | SEARCH | E-MAIL US
 

Home -> Community -> Mailing Lists -> Oracle-L -> RE: [oracle-l] Re: Oracle HTTP Server Cross Site Scripting Vulnerabil lity

RE: [oracle-l] Re: Oracle HTTP Server Cross Site Scripting Vulnerabil lity

From: Goulet, Dick <DGoulet_at_vicr.com>
Date: Wed, 28 Jan 2004 11:46:14 -0500
Message-ID: <4001DEAF7DF9BD498B58B45051FBEA656D80EF@25exch1.vicorpower.vicr.com>


Well, IMHO it does not help that the Oracle installer installs and = starts it without telling you. I guess Uncle Larry has learned a trick = or two from the Gates.

Dick Goulet
Senior Oracle DBA
Oracle Certified 8i DBA

-----Original Message-----
From: Jan Pruner [mailto:JPruner_at_email.cz] Sent: Wednesday, January 28, 2004 5:55 AM To: oracle-l_at_freelists.org
Subject: Re: [oracle-l] Re: Oracle HTTP Server Cross Site Scripting Vulnerabil lity

A lot of people running Oracle on WINDOWS. They simply do not know about the posibility to compile own httpd with=20 SSL library.

JP

MacGregor, Ian A. wrote:
> How many people actually run the HTTP server which comes with the =
database? Isn't that pleading for someone to commit mischief. It was = too long ago that an SSL problem was announced also dealing with the = HTTP server. The attack vector employs iSQL is that only available = through the "database" HTTP server or can it be run via iAS.

>=20
>=20

> Ian MacGregor
> Stanford Linear Accelerator Center
> ian_at_slac.stanford.edu
>=20
>=20

> -----Original Message-----
> From: Jared.Still_at_radisys.com [mailto:Jared.Still_at_radisys.com]=20
> Sent: Tuesday, January 27, 2004 5:26 PM
> To: oracle-l_at_freelists.org
> Subject: [oracle-l] Oracle HTTP Server Cross Site Scripting =
Vulnerabillity
>=20
>=20

> ----- Forwarded by Jared Still/Radisys_Corporation/US on 01/27/2004 =
05:25=20
> PM -----
>=20

> "Rafel Ivgi, The-Insider" <theinsider_at_012.net.il>
> 01/24/2004 01:54 AM
> Please respond to "Rafel Ivgi, The-Insider"
>=20

> =20
> To: "bugtraq" <bugtraq_at_securityfocus.com>
> cc: "securitytracker" <bugs_at_securitytracker.com>
> Subject: Oracle HTTP Server Cross Site Scripting =
Vulnerabillity >=20 >=20

> =

>=20

> Software: Oracle HTTP Server Powered by Apache
> Vendor: http://www.apache.com
> http://www.oracle.com
> Versions: Oracle HTTP Server Powered by Apache/1.3.22 (Win32)
> mod_plsql/3.0.9.8.3b mod_ssl/2.8.5 OpenSSL/0.9.6b mod_fastcgi/2.2.12 =
mod_oprocmgr/1.0 mod_perl/1.25
> Platforms: Windows
> Bug: Cross Site Scripting Vulnerabillity
> Risk: Low
> Exploitation: Remote with browser
> Date: 24 Jan 2004
> Author: Rafel Ivgi, The-Insider
> e-mail: the_insider_at_mail.com
> web: http://theinsider.deep-ice.com
>=20
> =

>=20

> 1) Introduction
> 2) Bug
> 3) The Code

>=20
> =

>=20

> =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
> 1) Introduction
> =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
>=20
> Apache is the most common unix server in the world. It is strong and =
safe. Oracle HTTP Server is a modified, custom apache server that was = created by apache for oracle.
>=20
> =

>=20

> =3D=3D=3D=3D=3D=3D
> 2) Bug
> =3D=3D=3D=3D=3D=3D

>=20
> The Vulnerabillity is Cross Site Scripting. If an attacker will =
request=20
> the
> following
> url from the server: =

http://<host>/isqlplus?action=3Dlogon&username=3Dsdfds%22%3e%3cscript%3ea= lert('X
> =

SS')%3c/script%3e\&password=3Ddsfsd%3cscript%3ealert('XSS')%3c/script%3e
> Or
> http://<host>/isqlplus?action=3D<script>alert('XSS')</script>
> XSS appears and the server allows an attacker to inject & execute =
scripts.
>=20

> In the words of securityfocus.com :
> ~~~~~~~~~~~~~~~~~~~~~~~~~~

>=20
> If all of these circumstances are met, an attacker may be able to =
exploit this issue via a malicious link containing arbitrary HTML and = script code as part of the hostname. When the malicious link is clicked = by an unsuspecting user, the attacker-supplied HTML and script code will = be executed by their web client. This will occur because the server will = echo back the malicious hostname supplied in the client's request, = without sufficiently escaping HTML and script code. >=20
> Attacks of this nature may make it possible for attackers to =
manipulate=20
> web
> content or to
> steal cookie-based authentication credentials. It may be possible to =
take arbitrary actions as the victim user. >=20
> =

>=20

> =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
> 3) The Code
> =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

>=20
> =

http://<host>/isqlplus?action=3Dlogon&username=3Dsdfds%22%3e%3cscript%3ea= lert('X
> =

SS')%3c/script%3e\&password=3Ddsfsd%3cscript%3ealert('XSS')%3c/script%3e
> http://<host>/isqlplus?action=3D<script>alert('XSS')</script>
>=20
> =

>=20

> ---
> Rafel Ivgi, The-Insider
> http://theinsider.deep-ice.com
>=20

> "Things that are unlikeable, are NOT impossible."
>=20
>=20

Please see the official ORACLE-L FAQ: http://www.orafaq.com

To unsubscribe send email to: oracle-l-request_at_freelists.org put 'unsubscribe' in the subject line.
--
Archives are at http://www.freelists.org/archives/oracle-l/
FAQ is at http://www.freelists.org/help/fom-serve/cache/1.html
-----------------------------------------------------------------
----------------------------------------------------------------
Please see the official ORACLE-L FAQ: http://www.orafaq.com
----------------------------------------------------------------
To unsubscribe send email to:  oracle-l-request_at_freelists.org
put 'unsubscribe' in the subject line.
--
Archives are at http://www.freelists.org/archives/oracle-l/
FAQ is at http://www.freelists.org/help/fom-serve/cache/1.html
-----------------------------------------------------------------
Received on Wed Jan 28 2004 - 10:46:14 CST

Original text of this message

HOME | ASK QUESTION | ADD INFO | SEARCH | E-MAIL US