| lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
|
Open Source and information security mailing list archives
| ||
|
Message-Id: <200901291357.n0TDv2BC010943@www3.securityfocus.com> Date: Thu, 29 Jan 2009 06:57:02 -0700 From: DoZ@...kersCenter.com To: bugtraq@...urityfocus.com Subject: Oracle Application Server 10g Cross Site Scripting Vulnerability Oracle AS Portal is a Web-based application for building and deploying portals. It provides a secure, manageable environment for accessing and interacting with enterprise software services and information resources. A vulnerability has been identified in Oracle Application Server 10g, This could be exploited to conduct cross site scripting attacks. Attackers can run arbitrary code that can be executed by the user's browser in the security context of an affected site. Attackers can exploit these issues via a web client. Hackers Center Security Group (http://www.hackerscenter.com) Credit: Oleg P. Class: Cross Site Scripting Remote: Yes Risk: Medium Product: Oracle Application Server Portal (OracleAS Portal) 10g Version: Tested 10.1.3 and Earlier/ Other version may be affrected too. Vendor: http://www.oracle.com - Cross Site Scripting - Login script: /sso/jsp/login.jsp?site2pstoretoken=XSS Search Script: PORTAL&search_type=XSS Google: FastCGI Script - Displays environment settings using FastCGI. http://www.google.com/search?q=FastCGI+echo&btnG=Search&hl=en&sa=2 http://www.google.com/search?hl=en&q=fcgi-bin%2Fecho&btnG=Google+Search&aq=f&oq= Buy locating the script you can locate the server url: SiteServer.com/fcgi-bin/echo Google for Oracle Servers: http://www.google.com/search?hl=en&q=Contents%3A+Working+with+Oracle+Application+Server+Single+Sign-On+-+Oracle+Application+Server+Single+Sign-On&btnG=Google+Search&aq=f&oq= PATCHES AND UPDATES: http://www.oracle.com/technology/deploy/security/alerts.htm
Powered by blists - more mailing lists