[<prev] [next>] [day] [month] [year] [list]
Message-Id: <200901291357.n0TDv2BC010943@www3.securityfocus.com>
Date: Thu, 29 Jan 2009 06:57:02 -0700
From: DoZ@...kersCenter.com
To: bugtraq@...urityfocus.com
Subject: Oracle Application Server 10g Cross Site Scripting Vulnerability
Oracle AS Portal is a Web-based application for building and deploying portals. It provides a
secure, manageable environment for accessing and interacting with enterprise software services
and information resources. A vulnerability has been identified in Oracle Application Server 10g,
This could be exploited to conduct cross site scripting attacks. Attackers can run arbitrary code
that can be executed by the user's browser in the security context of an affected site. Attackers
can exploit these issues via a web client.
Hackers Center Security Group (http://www.hackerscenter.com)
Credit: Oleg P.
Class: Cross Site Scripting
Remote: Yes
Risk: Medium
Product: Oracle Application Server Portal (OracleAS Portal) 10g
Version: Tested 10.1.3 and Earlier/ Other version may be affrected too.
Vendor: http://www.oracle.com
- Cross Site Scripting -
Login script:
/sso/jsp/login.jsp?site2pstoretoken=XSS
Search Script:
PORTAL&search_type=XSS
Google: FastCGI Script - Displays environment settings using FastCGI.
http://www.google.com/search?q=FastCGI+echo&btnG=Search&hl=en&sa=2
http://www.google.com/search?hl=en&q=fcgi-bin%2Fecho&btnG=Google+Search&aq=f&oq=
Buy locating the script you can locate the server url:
SiteServer.com/fcgi-bin/echo
Google for Oracle Servers:
http://www.google.com/search?hl=en&q=Contents%3A+Working+with+Oracle+Application+Server+Single+Sign-On+-+Oracle+Application+Server+Single+Sign-On&btnG=Google+Search&aq=f&oq=
PATCHES AND UPDATES:
http://www.oracle.com/technology/deploy/security/alerts.htm
Powered by blists - more mailing lists