lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Wed Jul 13 20:45:03 2005
From: ak at red-database-security.com (Kornbrust, Alexander)
Subject: Advisory: Oracle Forms Builder Password in Temp
	Files

Red-Database-Security GmbH  - Oracle Security Advisory

Oracle Forms Builder Password in Temp Files

 Name                Oracle Forms Builder Password in Temp Files
 Systems Affected    Oracle Formsbuilder  9.0.4
 Severity            Low Risk 
 Category            Information disclosure of passwords
 Vendor URL          http://www.oracle.com 
 Author              Alexander Kornbrust (ak at
red-database-security.com) 
 Date                13 July 2005 (V 1.00) 
 Advisory            AKSEC2003-006
 Oracle Vuln#        AS06
 Time to fix         148 days


Details
#######
Oracle Formsbuilder 9.0.4 creates temp files (e.g. s5hs.1htm) in the
local 
temp (%TEMP%) directory. These temp-files contain the username and
password 
of the current database connection entered in the Formsbuilder. After
closing Formsbuilder these files are not deleted.

This security issued was introduced in Formsbuilder 9.0.4 to avoid
another 
security issue in older versions of Formsbuilder (cleartext passwords in
the 
Apache log file).


Example
#######
<html> <head> ORACLE FORMS.</head>
<body onload="document.pform.submit();" >
<form name="pform" action="http://localhost:8889/forms90/f90servlet"
method="POST">
<input type="hidden" name="form"
value="C:\oracle_security\sql_injection_forms\demo1.fmx">
<input type="hidden" name="userid" value="SCOTT/TIGER@...10103">
<input type="hidden" name="obr" value="yes">
<input type="hidden" name="array" value="YES">
</form> </body></html>



Workaround
##########
Set the environment variable TMP, TEMP and TMPDIR to a secure location
and 
delete the temp directory on a regular basis.



Patch Information
#################
Apply patches for Jdeveloper and / or DeveloperSuite mentioned in
Metalink 
Note 311038 on your Jdeveloper / DeveloperSuite Installation (normally
your client PC).


History
#######
14-feb-2005 Oracle secalert_us was informed
14-feb-2005 Bug confirmed
12-jul-2005 Oracle published Oracle Critical Patch Update July 2005
12-jul-2005 Red-Database-Security published this advisory


(c) 2005 by Red-Database-Security GmbH

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ