[<prev] [next>] [day] [month] [year] [list]
Message-ID: <487E75B3.5020008@uni.it>
Date: Thu, 17 Jul 2008 00:26:59 +0200
From: Andrea Purificato <a.purificato@....it>
To: bugtraq@...urityfocus.com, full-disclosure@...ts.grok.org.uk
Subject: Oracle Portal XSS fixed by CPU July 2008
Class: Input Validation Error
Risk: Low
Remote: Yes
Oracle has just released CPU July 2008 critical patch that fixes a flaw
which allows code injection by malicious web users into the web pages
viewed by other users.
The security issue was found on POPUP_NAME parameter OF
PORTAL.WWPOB_HOME_PAGE web page of Oracle Portal.
After months, the patch is now available:
http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpujul2008.html
Regards,
--
Andrea Purificato
Ethical Hacker @ Unidata S.p.A.
http://rawlab.mindcreations.com
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists