[prev in list] [next in list] [prev in thread] [next in thread] 

List:       full-disclosure
Subject:    [Full-disclosure] TeamSHATTER Security Advisory: Oracle Enterprise
From:       Shatter <shatter () appsecinc ! com>
Date:       2011-07-27 23:01:18
Message-ID: BB184445F393D244AEB0312F069BAAB109763CF3E0 () mxe1
[Download RAW message or body]

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

TeamSHATTER Security Advisory

Oracle Enterprise Manager vulnerable to Cross-site scripting (metricDetail$type page)

July 26, 2011

Risk Level:
Medium

Affected versions:
Oracle Enterprise Manager Grid Control versions 10.1.0.6, 10.2.0.5
Oracle Enterprise Manager control included in Oracle Database versions 10.1.0.5, 10.2.0.3, \
10.2.0.4, 10.2.0.5, 11.1.0.7, 11.2.0.1, 11.2.0.2 Remote exploitable:
Yes

Credits:
This vulnerability was discovered and researched by Esteban Martinez Fayo of Application \
Security, Inc.

Details:
Cross-site scripting vulnerabilities occur when an attacker tricks a legitimate web application \
into sending malicious code, generally in the form of a script, to an unsuspecting end user. \
The attack usually involves crafting a hyperlink with malicious script code embedded within it. \
A valid user is likely to click this link since it points to a resource on a trusted domain. \
The link can be posted on a web page, or sent in an instant message, or email. Clicking on the \
link executes the attacker-injected code in the context of the trusted web application. \
Typically, the code steals session cookies, which can then be used to impersonate a valid user. \
There are instances of XSS vulnerabilities in the Instance Management component of Oracle \
Enterprise Manager Grid Control.  For example the 'commentinput' parameter of \
/em/console/database/monitoring/metricDetail$type web page is vulnerable to this kind of \
attacks.

Impact:
Attackers might steal administrator's session cookies, thereby allowing the attacker to \
impersonate the valid user.

Vendor Status:
Vendor was contacted and a patch was released.

Workaround:
There is no workaround for this vulnerability.

Fix:
Apply July 2011 CPU.

CVE:
CVE-2011-0876, CVE-2011-0879

Links:
http://www.teamshatter.com/topics/general/team-shatter-exclusive/oracle-enterprise-manager-vulnerable-to-cross-site-scripting-metricdetailtype-page/
 http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html

Timeline:
Vendor Notification - 12/27/2007
Vendor Response - 12/27/2007
Fix - 7/19/2011
Public Disclosure - 7/19/2011

Application Security, Inc.'s database security solutions have helped over 2000 organizations \
secure their databases from all internal and external threats while also ensuring that those \
organizations meet or exceed regulatory compliance and audit requirements.

Disclaimer: The information in the advisory is believed to be accurate at the time of \
publishing based on currently available information. Use of the information constitutes \
acceptance for use in an AS IS condition. There are no warranties with regard to this \
information. Neither the author nor the publisher accepts any liability for any direct, \
indirect, or consequential loss or damage arising from use of, or reliance on, this \
                information.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (MingW32)

iEYEARECAAYFAk4wmDgACgkQRx91imnNIgG4eACgqMkDdlQaQFob+TyCYTzsx79E
d+8AnA/rzNLmF2nohfew5d/sO/b1q9UN
=MLQP
-----END PGP SIGNATURE-----

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic