what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

rwcgi60.env.txt

rwcgi60.env.txt
Posted Jul 18, 2002
Authored by Skp | Site sec.angrypacket.com

Angrypacket Security Advisory - The CGI rwcgi60 which comes with the Oracle Reports Server gives away the contents of several environment variables to attackers, disclosing version information and full paths.

tags | cgi
SHA-256 | 0dfc187b0a6a2ff236da8d5333f2a0cdb6828869ef33bf29a0127ee64b318393

rwcgi60.env.txt

Change Mirror Download
                  - -- ------------------------- -- -
[>(] AngryPacket Security Advisory [>(]
- -- ------------------------- -- -

+--------------------- -- -
+ advisory information
+------------------ -- -
author: skp <skp@bigunz.angrypacket.com>
release date: 07/17/2002
homepage: http://sec.angrypacket.com
advisory id: 0x0004

+-------------------- -- -
+ product information
+----------------- -- -
software: Oracle Reports Server
vendor: Oracle
homepage: http://www.oracle.com
description: Reports Server is a commercially available
reporting package distributed by Oracle.

+---------------------- -- -
+ vulnerability details
+------------------- -- -
problem: Information Disclosure
affected: Oracle Reports Server
explanation: Oracle reports server happily reports an excessive amount
of
system information to unauthenticated remote users. Seems
that
someone likes verbose debugging. These variables include:

# PATH
D:\ORACLE\iSuites\Apache\fastcg;D:\ORACLE\806\jdk\bin
# ORACLE_HOME D:\ORACLE\806
# REPORTS60_PATH D:\WEB_REPORTS
# REPORTS60_TMP D:\ORACLE\806\REPORT60\TMP

Also, rwcgi60 likes to make sure you know versions:
# Oracle Reports Server CGI60 version 6.0, a Win32
executable
# Oracle_Web_Listener/4.0.7.0.0 Enterprise Edition

Oh and don't forget the last few lines:
# Stdin is empty.
# CGI Command Line is used
# main.argv[0] d:\oracle\806\tools\web60\cgi\rwcgi60.EXE

This level of information should not be given out to the
public,
someone could poke an eye out with that stuff. An attacker
could
use information gleaned from rwcgi60 to identify vulnerable
software, dev kits, etc installed on the system which
could be
used as points of entry.

risk: At this time rwcgi60 offers no more than excessive
information
disclosure so this is classified as a low risk exposure.

status: Vendor was notified 07/09/02

exploit: http://some.site.com/cgi-bin/rwcgi60
http://some.site.com/cgi-bin/rwcgi60/showenv

fix: Configuration issue. See Oracle note 133957.1 -
Restricting Access
to the Reports Server Environment and Output.

+-------- -- -
+ credits
+----- -- -
Bug was found by skp of AngryPacket security group.

+----------- -- -
+ disclaimer
+-------- -- -
The contents of this advisory are Copyright (c) 2002 AngryPacket
Security, and may be distributed freely provided that no fee is charged
for distribution and that proper credit is given. As such, AngryPacket
Security group, collectively or individually, shall not be held liable
or responsible for the misuse of any information contained herein.

- -- ------------------------- -- -
[>(] AngryPacket Security Advisory [>(]
- -- ------------------------- -- -

Login or Register to add favorites

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    27 Files
  • 13
    Aug 13th
    18 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close