what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

sql_injection_reports_us.txt

sql_injection_reports_us.txt
Posted Sep 15, 2005
Authored by Alexander Kornbrust | Site red-database-security.com

Oracle Reports fails to properly sanitize user input allowing for SQL injection attacks.

tags | advisory, sql injection
SHA-256 | 1231437f23fca1da680f92cd8c0d24b09e7b06a69abcf763b7b9272ddd7ced0a

sql_injection_reports_us.txt

Change Mirror Download
########################################################################
####
Red-Database-Security GmbH - Oracle Reports Security Advisory

Generic SQL Injection Vulnerability in Oracle Reports via Lexical
References

Name Generic SQL Injection Vulnerability in Oracle
Reports
via Lexical References
Systems Affected Generated Oracle Reports using Lexical References
Severity High Risk
Category SQL Injection
Remote Exploitable Yes
Vendor URL https://www.oracle.com
Author Alexander Kornbrust (ak at
red-database-security.com)
Date 15 September 2005 (V 1.00)
Advisory-URL
https://www.red-database-security.com/wp/sql_injection_reports_us.pdf



Details
#######
Oracle Reports provides a feature called lexical references. A lexical
reference is a placeholder for text that you embed in a SELECT
statement.
It is possible to replace the clauses appearing after SELECT, FROM,
WHERE,
GROUP BY, ORDER BY, HAVING, CONNECT BY and START WITH.

If lexical references are in use it is possible to modify SQL statements
via a simple URL. After adding the parameter "paramform=yes" in the URL
a parameter form window appears (=SQL Injection with a menu).

An attacker can modify the parameter values and inject SQL statements.



Testcase
########
Executed an Oracle Report via an URL, e.g.
https://myserver:8889/reports/rwservlet?report=sqlinject3.rdf+userid=scot
t/tiger@ora9206+destype=CACHE+desformat=HTML

Add the value paramform=yes to the URL
https://myserver:8889/reports/rwservlet?report=sqlinject3.rdf+userid=scot
t/tiger@ora9206+destype=CACHE+desformat=HTML+paramform=yes

A parameter window appears. Inject the SQL statement by modifying the
values
in the parameter form and submit the query.


A detailed description including hardcopies is available in the PDF
advisory:

https://www.red-database-security.com/wp/sql_injection_reports_us.pdf
(English)
https://www.red-database-security.com/wp/sql_injection_reports_dt.pdf
(German)



Affected systems
################
All generated reports using lexical references without input validation.



Patch Information
#################
This issue is not a bug in Oracle Reports itself. It is a problem of
missing input validation in all generated Oracle Reports.



Fix
###
Validate all parameter values before the SQL statement is executed in an

After-Parameter-Form-Trigger.



History
#######
14-may-2004 Oracle secalert was informed to give them time to fix their
reports in the E-Business Suite.

15-sep-2005 Red-Database-Security published this advisory



(c) 2005 by Red-Database-Security GmbH
https://www.red-database-security.com
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close