7.2 High
AI Score
Confidence
Low
4.6 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:L/Au:N/C:P/I:P/A:P
0.974 High
EPSS
Percentile
99.9%
Oracle Database Server 10g Release 2 allows local users to execute arbitrary SQL queries via the GET_DOMAIN_INDEX_METADATA function in the DBMS_EXPORT_EXTENSION package. NOTE: this issue was originally linked to DB05 (CVE-2006-1870), but a reliable third party has claimed that it is not the same issue. Based on details of the problem, the primary issue appears to be insecure privileges that facilitate the introduction of SQL in a way that is not related to special characters, so this is not “SQL injection” per se.
CPE | Name | Operator | Version |
---|---|---|---|
oracle:database_server | oracle database server | eq | * |
secunia.com/advisories/19860
securityreason.com/securityalert/802
securitytracker.com/id?1015999
www.kb.cert.org/vuls/id/932124
www.red-database-security.com/exploits/oracle-sql-injection-oracle-dbms_export_extension.html
www.securityfocus.com/archive/1/431353/100/0/threaded
www.securityfocus.com/archive/1/432078/100/0/threaded
www.securityfocus.com/archive/1/432354/100/0/threaded
www.securityfocus.com/archive/1/432355/100/0/threaded
www.securityfocus.com/archive/1/432632/30/5250/threaded
www.securityfocus.com/bid/17699
exchange.xforce.ibmcloud.com/vulnerabilities/26048