Lucene search

K
erpscanERPScanERPSCAN-09-029
HistoryMar 03, 2009 - 12:00 a.m.

Oracle BI Publisher — Response Splitting

2009-03-0300:00:00
erpscan.io
48

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.002 Low

EPSS

Percentile

53.5%

Application: Oracle Business Intelligence Enterprise Edition (10.1.3.4.0) **Versions Affected:**Oracle Business Intelligence Enterprise Edition (10.1.3.4.0) Vendor URL:<http://www.oracle.com> **Bugs:**Response Splitting, XSS, Phishing credentials **Exploits:**YES **Reported:**03.03.2009 **Vendor response:**04.03.2009 **Last response:**05.03.2009 **Tracking number:**14088913 **Date of Public Advisory:**25.10.2010 **CVE:**CVE-2010-2413 Author: Alexandr Polyakov

Description
Response Splitting Vulnerability found in script /xmlpserver vulnerable parameter «_xuil» If we send request whith CRLF sumbols in «_xuil» parameter we can generate own server request.

Business Risk
An attacker can use XSS vulnerability by sending a link on malicious script to an unaware user via an e-mail, messaging or social networks. The end user browser has no way to know that the script should not be trusted, and will execute the script. The malicious script can get an access to any cookies, session tokens, or other sensitive information retained by your browser and used with SAP web applications like Portal, CRM, SRM and others. This script can even rewrite the content of an HTML page. Thus, an attacker can gain access to user session and gain control on business-critical information which can be accessed by victim.

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.002 Low

EPSS

Percentile

53.5%