Lucene search

K
nessusThis script is Copyright (C) 2003-2020 Frank Berger.ORACLE9I_PORTALDEMO_ORGCHART.NASL
HistoryNov 09, 2003 - 12:00 a.m.

Oracle PORTAL_DEMO.ORG_CHART SQL Injection

2003-11-0900:00:00
This script is Copyright (C) 2003-2020 Frank Berger.
www.tenable.com
70

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.002 Low

EPSS

Percentile

64.7%

It is possible to access a demo (PORTAL_DEMO.ORG_CHART) script on the remote host. Access to these pages should be restricted because it may be possible to abuse this demo for SQL Injection attacks.

Additional components of the Portal have been reported as vulnerable to SQL injection attacks but Nessus has not tested for these.

#
# This script was written by Frank Berger <[email protected]>
# <http://www.fm-berger.de>
#
# License: GPL v 2.0  http://www.gnu.org/copyleft/gpl.html
#
# See the Nessus Scripts License for details
#

# Changes by Tenable:
# - Revised plugin title, enhanced description, replaced 404 URL (6/10/09)

include("compat.inc");

if (description)
{
 script_id(11918);
 script_version("1.21");
 script_set_attribute(attribute:"plugin_modification_date", value:"2020/06/12");

 script_cve_id("CVE-2003-1193");
 script_bugtraq_id(8966);

 script_name(english:"Oracle PORTAL_DEMO.ORG_CHART SQL Injection");
 script_summary(english:"Tests for presence of Oracle PORTAL_DEMO.ORG_CHART");

 script_set_attribute(attribute:"synopsis", value:"The remote may be vulnerable to SQL injection attacks.");
 script_set_attribute(attribute:"description", value:
"It is possible to access a demo (PORTAL_DEMO.ORG_CHART) script on the
remote host. Access to these pages should be restricted because it may
be possible to abuse this demo for SQL Injection attacks.

Additional components of the Portal have been reported as vulnerable
to SQL injection attacks but Nessus has not tested for these.");
 # http://web.archive.org/web/20031106062404/http://otn.oracle.com/deploy/security/pdf/2003alert61.pdf
 script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?799792be");
 script_set_attribute(attribute:"solution", value:
"Remove the Execute for Public grant from the PL/SQL package in schema
PORTAL_DEMO (REVOKE execute ON portal_demo.org_chart FROM public;).
Please check also Oracle Security Alert 61 for patch-information.");
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
 script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"false");

 script_set_attribute(attribute:"vuln_publication_date", value:"2003/11/03");
 script_set_attribute(attribute:"patch_publication_date", value:"2003/11/03");
 script_set_attribute(attribute:"plugin_publication_date", value:"2003/11/09");

 script_set_attribute(attribute:"potential_vulnerability", value:"true");
 script_set_attribute(attribute:"plugin_type", value:"remote");
 script_set_attribute(attribute:"cpe", value:"cpe:/a:oracle:application_server_portal");
 script_end_attributes();

 script_category(ACT_GATHER_INFO);
 script_copyright(english:"This script is Copyright (C) 2003-2020 Frank Berger.");
 script_family(english:"Databases");

 script_dependencie("http_version.nasl");
 script_require_keys("www/OracleApache", "Settings/ParanoidReport");
 script_require_ports("Services/www", 80, 7777, 7778, 7779);

 exit(0);
}

include("audit.inc");
include("http_func.inc");
include("http_keepalive.inc");
include("global_settings.inc");

# No way to know for sure if the DEMO is part of Oracle 9i, or newer
# fusion Middleware.  Also, this vulnerability can be patched, and the
# plugin doesn't actually exploit it.
if (report_paranoia < 2) audit(AUDIT_PARANOID);

port = get_http_port(default:80, embedded:TRUE);

# Make a request for the Admin_ interface.
 req = http_get(item:"/pls/portal/PORTAL_DEMO.ORG_CHART.SHOW", port:port);
 res = http_keepalive_send_recv(port:port, data:req);
 if ( res == NULL ) exit(0);
 if( "Organization Chart" >< res )
 {
 	security_hole(port);
	set_kb_item(name: 'www/'+port+'/SQLInjection', value: TRUE);
 }
VendorProductVersionCPE
oracleapplication_server_portalcpe:/a:oracle:application_server_portal

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.002 Low

EPSS

Percentile

64.7%

Related for ORACLE9I_PORTALDEMO_ORGCHART.NASL