CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
EPSS
Percentile
99.5%
According to its banner, the version of Oracle Application Server 9i Webcache installed on the remote host suffers from several flaws:
Arbitrary File Corruption Vulnerability An attacker may be able to corrupt arbitrary files on the remote host by passing the filenames through the ‘cache_dump_file’ parameter of the ‘webcacheadmin’ script.
Multiple Cross-Site Scripting Vulnerabilities The ‘webcacheadmin’ script does not properly sanitize the ‘cache_dump_file’ and ‘PartialPageErrorPage’ parameters before using them in dynamically-generated web pages. An attacker may be able to exploit these flaws to conduct cross-site scripting attacks against the affected website.
Reportedly, an attacker can exploit both types of vulnerabilities to corrupt an OAS installation.
#
# (C) Tenable Network Security, Inc.
#
include("compat.inc");
if (description) {
script_id(18175);
script_version("1.21");
script_cve_id("CVE-2005-1381", "CVE-2005-1382");
script_bugtraq_id(13420, 13421, 13422);
script_name(english:"Oracle Application Server 9i Webcache < 9.0.4.0 Multiple Vulnerabilities");
script_set_attribute(attribute:"synopsis", value:
"The remote web server is affected by multiple vulnerabilities." );
script_set_attribute(attribute:"description", value:
"According to its banner, the version of Oracle Application Server 9i
Webcache installed on the remote host suffers from several flaws:
- Arbitrary File Corruption Vulnerability
An attacker may be able to corrupt arbitrary files on the
remote host by passing the filenames through the
'cache_dump_file' parameter of the 'webcacheadmin' script.
- Multiple Cross-Site Scripting Vulnerabilities
The 'webcacheadmin' script does not properly sanitize the
'cache_dump_file' and 'PartialPageErrorPage' parameters
before using them in dynamically-generated web pages. An
attacker may be able to exploit these flaws to conduct
cross-site scripting attacks against the affected website.
Reportedly, an attacker can exploit both types of vulnerabilities to
corrupt an OAS installation." );
# http://www.red-database-security.com/advisory/oracle_webcache_append_file_vulnerabilitiy.html
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?43289aaa");
# http://www.red-database-security.com/advisory/oracle_webcache_CSS_vulnerabilities.html
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?d4b1cbf4" );
script_set_attribute(attribute:"solution", value:
"Contact Oracle - it's reported that they have addressed these flaws
without issuing an advisory." );
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N");
script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_cwe_id(20, 74, 79, 442, 629, 711, 712, 722, 725, 750, 751, 800, 801, 809, 811, 864, 900, 928, 931, 990);
script_set_attribute(attribute:"plugin_publication_date", value: "2005/05/02");
script_set_attribute(attribute:"vuln_publication_date", value: "2005/04/26");
script_set_attribute(attribute:"patch_publication_date", value: "2005/04/26");
script_cvs_date("Date: 2018/08/22 16:49:13");
script_set_attribute(attribute:"plugin_type", value: "remote");
script_set_attribute(attribute:"cpe", value:"cpe:/a:oracle:application_server_web_cache");
script_end_attributes();
summary["english"] = "Checks for multiple vulnerabilities in Oracle Application Server 9i Webcache < 9.0.4.0";
script_summary(english:summary["english"]);
script_category(ACT_GATHER_INFO);
script_family(english:"Databases");
script_copyright(english:"This script is Copyright (C) 2005-2018 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("http_version.nasl");
script_require_ports("Services/www", 80);
script_require_keys("www/OracleApache");
exit(0);
}
include("global_settings.inc");
include("misc_func.inc");
include("http.inc");
port = get_http_port(default:80);
banner = get_http_banner(port:port, exit_on_fail: 1);
# Check the version number in the banner.
#
# nb: the Bugtraq advisories list 9.0.3.1 and below as vulnerable.
if (egrep(string:banner, pattern:"^Server:.*OracleAS-Web-Cache.*/(9\.0\.[0-3]\.[0-9]|2\..*)"))
{
security_warning(port);
set_kb_item(name: 'www/'+port+'/XSS', value: TRUE);
}