Lucene search

K
nessusThis script is Copyright (C) 2005-2018 and is owned by Tenable, Inc. or an Affiliate thereof.ORACLE_WEB_CACHE_9I_MULTIPLE_VULNS.NASL
HistoryMay 02, 2005 - 12:00 a.m.

Oracle Application Server 9i Webcache < 9.0.4.0 Multiple Vulnerabilities

2005-05-0200:00:00
This script is Copyright (C) 2005-2018 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
14

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

EPSS

0.96

Percentile

99.5%

According to its banner, the version of Oracle Application Server 9i Webcache installed on the remote host suffers from several flaws:

  • Arbitrary File Corruption Vulnerability An attacker may be able to corrupt arbitrary files on the remote host by passing the filenames through the ‘cache_dump_file’ parameter of the ‘webcacheadmin’ script.

  • Multiple Cross-Site Scripting Vulnerabilities The ‘webcacheadmin’ script does not properly sanitize the ‘cache_dump_file’ and ‘PartialPageErrorPage’ parameters before using them in dynamically-generated web pages. An attacker may be able to exploit these flaws to conduct cross-site scripting attacks against the affected website.

Reportedly, an attacker can exploit both types of vulnerabilities to corrupt an OAS installation.

#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description) {
  script_id(18175);
  script_version("1.21");

  script_cve_id("CVE-2005-1381", "CVE-2005-1382");
  script_bugtraq_id(13420, 13421, 13422);

  script_name(english:"Oracle Application Server 9i Webcache < 9.0.4.0 Multiple Vulnerabilities");
 
 script_set_attribute(attribute:"synopsis", value:
"The remote web server is affected by multiple vulnerabilities." );
 script_set_attribute(attribute:"description", value:
"According to its banner, the version of Oracle Application Server 9i
Webcache installed on the remote host suffers from several flaws:

  - Arbitrary File Corruption Vulnerability
    An attacker may be able to corrupt arbitrary files on the 
    remote host by passing the filenames through the 
    'cache_dump_file' parameter of the 'webcacheadmin' script.

  - Multiple Cross-Site Scripting Vulnerabilities
    The 'webcacheadmin' script does not properly sanitize the
    'cache_dump_file' and 'PartialPageErrorPage' parameters
    before using them in dynamically-generated web pages. An
    attacker may be able to exploit these flaws to conduct
    cross-site scripting attacks against the affected website.

Reportedly, an attacker can exploit both types of vulnerabilities to
corrupt an OAS installation." );
 
 # http://www.red-database-security.com/advisory/oracle_webcache_append_file_vulnerabilitiy.html
 script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?43289aaa");
 # http://www.red-database-security.com/advisory/oracle_webcache_CSS_vulnerabilities.html
 script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?d4b1cbf4" );
 script_set_attribute(attribute:"solution", value:
"Contact Oracle - it's reported that they have addressed these flaws
without issuing an advisory." );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N");
 script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"true");
 script_cwe_id(20, 74, 79, 442, 629, 711, 712, 722, 725, 750, 751, 800, 801, 809, 811, 864, 900, 928, 931, 990);

 script_set_attribute(attribute:"plugin_publication_date", value: "2005/05/02");
 script_set_attribute(attribute:"vuln_publication_date", value: "2005/04/26");
 script_set_attribute(attribute:"patch_publication_date", value: "2005/04/26");
 script_cvs_date("Date: 2018/08/22 16:49:13");
 script_set_attribute(attribute:"plugin_type", value: "remote");
 script_set_attribute(attribute:"cpe", value:"cpe:/a:oracle:application_server_web_cache");
 script_end_attributes();

 
  summary["english"] = "Checks for multiple vulnerabilities in Oracle Application Server 9i Webcache < 9.0.4.0";
  script_summary(english:summary["english"]);
 
  script_category(ACT_GATHER_INFO);
  script_family(english:"Databases");

  script_copyright(english:"This script is Copyright (C) 2005-2018 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("http_version.nasl");
  script_require_ports("Services/www", 80);
  script_require_keys("www/OracleApache");

  exit(0);
}

include("global_settings.inc");
include("misc_func.inc");
include("http.inc");


port = get_http_port(default:80);
banner = get_http_banner(port:port, exit_on_fail: 1);


# Check the version number in the banner.
#
# nb: the Bugtraq advisories list 9.0.3.1 and below as vulnerable.
if (egrep(string:banner, pattern:"^Server:.*OracleAS-Web-Cache.*/(9\.0\.[0-3]\.[0-9]|2\..*)")) 
{
  security_warning(port);
  set_kb_item(name: 'www/'+port+'/XSS', value: TRUE);
}

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

EPSS

0.96

Percentile

99.5%

Related for ORACLE_WEB_CACHE_9I_MULTIPLE_VULNS.NASL