Oracle Application Server Forms Temporary File Cleartext Password Disclosure

2005-07-12T10:29:54
ID OSVDB:18034
Type osvdb
Reporter Alexander Kornbrust(ak@red-database-security.com)
Modified 2005-07-12T10:29:54

Description

Vulnerability Description

Oracle Application Server Forms Builder contains a flaw that may lead to an unauthorized password exposure. It is possible to gain access to plaintext passwords when Forms Builder creates files in the temp directory which contain the username and password of the current database connection, which may lead to a loss of confidentiality.

Technical Description

An attacker must supply valid authentication credentials in order to exploit this vulnerability.

Solution Description

Currently, there are no known workarounds or upgrades to correct this issue. However, Oracle has released a patch (Critical Patch Update - July 2005) to address this vulnerability.

Short Description

Oracle Application Server Forms Builder contains a flaw that may lead to an unauthorized password exposure. It is possible to gain access to plaintext passwords when Forms Builder creates files in the temp directory which contain the username and password of the current database connection, which may lead to a loss of confidentiality.

References:

Vendor Specific Advisory URL Security Tracker: 1014466 Secunia Advisory ID:15991 Secunia Advisory ID:16121 Other Advisory URL: http://www.red-database-security.com/advisory/oracle_formsbuilder_temp_file_issue.html Other Advisory URL: http://sunsolve.sun.com/search/document.do?assetkey=1-26-101782-1 Other Advisory URL: http://www.us-cert.gov/cas/techalerts/TA04-245A.html Keyword: AS06 ISS X-Force ID: 21343 Generic Informational URL: http://www.eweek.com/article2/0,1895,1836304,00.asp CVE-2005-2293 CERT VU: 435974 Bugtraq ID: 14238