search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Oracle 9iAS contains cross-site scripting vulnerability in "htp.print"

Vulnerability Note VU#798611

Original Release Date: 2002-03-06 | Last Revised: 2002-03-06

Overview

Oracle 9i Application Servers are vulnerable to a cross-site scripting vulnerability. The server may inadvertently include malicious HTML tags or script(JavaScript, VBScript, Java, etc.) in a dynamically generated page based on unvalidated input from untrustworthy sources. This can be a problem when a web server does not adequately ensure that generated pages are properly encoded to prevent unintended execution of scripts, and when input is not validated to prevent malicious HTML from being presented to the user.

Description

On Oracle 9i Application Servers, it is possible to use a "cross-site" scripting technique to inject malicious script (JavaScript, VBScript, etc.) or HTML into a web page. Specifically, default access to the "htp" PL/SQL package can be used to exploit this vulnerability. This package is used to export HTML and HTML tags.


The essence of cross-site scripting is that an intruder causes a legitimate web server to send a page to a victim's web browser that contains malicious script or HTML of the intruder's choosing. The malicious script runs with the privileges of a legitimate script originating from the legitimate web server.

Oracle 9i Application Servers, and several other server applications are vulnerable to such an technique via various methods. For more details on Cross-Site Scripting please see CERT Advisory CA-2000-02.

Impact

The victim will be presented with information which the compromised site did not wish their visitors to be subjected. This could be used to "sniff" sensitive data from within the web page, including passwords, credit card numbers, and any arbitrary information the user inputs.

Solution

Oracle has released an alert to address this issue (Section 1-e). Oracle has released a the following patches for the following systems at http://metalink.oracle.com:

Oracle9iAS, v1.0.2.x

Platform\tPatch Number

Sun Solaris \t2209455
Windows \t2209455

Oracle9i Database, Release 9.0.1

Platform \tPatch Number

Sun Solaris \t2209455
Windows \t2209455

Oracle8i Database, Release 8.1.7.x

Platform \tPatch Number

Sun Solaris \t2209455
Windows \t2209455

A web master may change the default error page to not include the file name passed in by any user. The client may disable JavaScript (or VBScript or other scripting languages), but it doesn't address the problem of simply inserting malicious HTML, and it can cause undesired functionality.

Vendor Information

798611
 

Oracle Affected

Notified:  February 08, 2002 Updated: March 06, 2002

Status

Affected

Vendor Statement

See, http://otn.oracle.com/deploy/security/pdf/ias_modplsql_alert.pdf

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.


CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

Our thanks to David Litchfield for discovering this instance of a Cross-Site Scripting vulnerability.

This document was written by Jason Rafail.

Other Information

CVE IDs: None
CERT Advisory: CA-2000-02
Severity Metric: 4.22
Date Public: 2002-02-06
Date First Published: 2002-03-06
Date Last Updated: 2002-03-06 14:26 UTC
Document Revision: 18

Sponsored by CISA.