[NEWS] Oracle Reports Server Vulnerable to Cross Site Scripting

From: SecuriTeam (support_at_securiteam.com)
Date: 03/28/05

  • Next message: SecuriTeam: "[NT] SurgeMail Webmail Multiple Vulnerabilities (Directory Traversal, Cross Site Scripting)"
    To: list@securiteam.com
    Date: 28 Mar 2005 10:30:24 +0200
    
    

    The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
    - - promotion

    The SecuriTeam alerts list - Free, Accurate, Independent.

    Get your security news from a reliable source.
    http://www.securiteam.com/mailinglist.html

    - - - - - - - - -

      Oracle Reports Server Vulnerable to Cross Site Scripting
    ------------------------------------------------------------------------

    SUMMARY

    " <http://www.oracle.com/technology/index.html> Oracle Reports is
    <http://www.oracle.com/technology/index.html> Oracle's award-winning,
    high-fidelity enterprise reporting tool. It enables businesses to give
    immediate access to information to all levels within and outside of the
    organization in an unrivaled scalable and secure environment.
    <http://www.oracle.com/technology/index.html> Oracle Reports consists of
    <http://www.oracle.com/technology/index.html> Oracle Reports Developer (a
    component of the <http://www.oracle.com/technology/index.html> Oracle
    Developer Suite) and <http://www.oracle.com/technology/index.html> Oracle
    Application Server Reports Services (a component of the
    <http://www.oracle.com/technology/index.html> Oracle Application Server)."

    Flaws in user input validation done by the sample scripts provided with
    Oracle Reports Server allows remote attackers to include arbitrary HTML
    and/or JavaScript.

    DETAILS

    Vulnerable Systems:
     * Oracle Reports Server version 10g (9.0.4.3.3)

    Exploits:
    http://example/reports/examples/Tools/test.jsp?repprod&desname='<script>alert( document.cookie );</script>
    http://example/reports/examples/Tools/test.jsp?repprod"<script>alert(
    document.cookie );</script>

    ADDITIONAL INFORMATION

    The information has been provided by <mailto:paolo.paolo@mail.ee> Paolo
    Paolo.

    ========================================

    This bulletin is sent to members of the SecuriTeam mailing list.
    To unsubscribe from the list, send mail with an empty subject line and body to: list-unsubscribe@securiteam.com
    In order to subscribe to the mailing list, simply forward this email to: list-subscribe@securiteam.com

    ====================
    ====================

    DISCLAIMER:
    The information in this bulletin is provided "AS IS" without warranty of any kind.
    In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.


  • Next message: SecuriTeam: "[NT] SurgeMail Webmail Multiple Vulnerabilities (Directory Traversal, Cross Site Scripting)"

    Relevant Pages

    • [NEWS] Oracle Reports Lexical References SQL Injection
      ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... Oracle Reports is ... these reports are using lexical references without input validation. ... (in this case Oracle Reports Developer) ...
      (Securiteam)
    • [TOOL] Fast SYN Scanner (libnet, libpcap)
      ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... struct bpf_program cfilter; ... const unsigned char *packet; ... In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages. ...
      (Securiteam)
    • [EXPL] TinyWeb Server DoS Exploit
      ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... The information in this bulletin is provided "AS IS" without warranty of any kind. ... In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages. ...
      (Securiteam)
    • [EXPL] 3Com FTP Server Buffer Overflow (CD)
      ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... overflow in its parsing of the 'CD' command. ... The information in this bulletin is provided "AS IS" without warranty of any kind. ... In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages. ...
      (Securiteam)
    • [TOOL] Automagic SQL Injector
      ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... The Automagic SQL Injector is part of the Sec-1 Exploit Arsenal provided ... The information in this bulletin is provided "AS IS" without warranty of any kind. ... In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages. ...
      (Securiteam)