Vulnerability
Oracle
Affected
Oracle
Description
Michal Zalewski found following. To understand this issue, please
take a look at following first:
oracle19.htm
The fix proposed is broken by design:
http://server/pls/somedad/%0aselect...
http://www.oracle.com/pls/oracle8i/%0aselect%09something...
...sorry for the example. Of course, as someone pointed out, you
can use for example owa_util package (owa_util.showsource might
be useful), not only abusing plain PL/SQL queries. Nasty and
tasty.
If you were vulnerable, you are still vulnerable.
Solution
Oracle has released a patch for Oracle Internet Application Server
which introduces a new configuration parameter in mod_plsql called
exclusion_list. This parameter can be used to disallow URLs with
specific formats from being passed to mod_plsql; by default it
excludes URLs with special characters such as space, tab, newline,
carriage return, single quote, and backslash. This patch is
available (patch #1554571) on Oracle's Support Services site
(http://metalink.oracle.com/); it may be found by searching on
patches for Oracle Portal or Oracle9i Application Server
Enterprise Edition.
Oracle recommends that this patch be applied to Internet
Application Server version 1.0.2.0. Internet Application Server
version 1.0.2.1, and future versions, are scheduled to include
the patch.
Note also that the Apache listener in Oracle Internet Application
Server already allows customers to define "inclusion-only" rules
in the plsql.conf configuration file. This can be used to
prevent outside user access to any PL/SQL procedure except those
for which outside user access is explicitly granted in
plsql.conf. These rules are case sensitive.
TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2025 AOH