发布时间 :2002-12-31 00:00:00
修订时间 :2017-07-10 21:29:17

[原文]Cross-site scripting (XSS) vulnerability in the htp PL/SQL package for Oracle 9i Application Server (9iAS) allows remote attackers to inject arbitrary web script or HTML via the cbuf parameter to htp.print.

[CNNVD]Oracle 9i Application Server (9iAS) htp PL/SQL包跨站脚本(XSS)漏洞(CNNVD-200212-440)

        Oracle 9i Application Server (9iAS)的htp PL/SQL包存在跨站脚本(XSS)漏洞。远程攻击者借助htp.print的cbuf参数注入任意web脚本或者HTML。

- CVSS (基础分值)

CVSS分值: 4.3 [中等(MEDIUM)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)


- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(UNKNOWN)  XF  oracle-htpprint-xss(10687)

- 漏洞信息

Oracle 9i Application Server (9iAS) htp PL/SQL包跨站脚本(XSS)漏洞
中危 跨站脚本
2002-12-31 00:00:00 2005-10-20 00:00:00
        Oracle 9i Application Server (9iAS)的htp PL/SQL包存在跨站脚本(XSS)漏洞。远程攻击者借助htp.print的cbuf参数注入任意web脚本或者HTML。

- 公告与补丁


- 漏洞信息

Oracle Application Server PL/SQL Module htp.print cbuf Parameter XSS
Remote / Network Access Input Manipulation
Loss of Integrity
Exploit Public Vendor Verified

- 漏洞描述

Oracle 9iAS contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'cbuf' variable upon submission to the htp.print function of the PL/SQL HTP Package. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

- 时间线

2002-02-06 Unknow
2002-02-06 Unknow

- 解决方案

Currently, there are no known upgrades to correct this issue. However, Oracle has released a patch to address this vulnerability. It is also possible to correct the flaw by implementing the following workaround(s): access to the htp package should be disallowed by adding it as an exclusion entry to the file.

- 相关参考

- 漏洞作者