CVE-2004-2115
CVSS6.8
发布时间 :2004-12-31 00:00:00
修订时间 :2016-10-17 23:06:29
NMCOES    

[原文]Multiple cross-site scripting (XSS) vulnerabilities in Oracle HTTP Server 1.3.22, based on Apache, allow remote attackers to execute arbitrary script as other users via the (1) action, (2) username, or (3) password parameters in an isqlplus request.


[CNNVD]Oracle HTTP Server isqlplus跨站脚本漏洞(CNNVD-200412-474)

        基于Apache的Oracle HTTP Server 1.3.22版本存在多个跨站脚本漏洞。远程攻击者像其他用户一样,借助多个参数执行任意脚本,这些参数包括:(1) action,(2)username,或者(3)isqlplus请求中的password参数。

- CVSS (基础分值)

CVSS分值: 6.8 [中等(MEDIUM)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

cpe:/a:oracle:http_server:8.1.7Oracle HTTP Server 8.1.7
cpe:/a:oracle:http_server:9.2.0Oracle HTTP Server 9.2.0
cpe:/a:oracle:http_server:9.0.1Oracle HTTP Server 9.0.1

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2115
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2004-2115
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200412-474
(官方数据源) CNNVD

- 其它链接及资源

http://marc.info/?l=bugtraq&m=107496560106967&w=2
(UNKNOWN)  BUGTRAQ  20040124 Oracle HTTP Server Cross Site Scripting Vulnerabillity
http://www.securityfocus.com/bid/9484
(UNKNOWN)  BID  9484
http://xforce.iss.net/xforce/xfdb/14930
(UNKNOWN)  XF  oraclehttpserver-isqlplus-xss(14930)

- 漏洞信息

Oracle HTTP Server isqlplus跨站脚本漏洞
中危 跨站脚本
2004-12-31 00:00:00 2006-12-27 00:00:00
远程  
        基于Apache的Oracle HTTP Server 1.3.22版本存在多个跨站脚本漏洞。远程攻击者像其他用户一样,借助多个参数执行任意脚本,这些参数包括:(1) action,(2)username,或者(3)isqlplus请求中的password参数。

- 公告与补丁

        Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com .

- 漏洞信息 (23593)

Oracle HTTP Server 8.1.7/9.0.1/9.2 isqlplus Cross-Site Scripting Vulnerability (EDBID:23593)
multiple remote
2004-01-24 Verified
0 Rafel Ivgi The-Insider
N/A [点击下载]
source: http://www.securityfocus.com/bid/9484/info

Oracle HTTP Server is reportedly prone to a cross-site scripting issue. This could permit a remote attacker to create a malicious link to the web server that includes hostile HTML and script code. If this link were followed, the hostile code may be rendered in the web browser of the victim user. This would occur in the security context of the web server and may allow for theft of cookie-based authentication credentials or other attacks. 

http://<host>/isqlplus?action=logon&username=sdfds%22%3e%3cscript%3ealert('XSS')%3c/script%3e\&password=dsfsd%3cscript%3ealert('XSS')%3c/script%3e

http://<host>/isqlplus?action=<script>alert('XSS')</script> 		

- 漏洞信息

34297
Oracle HTTP Server isqlplus Request Multiple Parameter XSS
Remote / Network Access Input Manipulation
Loss of Integrity

- 漏洞描述

Unknown or Incomplete

- 时间线

2004-01-24 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Oracle HTTP Server isqlplus Cross-Site Scripting Vulnerability
Input Validation Error 9484
Yes No
2004-01-24 12:00:00 2009-07-12 02:06:00
Discovery credited to Rafel Ivgi, The-Insider <theinsider@012.net.il>.

- 受影响的程序版本

Oracle Oracle HTTP Server 9.2 .0
+ Apache Software Foundation Apache 1.3.22
Oracle Oracle HTTP Server 9.0.1
Oracle Oracle HTTP Server 8.1.7
+ Apache Software Foundation Apache 1.3.12
+ Oracle Oracle8 8.1.7
+ Oracle Oracle8i Enterprise Edition 8.1.7 .0.0
+ Oracle Oracle8i Standard Edition 8.1.7

- 漏洞讨论

Oracle HTTP Server is reportedly prone to a cross-site scripting issue. This could permit a remote attacker to create a malicious link to the web server that includes hostile HTML and script code. If this link were followed, the hostile code may be rendered in the web browser of the victim user. This would occur in the security context of the web server and may allow for theft of cookie-based authentication credentials or other attacks.

- 漏洞利用

The following proof of concepts were supplied:

http://&lt;host&gt;/isqlplus?action=logon&amp;username=sdfds%22%3e%3cscript%3ealert('XSS')%3c/script%3e\&amp;password=dsfsd%3cscript%3ealert('XSS')%3c/script%3e

http://&lt;host&gt;/isqlplus?action=&lt;script&gt;alert('XSS')&lt;/script&gt;

- 解决方案

Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站