Vulnerabilities > CVE-2003-1193 - SQL Injection vulnerability in Oracle9iAS Portal Component

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
oracle
nessus

Summary

Multiple SQL injection vulnerabilities in the Portal DB (1) List of Values (LOVs), (2) Forms, (3) Hierarchy, and (4) XML components packages in Oracle Oracle9i Application Server 9.0.2.00 through 3.0.9.8.5 allow remote attackers to execute arbitrary SQL commands via the URL.

Nessus

NASL familyDatabases
NASL idORACLE9I_PORTALDEMO_ORGCHART.NASL
descriptionIt is possible to access a demo (PORTAL_DEMO.ORG_CHART) script on the remote host. Access to these pages should be restricted because it may be possible to abuse this demo for SQL Injection attacks. Additional components of the Portal have been reported as vulnerable to SQL injection attacks but Nessus has not tested for these.
last seen2020-06-01
modified2020-06-02
plugin id11918
published2003-11-09
reporterThis script is Copyright (C) 2003-2018 Frank Berger.
sourcehttps://www.tenable.com/plugins/nessus/11918
titleOracle PORTAL_DEMO.ORG_CHART SQL Injection
code
#
# This script was written by Frank Berger <[email protected]>
# <http://www.fm-berger.de>
#
# License: GPL v 2.0  http://www.gnu.org/copyleft/gpl.html
#
# See the Nessus Scripts License for details
#

# Changes by Tenable:
# - Revised plugin title, enhanced description, replaced 404 URL (6/10/09)

include("compat.inc");

if (description)
{
 script_id(11918);
 script_version("1.21");
 script_set_attribute(attribute:"plugin_modification_date", value:"2020/06/12");

 script_cve_id("CVE-2003-1193");
 script_bugtraq_id(8966);

 script_name(english:"Oracle PORTAL_DEMO.ORG_CHART SQL Injection");
 script_summary(english:"Tests for presence of Oracle PORTAL_DEMO.ORG_CHART");

 script_set_attribute(attribute:"synopsis", value:"The remote may be vulnerable to SQL injection attacks.");
 script_set_attribute(attribute:"description", value:
"It is possible to access a demo (PORTAL_DEMO.ORG_CHART) script on the
remote host. Access to these pages should be restricted because it may
be possible to abuse this demo for SQL Injection attacks.

Additional components of the Portal have been reported as vulnerable
to SQL injection attacks but Nessus has not tested for these.");
 # http://web.archive.org/web/20031106062404/http://otn.oracle.com/deploy/security/pdf/2003alert61.pdf
 script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?799792be");
 script_set_attribute(attribute:"solution", value:
"Remove the Execute for Public grant from the PL/SQL package in schema
PORTAL_DEMO (REVOKE execute ON portal_demo.org_chart FROM public;).
Please check also Oracle Security Alert 61 for patch-information.");
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
 script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"false");

 script_set_attribute(attribute:"vuln_publication_date", value:"2003/11/03");
 script_set_attribute(attribute:"patch_publication_date", value:"2003/11/03");
 script_set_attribute(attribute:"plugin_publication_date", value:"2003/11/09");

 script_set_attribute(attribute:"potential_vulnerability", value:"true");
 script_set_attribute(attribute:"plugin_type", value:"remote");
 script_set_attribute(attribute:"cpe", value:"cpe:/a:oracle:application_server_portal");
 script_end_attributes();

 script_category(ACT_GATHER_INFO);
 script_copyright(english:"This script is Copyright (C) 2003-2020 Frank Berger.");
 script_family(english:"Databases");

 script_dependencie("http_version.nasl");
 script_require_keys("www/OracleApache", "Settings/ParanoidReport");
 script_require_ports("Services/www", 80, 7777, 7778, 7779);

 exit(0);
}

include("audit.inc");
include("http_func.inc");
include("http_keepalive.inc");
include("global_settings.inc");

# No way to know for sure if the DEMO is part of Oracle 9i, or newer
# fusion Middleware.  Also, this vulnerability can be patched, and the
# plugin doesn't actually exploit it.
if (report_paranoia < 2) audit(AUDIT_PARANOID);

port = get_http_port(default:80, embedded:TRUE);

# Make a request for the Admin_ interface.
 req = http_get(item:"/pls/portal/PORTAL_DEMO.ORG_CHART.SHOW", port:port);
 res = http_keepalive_send_recv(port:port, data:req);
 if ( res == NULL ) exit(0);
 if( "Organization Chart" >< res )
 {
 	security_hole(port);
	set_kb_item(name: 'www/'+port+'/SQLInjection', value: TRUE);
 }