Vulnerabilities > CVE-2005-1382 - File Corruption vulnerability in Oracle Application Server 9i Webcache Arbitrary

047910
CVSS 5.0 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
PARTIAL
Availability impact
NONE
network
low complexity
oracle
nessus
exploit available

Summary

The webcacheadmin module in Oracle Webcache 9i allows remote attackers to corrupt arbitrary files via a full pathname in the cache_dump_file parameter.

Vulnerable Configurations

Part Description Count
Application
Oracle
1

Exploit-Db

descriptionOracle Application Server 9i Webcache Arbitrary File Corruption Vulnerability. CVE-2005-1382 . Remote exploits for multiple platform
idEDB-ID:25561
last seen2016-02-03
modified2005-04-28
published2005-04-28
reporterAlexander Kornbrust
sourcehttps://www.exploit-db.com/download/25561/
titleOracle Application Server 9i Webcache Arbitrary File Corruption Vulnerability

Nessus

NASL familyDatabases
NASL idORACLE_WEB_CACHE_9I_MULTIPLE_VULNS.NASL
descriptionAccording to its banner, the version of Oracle Application Server 9i Webcache installed on the remote host suffers from several flaws: - Arbitrary File Corruption Vulnerability An attacker may be able to corrupt arbitrary files on the remote host by passing the filenames through the
last seen2020-06-01
modified2020-06-02
plugin id18175
published2005-05-02
reporterThis script is Copyright (C) 2005-2018 and is owned by Tenable, Inc. or an Affiliate thereof.
sourcehttps://www.tenable.com/plugins/nessus/18175
titleOracle Application Server 9i Webcache < 9.0.4.0 Multiple Vulnerabilities
code
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description) {
  script_id(18175);
  script_version("1.21");

  script_cve_id("CVE-2005-1381", "CVE-2005-1382");
  script_bugtraq_id(13420, 13421, 13422);

  script_name(english:"Oracle Application Server 9i Webcache < 9.0.4.0 Multiple Vulnerabilities");
 
 script_set_attribute(attribute:"synopsis", value:
"The remote web server is affected by multiple vulnerabilities." );
 script_set_attribute(attribute:"description", value:
"According to its banner, the version of Oracle Application Server 9i
Webcache installed on the remote host suffers from several flaws:

  - Arbitrary File Corruption Vulnerability
    An attacker may be able to corrupt arbitrary files on the 
    remote host by passing the filenames through the 
    'cache_dump_file' parameter of the 'webcacheadmin' script.

  - Multiple Cross-Site Scripting Vulnerabilities
    The 'webcacheadmin' script does not properly sanitize the
    'cache_dump_file' and 'PartialPageErrorPage' parameters
    before using them in dynamically-generated web pages. An
    attacker may be able to exploit these flaws to conduct
    cross-site scripting attacks against the affected website.

Reportedly, an attacker can exploit both types of vulnerabilities to
corrupt an OAS installation." );
 
 # http://www.red-database-security.com/advisory/oracle_webcache_append_file_vulnerabilitiy.html
 script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?43289aaa");
 # http://www.red-database-security.com/advisory/oracle_webcache_CSS_vulnerabilities.html
 script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?d4b1cbf4" );
 script_set_attribute(attribute:"solution", value:
"Contact Oracle - it's reported that they have addressed these flaws
without issuing an advisory." );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N");
 script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"true");
 script_cwe_id(20, 74, 79, 442, 629, 711, 712, 722, 725, 750, 751, 800, 801, 809, 811, 864, 900, 928, 931, 990);

 script_set_attribute(attribute:"plugin_publication_date", value: "2005/05/02");
 script_set_attribute(attribute:"vuln_publication_date", value: "2005/04/26");
 script_set_attribute(attribute:"patch_publication_date", value: "2005/04/26");
 script_cvs_date("Date: 2018/08/22 16:49:13");
 script_set_attribute(attribute:"plugin_type", value: "remote");
 script_set_attribute(attribute:"cpe", value:"cpe:/a:oracle:application_server_web_cache");
 script_end_attributes();

 
  summary["english"] = "Checks for multiple vulnerabilities in Oracle Application Server 9i Webcache < 9.0.4.0";
  script_summary(english:summary["english"]);
 
  script_category(ACT_GATHER_INFO);
  script_family(english:"Databases");

  script_copyright(english:"This script is Copyright (C) 2005-2018 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("http_version.nasl");
  script_require_ports("Services/www", 80);
  script_require_keys("www/OracleApache");

  exit(0);
}

include("global_settings.inc");
include("misc_func.inc");
include("http.inc");


port = get_http_port(default:80);
banner = get_http_banner(port:port, exit_on_fail: 1);


# Check the version number in the banner.
#
# nb: the Bugtraq advisories list 9.0.3.1 and below as vulnerable.
if (egrep(string:banner, pattern:"^Server:.*OracleAS-Web-Cache.*/(9\.0\.[0-3]\.[0-9]|2\..*)")) 
{
  security_warning(port);
  set_kb_item(name: 'www/'+port+'/XSS', value: TRUE);
}