Vulnerabilities > CVE-2009-1987 - Remote vulnerability in Oracle PeopleSoft Enterprise PeopleTools

047910
CVSS 5.0 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
PARTIAL
Availability impact
NONE
network
low complexity
oracle
nessus

Summary

Unspecified vulnerability in the PeopleSoft Enterprise PeopleTools - Enterprise Portal component in Oracle PeopleSoft Enterprise and JD Edwards EnterpriseOne 8.49.21 allows remote attackers to affect integrity via unknown vectors.

Vulnerable Configurations

Part Description Count
Application
Oracle
2

Nessus

NASL familyCGI abuses : XSS
NASL idPEOPLESOFT_JMSLCA_ACTIVITY_XSS.NASL
descriptionThe remote web server is running an instance of PeopleSoft PeopleTools that fails to sanitize user-supplied input to the
last seen2020-06-01
modified2020-06-02
plugin id42352
published2009-10-29
reporterThis script is Copyright (C) 2009-2018 and is owned by Tenable, Inc. or an Affiliate thereof.
sourcehttps://www.tenable.com/plugins/nessus/42352
titlePeopleSoft PeopleTools JMS Listening Connector Activity Parameter XSS
code
#
# (C) Tenable Network Security, Inc.
#


include("compat.inc");


if (description)
{
  script_id(42352);
  script_version("1.15");
  script_cvs_date("Date: 2018/08/22 16:49:13");

  script_cve_id("CVE-2009-1987");
  script_bugtraq_id(35691);

  script_name(english:"PeopleSoft PeopleTools JMS Listening Connector Activity Parameter XSS");
  script_summary(english:"Tries to inject script code into JMS Listening Connector Administrator interface");

  script_set_attribute(
    attribute:"synopsis",
    value:
"The remote web server hosts an application that is prone to a
cross-site scripting attack."
  );
  script_set_attribute(
    attribute:"description", 
    value:
"The remote web server is running an instance of PeopleSoft PeopleTools
that fails to sanitize user-supplied input to the 'Activity' parameter
on submission to the JMS Listening Connector Administrator interface
before using it to generate dynamic HTML output.  An attacker may be
able to leverage this to inject arbitrary HTML and script code into a
user's browser to be executed within the security context of the
affected site."
  );
   # http://www.oracle.com/technetwork/topics/security/whatsnew/index.html
  script_set_attribute(
    attribute:"see_also", 
    value:"http://www.nessus.org/u?e1e87349"
  );
  script_set_attribute(
    attribute:"solution", 
    value:"Upgrade to version 8.49.22 or later."
  );
  script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N");
  script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
  script_set_attribute(attribute:"exploit_available", value:"false");
  script_cwe_id(20, 74, 79, 442, 629, 711, 712, 722, 725, 750, 751, 800, 801, 809, 811, 864, 900, 928, 931, 990);

  script_set_attribute(attribute:"vuln_publication_date", value:"2009/07/27");
  script_set_attribute(attribute:"patch_publication_date", value:"2009/07/14");
  script_set_attribute(attribute:"plugin_publication_date", value:"2009/10/29");

  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:oracle:peoplesoft_enterprise_peopletools");
  script_end_attributes();

  script_category(ACT_ATTACK);
  script_family(english:"CGI abuses : XSS");

  script_copyright(english:"This script is Copyright (C) 2009-2018 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("http_version.nasl");
  script_exclude_keys("Settings/disable_cgi_scanning");
  script_require_ports("Services/www", 3000);

  exit(0);
}


include("global_settings.inc");
include("misc_func.inc");
include("http.inc");
include("url_func.inc");


port = get_http_port(default:3000);


# Unless we're being paranoid, make sure the banner looks like PeopleSoft.
if (report_paranoia < 2)
{
  banner = get_http_banner(port:port);
  if (! banner) exit(1, "No HTTP banner on port "+port);
  if ("X-Powered-By: Servlet/" >!< banner) exit(0, "Server response header on port "+port+" suggests it's not PeopleSoft.");
}


# Try to exploit the issue.
alert = string("alert('", SCRIPT_NAME, "');");
test_cgi_xss(
  port     : port,
  cgi      : "/JMSListeningConnectorAdministrator",
  dirs     : make_list("/PSIGW"),
  qs       : "Activity="+urlencode(str:alert),
  pass_str : alert,
  pass2_re : "<H3>JMSListeningConnector"
);