Vulnerabilities > CVE-2010-0904 - Unspecified vulnerability in Oracle Secure Backup 10.3.0.1
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Unspecified vulnerability in Oracle Secure Backup 10.3.0.1 allows remote attackers to affect integrity via unknown vectors.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Exploit-Db
description | Oracle Secure Backup Authentication Bypass/Command Injection Vulnerability. CVE-2010-0904. Webapps exploit for php platform |
id | EDB-ID:17698 |
last seen | 2016-02-02 |
modified | 2011-08-19 |
published | 2011-08-19 |
reporter | metasploit |
source | https://www.exploit-db.com/download/17698/ |
title | Oracle Secure Backup Authentication Bypass/Command Injection Vulnerability |
Metasploit
description This module exploits an authentication bypass vulnerability in login.php in order to execute arbitrary code via a command injection vulnerability in property_box.php. This module was tested against Oracle Secure Backup version 10.3.0.1.0 (Win32). id MSF:AUXILIARY/ADMIN/ORACLE/OSB_EXECQR3 last seen 2020-06-14 modified 1976-01-01 published 1976-01-01 references https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0904 reporter Rapid7 source https://github.com/rapid7/metasploit-framework/blob/master//modules/auxiliary/admin/oracle/osb_execqr3.rb title Oracle Secure Backup Authentication Bypass/Command Injection Vulnerability description This module exploits an authentication bypass vulnerability in login.php. In conjunction with the authentication bypass issue, the 'jlist' parameter in property_box.php can be used to execute arbitrary system commands. This module was tested against Oracle Secure Backup version 10.3.0.1.0 id MSF:EXPLOIT/WINDOWS/HTTP/OSB_UNAME_JLIST last seen 2019-11-29 modified 2017-09-14 published 2011-08-19 references https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0904 reporter Rapid7 source https://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/windows/http/osb_uname_jlist.rb title Oracle Secure Backup Authentication Bypass/Command Injection Vulnerability
Nessus
NASL family | CGI abuses |
NASL id | ORACLE_SECURE_BACKUP_UNAME_AUTH_BYPASS.NASL |
description | The remote version of Oracle Secure Backup Administration Server fails to correctly validate a successful login based on the input passed to |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 47747 |
published | 2010-07-16 |
reporter | This script is Copyright (C) 2010-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/47747 |
title | Oracle Secure Backup Administration Server login.php Authentication Bypass |
code |
|
Packetstorm
data source | https://packetstormsecurity.com/files/download/104266/osb_uname_jlist.rb.txt |
id | PACKETSTORM:104266 |
last seen | 2016-12-05 |
published | 2011-08-21 |
reporter | MC |
source | https://packetstormsecurity.com/files/104266/Oracle-Secure-Backup-Authentication-Bypass-Command-Injection-Vulnerability.html |
title | Oracle Secure Backup Authentication Bypass/Command Injection Vulnerability |
References
- http://securityreason.com/securityalert/8354
- http://securityreason.com/securityalert/8354
- http://securityreason.com/securityalert/8356
- http://securityreason.com/securityalert/8356
- http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html