Visit our newest sister site!
Hundreds of free aircraft flight manuals
Civilian • Historical • Military • Declassified • FREE!

TUCoPS :: Oracle :: o-017.txt

SQL Injection Vulnerability in Oracle9i Application Server (CIAC O-017)


                       The U.S. Department of Energy
                   Computer Incident Advisory Capability
                           ___  __ __    _     ___
                          /       |     /_\   /
                          \___  __|__  /   \  \___

                             INFORMATION BULLETIN

        Oracle SQL Injection Vulnerability in Oracle9i Application Server
                          [Oracle Security Alert #61]

November 4, 2003 20:00 GMT                                        Number O-017
PROBLEM:       A knowledgeable, malicious and unauthenticated user can 
               potentially inject a SQL script through a URL in order to gain 
               unauthorized access to user data in Oracle9i Application 
PLATFORM:      Oracle9i Application Server Portal Release 1, v3. (and 
               Oracle9i Application Server Portal Release 2, v9. (and 
DAMAGE:        An unauthenticated user can gain unauthorized access to user 
SOLUTION:      Update to the patch. 
VULNERABILITY  The risk is MEDIUM. Unauthenticated users can gain unauthorized 
ASSESSMENT:    access to user data. 
[***** Start Oracle Security Alert #61 *****]

Oracle Security Alert #61
Dated: 3 November 2003
Severity: 1

SQL Injection Vulnerability in Oracle9i Application Server

A potential security vulnerability has been discovered in the Portal 
component of Oracle9i Application Server, Release 9.0.2. A knowledgeable, 
malicious and unauthenticated user can potentially inject a SQL script 
through a URL in order to gain unauthorized access to user data in Oracle9i 
Application Server.

Products Affected
• Oracle9i Application Server Portal Release 1, v (and earlier)
• Oracle9i Application Server Portal Release 2, v (and earlier)

Portal version and onwards are not vulnerable.

Components affected (where applicable to the product version):

• List of Values (LOVs)
• Portal DB Provider Forms
• Portal DB Provider Hierarchy
• Portal DB Provider XML component

Platforms Affected
See Patch Availability Matrix.

Required conditions for exploit
An unauthenticated user with HTTP access. Note that Portal is installed 
by default with Oracle9i Application Server.

Risk to exposure
Risk to exposure is high. A SQL injection attack via the Internet is, in 
Oracle’s opinion, likely if the required conditions listed above are met. 
This vulnerability is also susceptible to an insider attack originated on 
the corporate Intranet. An unauthenticated user can submit unauthorized SQL 
queries on the Oracle9i Application Server Data Dictionary tables and/or 
also submit costly (time consuming) queries that may affect the performance 
of Oracle9i Application Server.

How to minimize risk
It is not feasible to disable public access from the vulnerable components 
to mitigate the risk. Oracle strongly recommends that the patches identified 
in this alert be applied.

Follow Oracle’s best practices for database and application server:

and investigate typical IT deployments of firewalls, etc.

Ramification for customer
Oracle strongly recommends applying the patch for this potential 

Oracle recommends that customers review the severity rating for this 
Alert and patch accordingly. See
for a definition of severity ratings.

Patch Information
The patch is platform independent and may be applied across all platforms 
on which Portal is supported.

Fixed by
An interim (one-off) patch for this issue is available for the following 
Oracle 9iAS Portal versions:
   • Oracle9i Application Server Portal Release 1, v
   • Oracle9i Application Server Portal Release 2, v
Download the appropriate one-off patch from the Oracle Support Services 
web site, Metalink (

1. Click on the Patches button.
2. Click on "Simple Search".
3. In the "Search By" option, select 'Patch Number(s)' from the dropdown
menu, and enter
the patch number from the Patch Availability Matrix in the box.
4. Select the platform.
5. Click on the “Go” button.
6. Click on the “Download” button.
7. Recommended: you should also click on the “View README” button for 
additional information and instructions.

Please review Metalink, or check with Oracle Support Services periodically 
for patch availability if the patch for your platform is unavailable.

Oracle strongly recommends that you backup and comprehensively test the 
stability of your system upon application of any patch prior to deleting 
any of the original file(s) that are replaced by the patch.

Patch Availability Matrix
Platforms  iAS Version      Portal Version    Patch Number
All         3068980
All           2853895
All          2853895
All          2853895
• The ‘A’ and ‘B’ suffixes only serve to distinguish the labels used 
to release the Portal code with the bundled Oracle 9iAS patchset. This 
is the version that must be patched with the referenced patch number.

• Patch 2853895 listed under Oracle 9iAS version on Metalink is 
an obsolete duplicate. Please obtain the patch that is listed against 
9iAS version

• In order to apply the patch, you must first upgrade to Oracle9i 
Application Server Portal, Release 2, v9., if on Release 2, or to 
Oracle9i Application Server Portal, Release 1, v3., if on Release 1.

• For more information on Portal, please see


Oracle Corporation thanks David Litchfield, of Next Generation Security 
Software Ltd., for discovering and promptly bringing this potential 
security vulnerability to Oracle’s attention. The Next Generation 
Security Software Advisory is available at

Modification History
Initial release, version 1

[***** End Oracle Security Alert #61 *****]

CIAC wishes to acknowledge the contributions of Microsoft for the 
information contained in this bulletin.

CIAC, the Computer Incident Advisory Capability, is the computer
security incident response team for the U.S. Department of Energy
(DOE) and the emergency backup response team for the National
Institutes of Health (NIH). CIAC is located at the Lawrence Livermore
National Laboratory in Livermore, California. CIAC is also a founding
member of FIRST, the Forum of Incident Response and Security Teams, a
global organization established to foster cooperation and coordination
among computer security teams worldwide.

CIAC services are available to DOE, DOE contractors, and the NIH. CIAC
can be contacted at:
    Voice:    +1 925-422-8193 (7x24)
    FAX:      +1 925-423-8002
    STU-III:  +1 925-423-2604

Previous CIAC notices, anti-virus software, and other information are
available from the CIAC Computer Security Archive.

   World Wide Web:
   Anonymous FTP:

PLEASE NOTE: Many users outside of the DOE, ESnet, and NIH computing
communities receive CIAC bulletins.  If you are not part of these
communities, please contact your agency's response team to report
incidents. Your agency's team will coordinate with CIAC. The Forum of
Incident Response and Security Teams (FIRST) is a world-wide
organization. A list of FIRST member organizations and their
constituencies can be obtained via WWW at

This document was prepared as an account of work sponsored by an
agency of the United States Government. Neither the United States
Government nor the University of California nor any of their
employees, makes any warranty, express or implied, or assumes any
legal liability or responsibility for the accuracy, completeness, or
usefulness of any information, apparatus, product, or process
disclosed, or represents that its use would not infringe privately
owned rights. Reference herein to any specific commercial products,
process, or service by trade name, trademark, manufacturer, or
otherwise, does not necessarily constitute or imply its endorsement,
recommendation or favoring by the United States Government or the
University of California. The views and opinions of authors expressed
herein do not necessarily state or reflect those of the United States
Government or the University of California, and shall not be used for
advertising or product endorsement purposes.

LAST 10 CIAC BULLETINS ISSUED (Previous bulletins available from CIAC)

O-007: Microsoft Windows Help and Support Center Buffer Overrun Vulnerability
O-008: Microsoft Troubleshooter ActiveX Control Buffer Overflow Vulnerability
O-009: Microsoft Listbox and ComboBox Control Buffer Overrun Vulnerabilities
O-010: Microsoft Exchange Server 5.5 Outlook Web Access Vulnerability
O-011: Sun Vulnerability in Solaris "AnswerBOok2 Documentation" Admin Script
O-012: Sun Vulnerability in Solaris "AnswerBOok2 Documentation" Server Daemon
O-013: Buffer Overflow in Oracle Binary
O-014: SGI Wildcard Exportfs Issue in Network File SYstem (NFS)
O-015: Apache HTTP Server 2.0.48 Release Fixes Security Vulnerabilities
O-016: Apache HTTP Server 1.3.29 Release Fixes Security Vulnerability

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2015 AOH