Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:21166
HistoryJan 16, 2009 - 12:00 a.m.

iDefense Security Advisory 01.13.09: Oracle Secure Backup Administration Server login.php Command Injection Vulnerability

2009-01-1600:00:00
vulners.com
18

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

iDefense Security Advisory 01.13.09
http://labs.idefense.com/intelligence/vulnerabilities/
Jan 13, 2009

I. BACKGROUND

Oracle Secure Backup is a network backup system for
Oracle Databases.
For more information, see:

http://www.oracle.com/database/secure-backup.html

II. DESCRIPTION

Remote exploitation of an input validation
vulnerability in the
authentication component of Oracle Corp.'s Secure
Backup Administration
Server could allow an unauthenticated attacker to
execute arbitrary
commands in the context of the running server.

The vulnerability is in a function of common.php
which is called from
the login.php page. The script fails to sanitize the
input when
verifying the user has permission to use the service.

III. ANALYSIS

Successful exploitation allows an attacker to gain
complete control over
an affected system. Because the the Administration
Server runs as an
unprivileged user, commands will be executed as that
user. Under the
Linux (and possibly other) installations many files
are installed world
writable. These include the configuration file for
the Apache web-server
that the Administration Server is built on. This
server starts as the
root user and changes to a user specified by the
configuration files.
Since these files are writable by the user it may be
possible for them
to gain access to the root user account. Other
configuration and
executable files are also able to be changed.

IV. DETECTION

Oracle Corp.'s Secure Backup version 10.1.0.3 for
Linux has been
confirmed vulnerable. Other versions and other
platforms may also be
affected.

V. WORKAROUND

Block access to the httpd interface of vulnerable
servers Remove write
access for 'other' users to all files. The following
command will
recursively change the permissions to remove write
permission to
'other'.

chmod -R o-w directory/

This may prevent some aspects of the system from
functioning correctly.

VI. VENDOR RESPONSE

Oracle has released a patch which addresses this
issue. For more
information, consult their advisory at the following
URL.

http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpujan2009.html

VII. CVE INFORMATION

The Common Vulnerabilities and Exposures (CVE)
project has assigned the
name CVE-2008-5449 to this issue. This is a candidate
for inclusion in
the CVE list (http://cve.mitre.org/), which
standardizes names for
security problems.

VIII. DISCLOSURE TIMELINE

03/08/2007 Initial Vendor Notification
03/08/2007 Initial Vendor Reply
11/24/2008 Additional Vendor Feedback
01/13/2009 Coordinated Public Disclosure

IX. CREDIT

The discoverer of this vulnerability wishes to remain
anonymous.

Get paid for vulnerability research
http://labs.idefense.com/methodology/vulnerability/vcp.php

Free tools, research and upcoming events
http://labs.idefense.com/

X. LEGAL NOTICES

Copyright © 2009 iDefense, Inc.

Permission is granted for the redistribution of this
alert
electronically. It may not be edited in any way
without the express
written consent of iDefense. If you wish to reprint
the whole or any
part of this alert in any other medium other than
electronically,
please e-mail [email protected] for
permission.

Disclaimer: The information in the advisory is
believed to be accurate
at the time of publishing based on currently
available information. Use
of the information constitutes acceptance for use in
an AS IS condition.
There are no warranties with regard to this
information. Neither the
author nor the publisher accepts any liability for
any direct,
indirect, or consequential loss or damage arising
from use of, or
reliance on, this information.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.7 (MingW32)
Comment: Using GnuPG with Mozilla -
http://enigmail.mozdev.org

iD8DBQFJbSVqbjs6HoxIfBkRArHaAJsFJIEtFoycfmcGAbikDpSDFvBrWwCfbLR0
qVu5Ie2NSW2bRoITpl4Jix4=
=VahW
-----END PGP SIGNATURE-----