|
|
|
|
| |
Credit:
The information has been provided by Alexandr Polyakov .
The original article can be found at: http://dsecrg.com/pages/vul/show.php?id=125
|
| |
Vulnerable Systems:
* Oracle Secure Enterprise Search (SES) version 10.1.8.2.0
Vulnerability found In page /search/query/search. Vulnerable parameter search_p_groups.
Example: http://[localhost]:7777/search/query/search?search.timezone=&search_p_groups="'> <IMG%20SRC=javascript:alert(document.cookie)>&q=1234&btnSearch=Search
Attacker can send evil link to logged in administrator, get adminiatrators cookie access to system with Administrator rights.
Patch Availability:
Information was published in CPU July 2009. All customers can download CPU petches following instructions from:
http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpujul2009.html
CVE Information:
CVE-2009-1968
Disclosure Timeline:
21.01.2009 Reported
23.01.2009 Vendor response
16.07.2009 Date of Public Advisory
|
|
|
|
|