|
|
| |
Credit:
The original article can be found at: Vulnerability discovered by Anonymous http://www.zerodayinitiative.com/advisories/ZDI-10-118/
|
| |
Vulnerable Systems:
* Oracle Secure Backup
Authentication is not required to exploit this vulnerability. The specific flaw exists in the handling of user input to the uname variable of the login.php script running on the administration page of Oracle Secure Backup. Do to the lack of proper shell metacharacter filtering it is possible to bypass the login check. Successful exploitation of this vulnerability allows the attacker to access sensitive information running on the administration server without proper credentials.
Patch Availability:
Oracle has issued an update to correct this vulnerability. More details can be found at:
http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpujul2010.html
CVE Information:
CVE-2010-0904
Disclosure Timeline:
2009-10-21 - Vulnerability reported to vendor
2010-07-13 - Coordinated public release of advisory
|
|
|