Plugin ID | 71 |
Plugin name | Oracle 9iAS iSQLplus cross site scripting |
Plugin filename | Oracle 9iAS iSQLplus cross site scripting.plugin |
Plugin filesize | 2556 bytes |
Plugin family | HTTP |
Plugin created name | Marc Ruef |
Plugin created email | marc dot ruef at computec dot ch |
Plugin created web | http://www.computec.ch |
Plugin created company | computec.ch |
Plugin created date | 2004/03/22 |
Plugin updated name | Marc Ruef |
Plugin updated email | marc dot ruef at computec dot ch |
Plugin updated web | http://www.computec.ch |
Plugin updated company | computec.ch |
Plugin updated date | 2004/11/14 |
Plugin version | 2.0 |
Plugin changelog | Corrected the plugin structure and added the accuracy values in 1.2. Improved the pattern matching and introduced the plugin changelog in 2.0 |
Plugin protocol | tcp |
Plugin port | 80 |
Plugin procedure exploit | open|send /isqlplus?action=logon&username=joe%22<script>atk</script>&password=test\n\n|sleep|close|pattern_exists HTTP/#.# ### *<script>atk</script>* |
Plugin exploit accuracy | 99 |
Plugin comment | Check is copied from the Nessus plugin. |
Bug advisory | http://www.securitytracker.com/alerts/2004/Jan/1008838.html |
Bug affected | Oracle 9iAS |
Bug vulnerability class | Cross Site Scripting |
Bug description | The login-page of Oracle9i iSQLplus allows the injection of HTML and Javascript code via the username and password parameters. |
Bug solution | No solution known yet. |
Bug fixing time | 1 hour |
Bug exploit availability | Yes |
Bug remote | Yes |
Bug local | Yes |
Bug severity | Medium |
Bug popularity | 7 |
Bug simplicity | 8 |
Bug impact | 7 |
Bug risk | 7 |
Bug Nessus risk | Medium |
Bug check tools | Nessus is able to do the same check. |
Source Nessus ID | 12112 |
Source Literature | Hacking Exposed: Network Security Secrets & Solutions, Stuart McClure, Joel Scambray and George Kurtz, February 25, 2003, 4th Edition, McGraw-Hill Osborne Media, ISBN 0072227427 |
Source Misc. | http://www.computec.ch |