PT-2013-21: XML External Entities Injection in Oracle Database
Vulnerable software
Oracle Database
Version: 11.1.0.7, 11.2.0.2, 11.2.0.3, 12.1.0.1
Link:
http://www.oracle.com/
Severity level
Severity level: Medium
Impact: Internal Network Resources Access, Denial of Service
Access Vector: Remote
CVSS v2:
Base Score: 6.4
Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:P)
CVE: CVE-2013-5771
Software description
The Oracle Database (commonly referred to as Oracle RDBMS or simply as Oracle) is an object-relational database management system produced and marketed by Oracle Corporation.
Vulnerability description
The specialists of the Positive Research center have detected an XML External Entities Injection vulnerability in Oracle Database.
If an attacker sends specially crafted SQL query containing malformed XML to Oracle Database server, the server will automatically send the contents of remote resources to the attacker's server. This vulnerability also allows remote attackers to perform denial of service attacks.
How to fix
Update your software up to the latest version
Advisory status
26.02.2013 - Vendor gets vulnerability details
15.10.2013 - Vendor releases fixed version and details
25.10.2013 - Public disclosure
Credits
The vulnerability was detected by Timur Yunusov, Alexey Osipov, Positive Research Center (Positive Technologies Company)
References
http://en.securitylab.ru/lab/PT-2013-21
http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html
Reports on the vulnerabilities previously discovered by Positive Research:
http://www.ptsecurity.com/research/advisory/
http://en.securitylab.ru/lab/