Skip to content

customize
National Cyber Alert System
Technical Cyber Security Alert TA04-160Aarchive

SQL Injection Vulnerabilities in Oracle E-Business Suite

Original release date: June 8, 2004
Last revised: June 9, 2004
Source: US-CERT

Systems Affected

  • Oracle Applications 11.0 (all releases)
  • Oracle E-Business Suite 11i, 11.5.1 through 11.5.8

Overview

A vulnerability in the Oracle's E-Business Suite allows a remote attacker to execute arbitrary script on a vulnerable database system. Exploitation may lead to compromise of the database application, data integrity, or underlying operating system.

I. Description

Oracle E-Business Suite is a set of applications and modules that enables an organization to manage customer interactions, deliver services, manufacture products, ship orders, collect payments, and other tasks using a single database model.

According to the Oracle Security Alert 67, Oracle Applications 11.0 (all releases) and Oracle E-Business Suite Release 11i, 11.5.1 through 11.5.8 are vulnerable to SQL injection vulnerabilities. Oracle E-Business Suite Release 11.5.9 and later are not vulnerable. This vulnerability is not platform specific. Integrigy Corporation has also released an alert about these vulnerabilities.

Note that no authentication mechanisms of Oracle E-Business Suite will mitigate exploitation of the attack.

US-CERT is tracking this issue as VU#961579.

II. Impact

An unauthenticated attacker could exploit this vulnerability to execute arbitrary SQL statements on the vulnerable system with the privileges of the Oracle server process. In addition to compromising the integrity of the database information, this may lead to the compromise of the database application and the underlying operating system.

III. Solution

Apply Patch or Upgrade

According to the Oracle Security Alert 67, patches and related information are available from:

http://metalink.oracle.com/metalink/plsql/ml2_documents.showDocument?p_database_id=NOT&p_id=274375.1
Note that the above link requires registration to Oracle Metalink. To register for support, please visit:
http://metalink.oracle.com/register/pls/registration.step_1


Appendix B. References



US-CERT thanks Stephen Kost of Integrigy Corporation for reporting this problem and for information used to construct this advisory.


Feedback can be directed to the author: Jason A. Rafail


Copyright 2004 Carnegie Mellon University. Terms of use

Revision History

June 8, 2004: Initial release
June 9, 2004: Added Oracle support registration link

Last updated February 08, 2008
print this document