Directory traversal vulnerability in Oracle Reports 6.0, 6i, 9i, and 10g allows remote attackers to overwrite arbitrary files via (1) "..", (2) Windows drive letter (C:), and (3) absolute path sequences in the desname parameter. NOTE: this issue was probably fixed by REP06 in CPU Jan 2006, in which case it overlaps CVE-2006-0289.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/24321 | vdb entry |
http://www.securityfocus.com/bid/14309 | vdb entry |
http://secunia.com/advisories/18493 | third party advisory vendor advisory |
http://www.vupen.com/english/advisories/2006/0323 | vdb entry vendor advisory |
http://www.securityfocus.com/archive/1/422257/30/7430/threaded | mailing list |
http://www.red-database-security.com/advisory/oracle_reports_overwrite_any_file.html | vendor advisory |
http://securitytracker.com/id?1014524 | vdb entry |
http://marc.info/?l=bugtraq&m=112180096507467&w=2 | mailing list |
http://www.oracle.com/technetwork/topics/security/cpujan2006-082403.html | |
http://secunia.com/advisories/18608 | third party advisory vendor advisory |