Oracle Forms 4.5 through 10g starts form executables from arbitrary directories and executes them as the Oracle or System user, which allows attackers to execute arbitrary code by uploading a malicious .fmx file and referencing it using an absolute pathname argument in the (1) form or (2) module parameters to f90servlet.
Link | Tags |
---|---|
http://www.red-database-security.com/advisory/oracle_forms_run_any_os_command.html | exploit vendor advisory |
http://marc.info/?l=bugtraq&m=112180805413784&w=2 | mailing list |