Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Databases >> Oracle XSQL Stylesheet Vulnerability


Vulnerability Assessment Details

Oracle XSQL Stylesheet Vulnerability

Vulnerability Assessment Summary
Tests for Oracle XSQL Stylesheet Vulnerability

Detailed Explanation for this Vulnerability Assessment
The Oracle XSQL Servlet permits arbitrary Java code to be executed by a possible hacker by supplying the URL of a malicious XSLT stylesheet when making a request to an XSQL page.

Solution:

Until Oracle changes the default behavior for the XSQL servlet to dispermit client supplied stylesheets, you can workaround this problem as follows. Add permit-client-style='no' on the document element of every xsql page on your server.
This plug-in tests for this vulnerability using a sample page, airport.xsql, which is supplied with the Oracle XSQL servlet. Sample code should always be removed from production servers.

Network Security Threat Level: High

Networks Security ID: 2295

Vulnerability Assessment Copyright: This script is Copyright (C) 2000 Matt Moore

Cables, Connectors

HPE IP Console G2 Switch with Virtual Media and CAC 1x1Ex8
$1392.46
HPE IP Console G2 Switch with Virtual Media and CAC 1x1Ex8 pictureNETGEAR ProSafe FS108 10/100 Desktop Switch - switch - 8 ports
$13.5
NETGEAR ProSafe FS108 10/100 Desktop Switch - switch - 8 ports pictureHP ProCurve 2620-24-PoE J9625A Switch 3xAvailable
$175.0
HP ProCurve 2620-24-PoE J9625A Switch 3xAvailable pictureCisco 3650 Series Stacking Kit - Brand New
$299.95
Cisco 3650 Series Stacking Kit - Brand New picture


Discussions

No Discussions have been posted on this vulnerability.