Vulnerability Note VU#983340

Oracle Database Data Pump Metadata API SQL injection vulnerability

Original Release date: 25 Jan 2006 | Last revised: 19 Apr 2006

Overview

Oracle Database Data Pump Metadata API is vulnerable to SQL injection, which could allow a remote attacker to execute arbitrary SQL commands on a vulnerable Oracle installation.

Description

The Oracle Database Data Pump Metadata API fails to properly filter user-supplied input. This may allow a remote attacker to insert arbitrary SQL commands, which may be executed by the database. We believe that this package is accessible by users with PUBLIC privileges.

Based on research into public information, we believe that this issue is Oracle vuln# DB06 in the Oracle CPU for January 2006. However, there is not sufficient information to authoritatively relate Oracle vulnerability information to information provided by other parties.

Impact

A remote attacker may be able to execute SQL queries on a server, possibly with elevated privileges. As a result, attackers may be able to view or modify the contents of an Oracle database.

Solution

Apply patches
This issue is corrected in the Oracle Critical Patch Update for January 2006.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
Oracle CorporationAffected-25 Jan 2006
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A

References

Credit

This vulnerability was reported in the Oracle Critical Patch Update for January 2006. Information in this document came from Oracle, Alexander Kornbrust of Red-database Security, and Integrigy.

This document was written by Jeff Gennari.

Other Information

  • CVE IDs: CVE-2006-0259
  • Date Public: 17 Jan 2006
  • Date First Published: 25 Jan 2006
  • Date Last Updated: 19 Apr 2006
  • Severity Metric: 6.02
  • Document Revision: 16

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.