Home page logo
/

bugtraq logo Bugtraq mailing list archives

Advisory: Oracle JDeveloper passes Plaintext Password
From: ak () red-database-security com
Date: 13 Jul 2005 19:36:22 -0000

Red-Database-Security GmbH  - Oracle Security Advisory

Oracle JDeveloper passes Plaintext Password


 Name                Oracle JDeveloper passes Plaintext Password
 Systems Affected    Oracle JDeveloper 9.0.4, 9.0.5, 10.1.2
 Severity            Low Risk 
 Category            Information disclosure of Passwords
 Vendor URL          http://www.oracle.com 
 Author              Alexander Kornbrust (ak at red-database-security.com) 
 Date                13 July 2005 (V 1.00) 
 Advisory            AKSEC2003-006
 Oracle Vuln#        AS09
 Time to fix         148 days


Details
#######
Starting an external program and passing the password as a parameter is unsecure. 
This is the easiest way to decrypt an encrypted password. Replace the sqlplus.exe with a fake version which stores the 
passwords in a local file.

JDeveloper starts sqlplus with the following parameter:
system/alexora1@(DESCRIPTION=(ADDRESS_LIST=(ADDRESS=(PROTOCOL=TCP)(HOST=picard)(PORT=1521)))(CONNECT_DATA=(SID=ora10103)))


Workaround
##########
Do not start sqlplus from JDeveloper.


Patch Information
#################
Apply patches for Jdeveloper and / or DeveloperSuite mentioned in Metalink Note 311038 on your Jdeveloper / 
DeveloperSuite Installation (normally your client PC).


History
#######
14-feb-2005 Oracle secalert_us was informed
14-feb-2005 Bug confirmed
12-jul-2005 Oracle published Oracle Critical Patch Update July 2005
12-jul-2005 Red-Database-Security published this advisory


© 2005 by Red-Database-Security GmbH


  By Date           By Thread  

Current thread:
  • Advisory: Oracle JDeveloper passes Plaintext Password ak (Jul 13)
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]
AlienVault