In July, Cenzic identified and analyzed the most serious vulnerabilities announced by vendors and other third parties. The company's top five vulnerabilities include many of today's most widely used business platforms, including Oracle Reports and Lotus.
These vulnerabilities are prioritized based on their severity and potential to impact regulatory compliance, internal policy compliance, information privacy and financial losses. This information is released on a monthly or bi-monthly basis and can be used by enterprises as a first step in addressing the security of custom and commercial web applications.
The CIA team analyzed all Web application security vulnerabilities discovered in July and selected the following for their severity and potential threat to common, widely used software and business environments:
- Cross-Site Scripting Attacks in Oracle Reports
Vulnerability in Oracle Reports Server allows cross-site scripting attacks. Cross Site Scripting vulnerabilities allow an attacker to craft malicious scripts that can be executed within a victim's browser.
Enterprises can contact the vendor for a workaround or security fix. Additionally, customers using Oracle products should apply the Critical Patch update for July 2005. The cross-site scripting vulnerability discussed in this alert is not fixed by the critical patch update; however, the critical patch update does address other high-risk security issues.
- Remote Command Execution via Malicious Report Content in Oracle Reports
This vulnerability in Oracle Reports Server makes it possible for a malicious user to disclose or alter system files, change system configuration, obtain access to critical system security files (.SAM), or install backdoors.
Enterprises should consult this page.
- File Access and Destruction Vulnerability in Oracle Reports
A vulnerability in Oracle Reports Server allows a remote user to overwrite arbitrary files on the server, resulting in potential loss of critical files, and possibly damaging the underlying operating system.
Unofficial workarounds for these security issues are available here and here.
- File Access Vulnerability in Oracle Reports
A vulnerability in Oracle Reports allows a remote attacker to read fragments of arbitrary XML files on the Reports server, which could give a hacker the ability to access confidential information belonging to other users.
An unofficial workaround is described here.
- Lotus Domino R5/R6 Webmail Discloses Hashed Passwords to Any Authenticated User.
A vulnerability in Lotus Domino R5/R6 Webmail allows a user to obtain encrypted password hashes for all users. The password hashes can then be subjected to brute force attacks to retrieve user credentials.
The vendor has released a workaround to address this problem, which is available in this CYBSEC S.A, Advisory.
Cenzic uses a proprietary formula for calculating the severity of vulnerability information. Cenzic's risk metrics are subject to change without notice. The vulnerabilities selected for this alert were chosen due to one or more of the following factors: Origin -- the vulnerability could be exploited by unauthenticated remote users, Boundary -- the vulnerability would allow privilege escalation upon a successful attack, Popularity -- the software is widely used or deployed, Criticality -- the vulnerability fits the profile of the critical areas identified by OWASP, CSI, SANS, or other sources. That a particular vulnerability is rated as severe does not imply negligence on part of the author/maintainer/vendor of the affected software.