{"vuid":"VU#139049","idnumber":"139049","name":"Oracle DBMS_REPUTIL package vulnerable to SQL injection","keywords":["Oracle","Oracle_CPU_April_2006","DB03","SQL injection"],"overview":"An SQL injection vulnerability in the Oracle DBMS_REPUTIL package may allow a remote attacker to execute arbitrary SQL commands on a vulnerable Oracle installation.","clean_desc":"Oracle DBMS_REPUTIL package contains a SQL injection vulnerability.The details of this vulnerability are not clear. We believe that the DBMS_REPUTIL package is accessible by users with PUBLIC privileges. Based on research into public information, we believe that this issue is Oracle vuln# DB01 in the Oracle CPU for April 2006 . However, there is not sufficient information to authoritatively relate Oracle vulnerability information to information provided by other parties.","impact":"A remote attacker may be able to execute SQL queries on a server, possibly with elevated privileges. As a result, attackers may be able to view or modify the contents of an Oracle database.","resolution":"Apply patches \nThis issue is corrected in the Oracle Critical Patch Update for April 2006.","workarounds":"","sysaffected":"","thanks":"This vulnerability was reported in the \nOracle Critical Patch Update for April 2006\n. Information in this document came from Oracle and Alexander Kornbrust of \nRed-Database Security","author":"This document was written by Jeff Gennari.","public":["http://www.red-database-security.com/advisory/oracle_cpu_apr_2006.html","http://www.oracle.com/technology/deploy/security/pdf/cpuapr2006.html"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2006-04-18T19:22:54Z","publicdate":"2006-04-18T00:00:00Z","datefirstpublished":"2006-04-20T11:25:14Z","dateupdated":"2006-04-20T11:25:31Z","revision":10,"vrda_d1_directreport":"0","vrda_d1_population":"3","vrda_d1_impact":"3","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"3","cam_population":"15","cam_impact":"15","cam_easeofexploitation":"11","cam_attackeraccessrequired":"13","cam_scorecurrent":"10.8590625","cam_scorecurrentwidelyknown":"13.87546875","cam_scorecurrentwidelyknownexploited":"25.94109375","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":10.8590625,"vulnote":null}