{"vuid":"VU#961579","idnumber":"961579","name":"Oracle E-Business Suite SQL Injection vulnerabilities","keywords":["Oracle E-Business Suite","SQL Injection","Oracle Application"],"overview":"Oracle E-Business Suite fails to filter user input permiting the exploitation of SQL injection vulnerabilities. These vulnerabilities may allow a remote attacker to execute procedures or SQL queries and updates on the vulnerable database application.","clean_desc":"According to the Oracle Security Alert 67, Oracle Applications 11.0 (all releases) and Oracle E-Business Suite Release 11i, 11.5.1 through 11.5.8 are vulnerable to SQL injection vulnerabilities. Oracle E-Business Suite Release 11.5.9 and later are not vulnerable. This vulnerability is not platform specific.","impact":"An unauthenticated attacker may be able to exploit this vulnerability to execute procedures or SQL queries and updates inside the database. This may lead to compromise of the system and data integrity issues.","resolution":"According to the Oracle Security Alert 67, patches and related information are available from: http://metalink.oracle.com/metalink/plsql/ml2_documents.showDocument?p_database_id=NOT&p_id=274375.1 Note that the above link requires registration to Oracle Metalink. To register for support, please visit: http://metalink.oracle.com/register/pls/registration.step_1","workarounds":"","sysaffected":"","thanks":"Thanks to Stephen Kost of Integrigy for reporting this vulnerability.","author":"This document was written by Jason A Rafail.","public":["http://www.integrigy.com/alerts/OraAppsSQLInjection.htm","http://otn.oracle.com/deploy/security/pdf/2004alert67.pdf"],"cveids":["CVE-2004-0543"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2004-06-07T16:42:29Z","publicdate":"2004-06-04T00:00:00Z","datefirstpublished":"2004-06-07T19:08:35Z","dateupdated":"2004-06-09T14:05:29Z","revision":5,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"15","cam_population":"10","cam_impact":"18","cam_easeofexploitation":"20","cam_attackeraccessrequired":"20","cam_scorecurrent":"40.5","cam_scorecurrentwidelyknown":"47.25","cam_scorecurrentwidelyknownexploited":"74.25","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":40.5,"vulnote":null}