|
Family: Databases --> Category: attack
Oracle XSQL Stylesheet Vulnerability Vulnerability Scan
Vulnerability Scan Summary Tests for Oracle XSQL Stylesheet Vulnerability
Detailed Explanation for this Vulnerability Test
The Oracle XSQL Servlet allows arbitrary Java code to be executed by a possible hacker by supplying the URL of a malicious XSLT stylesheet when making a request to an XSQL page.
Solution:
Until Oracle changes the default behavior for the XSQL servlet to disallow client supplied stylesheets, you can workaround this problem as follows. Add allow-client-style='no' on the document element of every xsql page on your server.
This plug-in tests for this vulnerability using a sample page, airport.xsql, which is supplied with the Oracle XSQL servlet. Sample code should always be removed from production servers.
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.
|