Date: Thu, 17 Jul 2008 00:26:59 +0200
From: Andrea Purificato <a.purificato@uni.it.>
To: [email protected], [email protected]Subject: Oracle Portal XSS fixed by CPU July 2008
Content-Type: text/plain; charset=ISO-8859-15; format=flowed
Content-Transfer-Encoding: 7bit
X-Virus-Scanned: antivirus-gw at tyumen.ru
Class: Input Validation Error
Risk: Low
Remote: Yes
Oracle has just released CPU July 2008 critical patch that fixes a flaw
which allows code injection by malicious web users into the web pages
viewed by other users.
The security issue was found on POPUP_NAME parameter OF
PORTAL.WWPOB_HOME_PAGE web page of Oracle Portal.
After months, the patch is now available:
http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpujul2008.html
Regards,
--
Andrea Purificato
Ethical Hacker @ Unidata S.p.A.
http://rawlab.mindcreations.com