3 results (0.004 seconds)

CVSS: 6.4EPSS: 0%CPEs: 14EXPL: 1

oxf/xml/xerces/XercesSAXParserFactoryImpl.java in the xforms-server component in the XForms service in Orbeon Forms before 3.9 does not properly restrict DTDs in Ajax requests, which allows remote attackers to read arbitrary files or send HTTP requests to intranet servers via an entity declaration in conjunction with an entity reference, related to an "XML injection" issue. oxf/xml/xerces/XercesSAXParserFactoryImpl.java en el componente xforms-server en el servicio XForms en Orbeon Forms before v3.9 no restringe adecuadamente las peticiones Ajax a DTDs, lo que permite a atacantes remotos la lectura de archivos de su elección o el envío de peticiones HTTP a servidores de la intranet a través de una declaración de entidad junto con una referencia a entidad. Relacionado con la cuestión "inyección XML). • http://wiki.orbeon.com/forms/doc/developer-guide/release-notes/39 http://www.securityfocus.com/bid/47362 http://www.stratsec.net/Research/Advisories/Orbeon-Forms-XML-Entity-Dereferencing-%28SS-2011-004 https://github.com/orbeon/orbeon-forms/commit/aba6681660f65af7f1676434da68c10298c30200 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.2EPSS: 7%CPEs: 7EXPL: 1

Oracle Forms 4.5 through 10g starts form executables from arbitrary directories and executes them as the Oracle or System user, which allows attackers to execute arbitrary code by uploading a malicious .fmx file and referencing it using an absolute pathname argument in the (1) form or (2) module parameters to f90servlet. Oracle Forms 4.5 hasta la 10g arranca desde ejecutables de directorios arbitrarios y los ejecuta como usuario Oracle o System, lo que permite que atacantes ejecuten código arbitrario usando un fichero .fmx malicioso y referenciándolo a través de un path absoluto en los parámetros "form" o "module" en f90servlet. • http://marc.info/?l=bugtraq&m=112180805413784&w=2 http://www.red-database-security.com/advisory/oracle_forms_run_any_os_command.html •

CVSS: 7.5EPSS: 0%CPEs: 7EXPL: 0

SQL injection vulnerability in Oracle Forms 10g allows remote attackers to execute arbitrary SQL commands via the Query/Where feature. • http://www.red-database-security.com/wp/sql_injection_forms_us.pdf http://www.securiteam.com/securitynews/5HP0I0UFFI.html https://exchange.xforce.ibmcloud.com/vulnerabilities/20080 •