[39617] in bugtraq
Advisory: Oracle JDeveloper passes Plaintext Password
daemon@ATHENA.MIT.EDU (ak@red-database-security.com)
Wed Jul 13 17:45:14 2005
Date: 13 Jul 2005 19:36:22 -0000
Message-ID: <20050713193622.14573.qmail@securityfocus.com>
Content-Type: text/plain
Content-Disposition: inline
Content-Transfer-Encoding: binary
MIME-Version: 1.0
From: ak@red-database-security.com
To: bugtraq@securityfocus.com
Red-Database-Security GmbH - Oracle Security Advisory
Oracle JDeveloper passes Plaintext Password
Name Oracle JDeveloper passes Plaintext Password
Systems Affected Oracle JDeveloper 9.0.4, 9.0.5, 10.1.2
Severity Low Risk
Category Information disclosure of Passwords
Vendor URL http://www.oracle.com
Author Alexander Kornbrust (ak at red-database-security.com)
Date 13 July 2005 (V 1.00)
Advisory AKSEC2003-006
Oracle Vuln# AS09
Time to fix 148 days
Details
#######
Starting an external program and passing the password as a parameter is unsecure.
This is the easiest way to decrypt an encrypted password. Replace the sqlplus.exe with a fake version which stores the passwords in a local file.
JDeveloper starts sqlplus with the following parameter:
system/alexora1@(DESCRIPTION=(ADDRESS_LIST=(ADDRESS=(PROTOCOL=TCP)(HOST=picard)(PORT=1521)))(CONNECT_DATA=(SID=ora10103)))
Workaround
##########
Do not start sqlplus from JDeveloper.
Patch Information
#################
Apply patches for Jdeveloper and / or DeveloperSuite mentioned in Metalink Note 311038 on your Jdeveloper / DeveloperSuite Installation (normally your client PC).
History
#######
14-feb-2005 Oracle secalert_us was informed
14-feb-2005 Bug confirmed
12-jul-2005 Oracle published Oracle Critical Patch Update July 2005
12-jul-2005 Red-Database-Security published this advisory
© 2005 by Red-Database-Security GmbH