ID CVE-2009-1977
Summary Unspecified vulnerability in the Oracle Secure Backup component in Oracle Secure Backup 10.2.0.3 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the July 2009 Oracle CPU. Oracle has not commented on claims from an independent researcher that this vulnerability allows attackers to bypass authentication via unknown vectors involving the username parameter and login.php.
References
Vulnerable Configurations
  • cpe:2.3:a:oracle:secure_backup:10.2.0.3
    cpe:2.3:a:oracle:secure_backup:10.2.0.3
CVSS
Base: 10.0 (as of 15-07-2009 - 10:48)
Impact:
Exploitability:
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
d2sec via4
name Oracle Secure Backup 10.3.0.1 RCE
url http://www.d2sec.com/exploits/oracle_secure_backup_10.3.0.1_rce.html
exploit-db via4
description Oracle Secure Backup Server 10.3.0.1.0 Auth Bypass/RCI Exploit. CVE-2009-1977. Remote exploit for windows platform
id EDB-ID:9652
last seen 2016-02-01
modified 2009-09-14
published 2009-09-14
reporter ikki
source https://www.exploit-db.com/download/9652/
title Oracle Secure Backup Server 10.3.0.1.0 - Auth Bypass/RCI Exploit
metasploit via4
description This module exploits an authentication bypass vulnerability in login.php in order to execute arbitrary code via a command injection vulnerability in property_box.php. This module was tested against Oracle Secure Backup version 10.3.0.1.0 (Win32).
id MSF:AUXILIARY/ADMIN/ORACLE/OSB_EXECQR2
last seen 2018-09-09
modified 2017-07-24
published 2009-09-16
reliability Normal
reporter Rapid7
source https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/admin/oracle/osb_execqr2.rb
title Oracle Secure Backup Authentication Bypass/Command Injection Vulnerability
nessus via4
NASL family CGI abuses
NASL id OSB_FAKEOPTION_AUTH_BYPASS.NASL
description The remote web server is the Administration Server for Oracle Secure Backup, a centralized tape backup management software application. The installed version of Oracle Secure Backup allows a remote attacker to bypass authentication using a specially crafted username, such as '--fakeoption'. An unauthenticated, remote attacker can leverage this issue to bypass authentication and gain administrative access to the application. Under Windows, this can lead to a complete system compromise. Note that this install is also likely to be affected by multiple command injection vulnerabilities, although Nessus has not checked for them.
last seen 2019-02-21
modified 2018-11-15
plugin id 40989
published 2009-09-14
reporter Tenable
source https://www.tenable.com/plugins/index.php?view=single&id=40989
title Oracle Secure Backup Administration Server Authentication Bypass
packetstorm via4
data source https://packetstormsecurity.com/files/download/81262/osbs-bypass.txt
id PACKETSTORM:81262
last seen 2016-12-05
published 2009-09-15
reporter Luca Carettoni
source https://packetstormsecurity.com/files/81262/Oracle-Secure-Backup-Server-Bypass-Command-Injection.html
title Oracle Secure Backup Server Bypass / Command Injection
refmap via4
bid 35672
confirm http://www.oracle.com/technetwork/topics/security/cpujul2009-091332.html
misc http://www.zerodayinitiative.com/advisories/ZDI-09-058/
osvdb 55903
sectrack 1022565
secunia 35776
vupen ADV-2009-1900
xf oracle-securebackup-sbc-unspecified(51761)
Last major update 22-10-2012 - 23:07
Published 14-07-2009 - 19:30
Last modified 16-08-2017 - 21:30
Back to Top