[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

256288

 
 

909

 
 

199146

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2006-2081Date: (C)2006-04-27   (M)2023-12-22


Oracle Database Server 10g Release 2 allows local users to execute arbitrary SQL queries via the GET_DOMAIN_INDEX_METADATA function in the DBMS_EXPORT_EXTENSION package. NOTE: this issue was originally linked to DB05 (CVE-2006-1870), but a reliable third party has claimed that it is not the same issue. Based on details of the problem, the primary issue appears to be insecure privileges that facilitate the introduction of SQL in a way that is not related to special characters, so this is not "SQL injection" per se.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 4.6
Exploit Score: 3.9
Impact Score: 6.4
 
CVSS V2 Metrics:
Access Vector: LOCAL
Access Complexity: LOW
Authentication: NONE
Confidentiality: PARTIAL
Integrity: PARTIAL
Availability: PARTIAL
  
Reference:
SECTRACK-1015999
BID-17699
SECUNIA-19860
http://www.securityfocus.com/archive/1/431353/100/0/threaded
http://www.securityfocus.com/archive/1/432078/100/0/threaded
http://www.securityfocus.com/archive/1/432354/100/0/threaded
http://www.securityfocus.com/archive/1/432632/30/5250/threaded
SREASON-802
VU#932124
http://www.red-database-security.com/exploits/oracle-sql-injection-oracle-dbms_export_extension.html
oracle-dbmsexportextension-sql-injection(26048)

CPE    1
cpe:/a:oracle:database_server

© SecPod Technologies