Oracle FAQ | Your Portal to the Oracle Knowledge Grid |
![]() |
![]() |
Home -> Community -> Usenet -> c.d.o.server -> Potential Security Flaw in OAS 4.07 with LiveHTML
The examples using Web Application Objects that depict connecting to the
database using the DBI
perl modules contain the userid/password to login. The perl code that is
embedded within the html
file as a .hsp file type is interpreted within the OAS server and thus
the perl code is not visible but
compiled and the resultant html tags, if any, are displayed. This,
unfortunately, does not hold for the
netscape browser which caches the .hsp file which is available for any
client to use across any
supported platform. Thus giving someone a big inside towards their
cracking efforts. Of course,
one could read the password from somewhere else, preferrably encrypted,
merely adding to the
complexity.
Henry
hkatz_at_iscs-i.com Received on Mon Jan 24 2000 - 07:58:49 CST
![]() |
![]() |