SQL*Loader jobs run from an Applications Manager Windows Agent leave passwords exposed.

Document ID : KB000089225
Last Modified Date : 14/04/2018
Show Technical Document Details
Issue:
SQL*Loader jobs run from an Applications Manager Windows Agent leave passwords exposed.
Resolution:

Symptoms

SQL*Loader jobs run on an Applications Manager (AM) Windows Agent do not delete the par file from run directory which leaves passwords exposed.


Cause

The LOADP.bat file used to run SQL*Loader jobs from an AM Windows Agent is located in the %AW_HOME%\exec folder contains the line unlink("seq_no\.par") but should be unlink("$seq_no\.par"). This causes the par file to remain in the run directory and leaves passwords used during job execution to be exposed.


Workaround

Change the following line in the LOADP.bat file.

From:  unlink("seq_no\.par");
To:   unlink("$seq_no\.par");


Resolution

 This issue was reported in PRB0208958 has been fixed in AM v8.0 SP13.