Services Vulnerabilities Exploits Publications News Blog About DSecRG

[DSECRG-12-018] Oracle Application Server - multiple security vulnerabilities

Oracle Application Server Containers has multiple HTTP Response Splitting vulnerabilities.

Digital Security Research Group [DSecRG] Advisory #DSECRG-12-018

Application: Oracle Application Server Containers for J2EE
Versions Affected:
Vendor URL:
Bugs: Response Splitting (XSS)
Exploits: YES
Reported: 21.01.2009
Vendor response: 23.01.2009
Tracking ID: 13775955
Solution: yes
Patched: 19.07.2011
Date of Public Advisory: 22.02.2012
Authors: Alexandr Polyakov from DSecRG (research center of ERPScan)


Oracle Application Server Containers has multiple HTTP Response Splitting vulnerabilities.


Oracle Application Server Containers for J2EE 10g included in many Oracle products such as:

Oracle Application Server 10g R2 SE One (Succesfully tested)
Oracle SOA
Oracle Identity Management (Succesfully tested)

Attacker can inject HTML code in modules:



It is possible for an attacker to terminate the "current" response (by injecting the necessary HTTP response headers), and then to add his/her own additional complete HTTP response.
The attacker can then orchestrate the traffic in such a way that when an additional request is sent it appears to generate the additional response.
When an attacker succeeds in sending a crafted request, and it is responded with a crafted response, there are two (perhaps more) ways in which this condition can be exploited:

1. Cross Site Scripting: basically, the crafted (second response) would contain a malicious client side (e.g. Javascript) code, which can steal the client cookies and credentials.
The attacker would send the client (victim) a page that will cause two HTTP requests to be sent to the vulnerable site.
The first request "attacks" the web-site and causes the split HTTP response to be sent (that is, two HTTP responses will be sent back by the web server).
Then, when the second HTTP request is sent by the browser, it (e.g. Internet Explorer) assumes the second HTTP response is the actual server response for the (second) request, thus it will render the content of the second response, and execute the malicious script.
2. Web cache poisoning: the objective, in this case, is to force a web cache on the path between the attacker and the web server to cache attacker provided data as a resource that belongs to the vulnerable site.





Fix Information
Solution to this issue is given in the CPU July 2011.

About DSecRG
The main mission of DSecRG is to conduct researches of business critical systems such as ERP, CRM, SRM, BI, SCADA, banking software and others. The result of this work is then integrated in ERPScan Security Scanner. Being on the top edge of ERP and SAP security DSecRG research helps to improve quality of ERPScan consulting services and protects you from the latest threats.
Contact: research [at] dsecrg [dot] com

About ERPScan
ERPScan is an innovative company engaged in the research of ERP security. It develops products for ERP system security assessment. Apart from this, the company provides consulting services for secure configuration, development and implementation of ERP systems, and conducts comprehensive assessment and penetration testing of custom solutions.
Our flagship products are "ERPScan Security Scanner for SAP" and "ERPScan Online" service which can help customers to perform automated security assessments and compliance checks for SAP solutions.
Contact: info [at] erpscan [dot] com

Vulnerabilities RSS RSS
[DSECRG-12-019] vCenter Orchestrator - password disclosure

[DSECRG-12-018] Oracle Application Server - multiple security vulnerabilities

[DSECRG-12-017] ASUS Net4Switch ipswcom.dll ActiveX - buffer overflow vulnerability

[DSECRG-12-016] SAP MessagingSystem - information disclosure

[DSECRG-12-014] SAP Internet Sales - XSS

[DSECRG-12-015] SAP Adapter Monitor - information disclosure

Vulnerabilities list

© 2002—2014, ERPScan
For quoting or using materials from this site
link is obligatory

+44 (20) 81334493    e-mail:
Rss: Vulnerabilities, Exploits, News, Publications, Summary