Services Vulnerabilities Exploits Publications News Blog About DSecRG


[DSECRG-12-018] Oracle Application Server - multiple security vulnerabilities

Oracle Application Server Containers has multiple HTTP Response Splitting vulnerabilities.

Digital Security Research Group [DSecRG] Advisory #DSECRG-12-018


Application: Oracle Application Server Containers for J2EE
Versions Affected: 10.1.2.0.2
Vendor URL: http://oracle.com
Bugs: Response Splitting (XSS)
Exploits: YES
Reported: 21.01.2009
Vendor response: 23.01.2009
Tracking ID: 13775955
Solution: yes
Patched: 19.07.2011
Date of Public Advisory: 22.02.2012
Authors: Alexandr Polyakov from DSecRG (research center of ERPScan)


Description
***********

Oracle Application Server Containers has multiple HTTP Response Splitting vulnerabilities.


Details
*******

Oracle Application Server Containers for J2EE 10g included in many Oracle products such as:

Oracle Application Server 10g R2 SE One (Succesfully tested)
Oracle SOA
Oracle Identity Management (Succesfully tested)


Attacker can inject HTML code in modules:

/emd/console/ias/topology/topologyPrefFoobar

/emd/console/ias/topology/topologyjspfFoobar


It is possible for an attacker to terminate the "current" response (by injecting the necessary HTTP response headers), and then to add his/her own additional complete HTTP response.
The attacker can then orchestrate the traffic in such a way that when an additional request is sent it appears to generate the additional response.
When an attacker succeeds in sending a crafted request, and it is responded with a crafted response, there are two (perhaps more) ways in which this condition can be exploited:

1. Cross Site Scripting: basically, the crafted (second response) would contain a malicious client side (e.g. Javascript) code, which can steal the client cookies and credentials.
The attacker would send the client (victim) a page that will cause two HTTP requests to be sent to the vulnerable site.
The first request "attacks" the web-site and causes the split HTTP response to be sent (that is, two HTTP responses will be sent back by the web server).
Then, when the second HTTP request is sent by the browser, it (e.g. Internet Explorer) assumes the second HTTP response is the actual server response for the (second) request, thus it will render the content of the second response, and execute the malicious script.
2. Web cache poisoning: the objective, in this case, is to force a web cache on the path between the attacker and the web server to cache attacker provided data as a resource that belongs to the vulnerable site.


Example:
********


http://localhost:18100/emd/console/ias/topology/topologyPrefFoobar%0d%0aDsecrg:%20sometext%0d%0a%0d%0a<html><head><script>alert(document.cookie)</script></head></html>

http://localhost:18100/emd/console/ias/topology/topologyjspFoobarDsecrg%0d%0aDsecrg:%20sometext%0d%0a%0d%0a<html><head><script>alert(document.cookie)</script></head></html>


References
**********
http://dsecrg.com/pages/vul/show.php?id=418
http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html


Fix Information
*************
Solution to this issue is given in the CPU July 2011.
http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html


About DSecRG
*******
The main mission of DSecRG is to conduct researches of business critical systems such as ERP, CRM, SRM, BI, SCADA, banking software and others. The result of this work is then integrated in ERPScan Security Scanner. Being on the top edge of ERP and SAP security DSecRG research helps to improve quality of ERPScan consulting services and protects you from the latest threats.
Contact: research [at] dsecrg [dot] com
http://www.dsecrg.com


About ERPScan
*******
ERPScan is an innovative company engaged in the research of ERP security. It develops products for ERP system security assessment. Apart from this, the company provides consulting services for secure configuration, development and implementation of ERP systems, and conducts comprehensive assessment and penetration testing of custom solutions.
Our flagship products are "ERPScan Security Scanner for SAP" and "ERPScan Online" service which can help customers to perform automated security assessments and compliance checks for SAP solutions.
Contact: info [at] erpscan [dot] com
http://www.erpscan.com

Vulnerabilities RSS RSS
21.03.2012
[DSECRG-12-019] vCenter Orchestrator - password disclosure

22.02.2012
[DSECRG-12-018] Oracle Application Server - multiple security vulnerabilities

17.02.2012
[DSECRG-12-017] ASUS Net4Switch ipswcom.dll ActiveX - buffer overflow vulnerability

17.02.2012
[DSECRG-12-016] SAP MessagingSystem - information disclosure

17.02.2012
[DSECRG-12-014] SAP Internet Sales - XSS

17.02.2012
[DSECRG-12-015] SAP Adapter Monitor - information disclosure

Vulnerabilities list


© 2002—2014, ERPScan
For quoting or using materials from this site
link is obligatory

+44 (20) 81334493    e-mail: research@dsecrg.com
Rss: Vulnerabilities, Exploits, News, Publications, Summary
Search