Date: 31 Mar 2004 10:26:11 +0200
From: SecuriTeam <[email protected]>
To: [email protected]Subject: [NEWS] Security Issue Found with Customized Login Pages for Oracle SSO
The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion
The SecuriTeam alerts list - Free, Accurate, Independent.
Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html
- - - - - - - - -
Security Issue Found with Customized Login Pages for Oracle SSO
------------------------------------------------------------------------
SUMMARY
A vulnerability in Oracle SSO's mechanism allows a customized Sign On page
to be built by administrators. A vulnerability in the sample pages (used
by most administrators) allows an attacker to send a special URL to the
victim (Oracle user) that once it is opened, all sensitive information
(Usercode, Password, etc) can be made to travel to the attacker.
DETAILS
Oracle has a Single Sign-on application called OSSO.
Among others, it has a web based login form. This form can be customized
as explained in "Oracle 9iAS Single Sign-on Administrators Guide, Release
2(9.0.2), Part No. A96115-01". In this document, a sample login form is
published (section 8).
The problem with this login form is that unauthorized persons are able to
gain access to the supplied usercode and password. This is done by
tricking a valid user into opening a URL that is the real URL of the
customized SSO login page with a modified URL parameter.
The problem is that the attack makes use of the real login page. Thus, if
users check host certificates only, they will not be able to detect that
they are being tricked. Also, after logging in, they can be redirected to
the proper application on the intended system to hide the fact that
usercode and password have been stolen.
Note that the problem is a design problem in the way custom login pages
must be implemented, not a problem with a sample script.
Impact:
Users can accidentally reveal their SSO usercode/password combination to
unauthorized persons.
Vendor response:
Oracle came with the following solution:
The p_submit_url value in the customized login page can be hard-coded.
This will mitigate this issue since it will not be an input value to the
page anymore. The p_submit_url URL value in the 902 SSO server is in the
following format:
http(s)://sso_host:port/pls/orasso/orasso.wwsso_app_admin.ls_login
Recommendation:
We recommend implementing the proposed solution.
Of course, we hope that Oracle will update its documentation as well such
that the p_submit_url parameter will be removed from all example code.
ADDITIONAL INFORMATION
The information has been provided by
<mailto:[email protected]> Guido van Rooij (Madison Gurkha)
and Arjan de Vet (Madison Gurkha).
The original article can be found at:
<http://www.madison-gurkha.com/advisories/MG-2004-01.txt>
http://www.madison-gurkha.com/advisories/MG-2004-01.txt
This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: [email protected]
In order to subscribe to the mailing list, simply forward this email to: [email protected]
DISCLAIMER:
The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.