The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


[NEWS] Oracle Application Server 10g Directory Traversal


<< Previous INDEX Search src / Print Next >>
From: SecuriTeam <support@securiteam.com.>
To: [email protected]
Date: 17 Jan 2007 17:31:05 +0200
Subject: [NEWS] Oracle Application Server 10g Directory Traversal
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id: <20070117153209.296BC5853@mail.tyumen.ru.>
X-Virus-Scanned: antivirus-gw at tyumen.ru

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html 

- - - - - - - - -




  Oracle Application Server 10g Directory Traversal
------------------------------------------------------------------------


SUMMARY

"Oracle Application Server 10g offers a comprehensive solution for 
developing, integrating, and deploying your enterprise's applications, 
portals, and Web services. Based on a powerful and scalable J2EE server, 
Oracle Application Server 10g provides complete business integration and 
business intelligence suites, and best-of-breed portal software. Oracle 
Application Server 10g is the only platform designed for grid computing as 
well as full lifecycle support for Service-Oriented Architecture (SOA)."

A vulnerable server side component allows remote access to files outside 
of the application's root directory with permissions of the LocalSystem 
process. No authentication is required.

DETAILS

Vulnerable Systems:
 * Oracle Application Server 10g Release 3 (10.1.3.0.0)

The server side component EmChartBean is part of the Oracle Enterprise 
Manager 10g Application Server Control Software. EmChartBean is vulnerable 
to a directory traversal attack.

The vulnerability can be exploited by sending an unauthenticated http GET 
request. Remote access is granted to files outside of the application's 
root directory with permissions of the Javaw.exe process, which by default 
runs with LocalSystem privileges.

The server side component EmChartBean only exists at runtime, and is 
unpacked from a JAR file after an initial call to the login page. Thus, a 
single request to the login page is required before an attacker can 
successfully exploit the vulnerability.

Vendor Response:
The fix for this security vulnerability is included in Oracle's January 
2007 Critical Patch Update. The Critical Patch Update advisory, which 
lists the versions affected and contains links to more information and 
patches, is available at:  
<http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpujan2007.html>; http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpujan2007.html

The main page for Oracle Critical Patch Updates and Security Alerts is 
available at:  
<http://www.oracle.com/technology/deploy/security/alerts.htm>; 
http://www.oracle.com/technology/deploy/security/alerts.htm

Recommendation:
Follow your organization's testing procedures before applying patches or 
workarounds. Symantec recommends that customers should apply Oracle's 
update as soon as possible.

Oracle strongly recommends applying the Oracle Enterprise Manager patches 
released with the January 2007 Critical Patch Update to all instances 
affected by this problem.

CVE Information:
 <http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0222>; 
CVE-2007-0222


ADDITIONAL INFORMATION

The information has been provided by  <mailto:Oliver_Karow@symantec.com.> 
Oliver Karow.
The original article can be found at:  
<http://www.securityfocus.com/bid/22027>; 
http://www.securityfocus.com/bid/22027




This bulletin is sent to members of the SecuriTeam mailing list. To unsubscribe from the list, send mail with an empty subject line and body to: [email protected] In order to subscribe to the mailing list, simply forward this email to: [email protected]

DISCLAIMER: The information in this bulletin is provided "AS IS" without warranty of any kind. In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.

<< Previous INDEX Search src / Print Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2025 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру