CVE-2001-1217
CVSS5.0
发布时间 :2001-12-21 00:00:00
修订时间 :2008-09-05 16:25:59
NMCOS    

[原文]Directory traversal vulnerability in PL/SQL Apache module in Oracle Oracle 9i Application Server allows remote attackers to access sensitive information via a double encoded URL with .. (dot dot) sequences.


[CNNVD]Oracle 9i应用服务器PL/SQL Apache模块目录遍历漏洞(CNNVD-200112-129)

        
        Oracle 9i应用服务器基于Apache Web服务器,支持SOAP、PL/SQL、XSQL、JSP等环境。 PL/SQL Apache module for Oracle 9iAS提供了对数据库访问描述符的远程管理和帮助页。
        此程序模块存在输入验证错误,可以使远程攻击者遍历主机上的目录,读取任意有权限读取的文件。
        由于Oracle PL/SQL Apache模块对用户提交的请求进行了二次解码,攻击者可以通过提交包含二次编码的"../"(%252F..%252F)的请求给服务器,就可能遍历主机的目录,读取任意文件。这个问题只存在于Microsoft Windows NT/2000操作系统,然而因为Apache进程是以SYSTEM权限运行的,所以攻击者基本上可以通过Web读取任意文件。
        <*链接:http://archives.neohapsis.com/archives/bugtraq/2001-12/0225.html
         http://otn.oracle.com/deploy/security/pdf/modplsql.pdf
        *>

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-1217
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2001-1217
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200112-129
(官方数据源) CNNVD

- 其它链接及资源

http://www.kb.cert.org/vuls/id/758483
(VENDOR_ADVISORY)  CERT-VN  VU#758483
http://www.securityfocus.com/bid/3727
(VENDOR_ADVISORY)  BID  3727
http://www.iss.net/security_center/static/7728.php
(VENDOR_ADVISORY)  XF  oracle-appserver-modplsql-traversal(7728)
http://www.securityfocus.com/archive/1/246663
(VENDOR_ADVISORY)  BUGTRAQ  20011221 Buffer Overflow in Oracle 9iAS (#NISR20122001)
http://otn.oracle.com/deploy/security/pdf/modplsql.pdf
(UNKNOWN)  CONFIRM  http://otn.oracle.com/deploy/security/pdf/modplsql.pdf

- 漏洞信息

Oracle 9i应用服务器PL/SQL Apache模块目录遍历漏洞
中危 输入验证
2001-12-21 00:00:00 2005-10-20 00:00:00
远程  
        
        Oracle 9i应用服务器基于Apache Web服务器,支持SOAP、PL/SQL、XSQL、JSP等环境。 PL/SQL Apache module for Oracle 9iAS提供了对数据库访问描述符的远程管理和帮助页。
        此程序模块存在输入验证错误,可以使远程攻击者遍历主机上的目录,读取任意有权限读取的文件。
        由于Oracle PL/SQL Apache模块对用户提交的请求进行了二次解码,攻击者可以通过提交包含二次编码的"../"(%252F..%252F)的请求给服务器,就可能遍历主机的目录,读取任意文件。这个问题只存在于Microsoft Windows NT/2000操作系统,然而因为Apache进程是以SYSTEM权限运行的,所以攻击者基本上可以通过Web读取任意文件。
        <*链接:http://archives.neohapsis.com/archives/bugtraq/2001-12/0225.html
         http://otn.oracle.com/deploy/security/pdf/modplsql.pdf
        *>

- 公告与补丁

        临时解决方法:
        如果您不能立刻安装补丁或者升级,CNNVD建议您采取以下措施以降低威胁:
        * 编辑$ORACLE_HOME$\Apache\modplsql\cfg目录中的wdbsvr.app文件,把"adminPath"变量从默认的"/admin_"改为其它的。
        * 设置Web访问认证,确信只有授权用户能够访问管理目录。
        厂商补丁:
        Oracle
        ------
        目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:
        Oracle Oracle 9i Application Server:
        Oracle Patch 2128936
        
        http://metalink.oracle.com

- 漏洞信息

711
Oracle Application Server mod_plsql Encoded Traversal Arbitrary File Access
Remote / Network Access Input Manipulation
Loss of Confidentiality, Loss of Integrity
Exploit Public Vendor Verified

- 漏洞描述

Oracle 9iAS contains a flaw that allows a remote attacker to access arbitrary files outside of the web path. The issue is due to the help module not properly sanitizing user input, specifically traversal style attacks (../../) supplied via the help file.

- 时间线

2001-12-11 Unknow
Unknow Unknow

- 解决方案

Currently, there are no known workarounds or upgrades to correct this issue. However, Oracle has released a patch (# 2128936) to address this vulnerability.

- 相关参考

- 漏洞作者

- 漏洞信息

Oracle 9I Application Server PL/SQL Apache Module Directory Traversal Vulnerability
Input Validation Error 3727
Yes No
2001-12-20 12:00:00 2009-07-11 09:06:00
This vulnerability was submitted to BugTraq on December 20th, 2001 by David Litchfield <david@nextgenss.com>.

- 受影响的程序版本

Oracle Oracle9i Application Server
- Compaq Tru64 5.1
- Compaq Tru64 5.0 f
- Compaq Tru64 5.0 a
- Compaq Tru64 5.0
- Compaq Tru64 4.0 g
- HP HP-UX 11.11
- HP HP-UX 11.0 4
- HP HP-UX 11.0
- HP HP-UX 10.34
- HP HP-UX 10.30
- HP HP-UX 10.26
- HP HP-UX 10.20
- HP HP-UX 10.16
- HP HP-UX 10.10
- HP HP-UX 10.9
- HP HP-UX 10.8
- HP HP-UX 10.1 0
- HP HP-UX 10.0 1
- HP HP-UX 10.0
- HP HP-UX 9.10
- HP HP-UX 9.9
- HP HP-UX 9.8
- HP HP-UX 9.7
- HP HP-UX 9.6
- HP HP-UX 9.5
- HP HP-UX 9.4
- HP HP-UX 9.3
- HP HP-UX 9.1
- HP HP-UX 9.0
- HP HP-UX 8.9
- HP HP-UX 8.8
- HP HP-UX 8.7
- HP HP-UX 8.6
- HP HP-UX 8.5
- HP HP-UX 8.4
- HP HP-UX 8.2
- HP HP-UX 8.1
- HP HP-UX 8.0
- HP HP-UX 7.8
- HP HP-UX 7.6
- HP HP-UX 7.4
- HP HP-UX 7.2
- HP HP-UX 7.0
- IBM AIX 4.3.3
- IBM AIX 4.3.2
- IBM AIX 4.3.1
- IBM AIX 4.3
- IBM AIX 4.2.1
- IBM AIX 4.2
- IBM AIX 4.1.5
- IBM AIX 4.1.4
- IBM AIX 4.1.3
- IBM AIX 4.1.2
- IBM AIX 4.1.1
- IBM AIX 4.1
- IBM AIX 4.0
- IBM AIX 3.2.5
- IBM AIX 3.2.4
- IBM AIX 3.2
- IBM AIX 3.1
- IBM AIX 3.0 x
- IBM AIX 2.2.1
- IBM AIX 1.3
- IBM AIX 1.2.1
- IBM AIX 5.1
- Microsoft Windows 2000 Professional SP2
- Microsoft Windows 2000 Professional SP1
- Microsoft Windows 2000 Professional
- Microsoft Windows NT 4.0 SP6a
- Microsoft Windows NT 4.0 SP5
- Microsoft Windows NT 4.0 SP4
- Microsoft Windows NT 4.0 SP3
- Microsoft Windows NT 4.0 SP2
- Microsoft Windows NT 4.0 SP1
- Microsoft Windows NT 4.0
- Sun Solaris 2.5.1 _x86
- Sun Solaris 2.5.1
- Sun Solaris 1.1.4 -JL
- Sun Solaris 1.1.4
- Sun Solaris 1.1.3 _U1
- Sun Solaris 1.1.3
- Sun Solaris 1.1.2
- Sun Solaris 1.1.1
- Sun Solaris 8_x86
- Sun Solaris 8_sparc
- Sun Solaris 7.0_x86
- Sun Solaris 7.0
- Sun Solaris 2.6_x86HW5/98
- Sun Solaris 2.6_x86HW3/98
- Sun Solaris 2.6_x86
- Sun Solaris 2.6 HW5/98
- Sun Solaris 2.6 HW3/98
- Sun Solaris 2.6
- Sun Solaris 2.5_x86
- Sun Solaris 2.5
- Sun Solaris 2.4_x86
- Sun Solaris 2.4
- Sun Solaris 2.3
- Sun Solaris 2.2
- Sun Solaris 2.1
- Sun Solaris 2.0
- Sun Solaris 1.2
- Sun Solaris 1.1

- 漏洞讨论

Oracle 9i Application Server comes with an Apache-based web server and support for environments such as SOAP, PL/SQL, XSQL and JSP.

The PL/SQL Apache module for Oracle 9iAS provides functionality for remote
administration of the Database Access Descriptors and access to help pages.

It is possible for a remote attacker to submit a specially crafted web request contained double encoded variations of dot-dot-slash (../) sequences to effectively break out of the 'admin' directory. If the attacker can browse the filesystem of the host, they can display the contents of arbitrary web-readable files.

This is only an issue on Microsoft Windows NT/2000 operating systems. However, since the Apache process runs with SYSTEM privileges, the definition of an arbitrary web-readable file can be interpreted to mean any file of the system which can be displayed in a web browser.

- 漏洞利用

This issue may be exploited with a web browser.

- 解决方案

Oracle has provided a patch which rectifies this issue.


Oracle Oracle9i Application Server

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站