CVE-2002-0561
CVSS7.5
发布时间 :2002-07-03 00:00:00
修订时间 :2016-10-17 22:20:36
NMCOS    

[原文]The default configuration of the PL/SQL Gateway web administration interface in Oracle 9i Application Server 1.0.2.x uses null authentication, which allows remote attackers to gain privileges and modify DAD settings.


[CNNVD]Oracle 9iAS Apache PL/SQL模块Web管理页面访问控制漏洞(CNNVD-200207-004)

        
        Oracle 9iAS的Web服务部分是由增加了PL/SQL支持模块的Apache服务器提供。主机上相关的用于管理的Web页面可以使用户修改数据库访问描述符和缓存设置。
        Oracle 9iAS的Web管理页面访问控制上存在问题,远程攻击者可能利用此漏洞更改系统设置,造成拒绝服务攻击。
        默认安装情况下,对于那些管理页面的访问不需要认证,这就使任意远程攻击者可以通过访问那些管理页面执行某些操作,更改PL/SQL应用程序或者使合法用户不能访问服务器程序。
        

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

cpe:/a:oracle:application_server:1.0.2Oracle Application Server 9i 1.0.2
cpe:/a:oracle:oracle9i:9.0.1
cpe:/a:oracle:application_server_web_cache:2.0.0.1Oracle Oracle9iAS Web Cache 2.0.0.1
cpe:/a:oracle:application_server_web_cache:2.0.0.0Oracle Oracle9iAS Web Cache 2.0.0.0
cpe:/a:oracle:application_server_web_cache:2.0.0.3Oracle Oracle9iAS Web Cache 2.0.0.3
cpe:/a:oracle:oracle9i:9.0
cpe:/a:oracle:application_server_web_cache:2.0.0.2Oracle Oracle9iAS Web Cache 2.0.0.2
cpe:/a:oracle:oracle8i:8.1.7_.1
cpe:/a:oracle:oracle8i:8.1.7

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0561
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2002-0561
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200207-004
(官方数据源) CNNVD

- 其它链接及资源

http://marc.info/?l=bugtraq&m=101301813117562&w=2
(UNKNOWN)  BUGTRAQ  20020206 Hackproofing Oracle Application Server paper
http://otn.oracle.com/deploy/security/pdf/ias_modplsql_alert.pdf
(VENDOR_ADVISORY)  CONFIRM  http://otn.oracle.com/deploy/security/pdf/ias_modplsql_alert.pdf
http://www.cert.org/advisories/CA-2002-08.html
(UNKNOWN)  CERT  CA-2002-08
http://www.kb.cert.org/vuls/id/611776
(VENDOR_ADVISORY)  CERT-VN  VU#611776
http://www.nextgenss.com/papers/hpoas.pdf
(UNKNOWN)  MISC  http://www.nextgenss.com/papers/hpoas.pdf
http://www.securityfocus.com/bid/4292
(VENDOR_ADVISORY)  BID  4292

- 漏洞信息

Oracle 9iAS Apache PL/SQL模块Web管理页面访问控制漏洞
高危 配置错误
2002-07-03 00:00:00 2005-10-20 00:00:00
远程  
        
        Oracle 9iAS的Web服务部分是由增加了PL/SQL支持模块的Apache服务器提供。主机上相关的用于管理的Web页面可以使用户修改数据库访问描述符和缓存设置。
        Oracle 9iAS的Web管理页面访问控制上存在问题,远程攻击者可能利用此漏洞更改系统设置,造成拒绝服务攻击。
        默认安装情况下,对于那些管理页面的访问不需要认证,这就使任意远程攻击者可以通过访问那些管理页面执行某些操作,更改PL/SQL应用程序或者使合法用户不能访问服务器程序。
        

- 公告与补丁

        临时解决方法:
        如果您不能立刻安装补丁或者升级,CERT建议您采取以下措施以降低威胁:
        * 在/Apache/modplsql/cfg/wdbsvr.app文件中对可以访问的用户名等相关信息进行设置,确信只有合法用户才能访问。
        厂商补丁:
        Oracle
        ------
        目前厂商已经提供了解决方案以修复这个安全问题,请到厂商的主页下载:
        
        http://otn.oracle.com/deploy/security/pdf/ias_modplsql_alert.pdf

- 漏洞信息

9472
Oracle PL/SQL Gateway Web Admin Interface Null Authentication
Remote / Network Access Misconfiguration
Loss of Integrity
Exploit Public Vendor Verified

- 漏洞描述

Oracle Application Server contains a flaw that may allow a remote unauthenticated malicious user to perform PL/SQL application administrative functions. The issue is triggered when an attacker directly requests the mod_plsql gateway administration web interface. It is possible that the flaw may allow modification of Database Access Descriptors (DAD) and cache settings, resulting in a loss of integrity.

- 时间线

2002-01-10 Unknow
Unknow Unknow

- 解决方案

Currently, there are no known upgrades or patches to correct this issue. It is possible to correct the flaw by implementing the following workaround(s): 1) Change the adminPath entry located in $ORACLE_HOME$\Apache\modplsql\cfg\wdbsvr.app to a path name that does not reveal the exact location of the true administration pages. 2) Secure the mod_plsql administration pages by either setting the parameter "administrators" or by setting the "adminDAD" parameter in the DAD configuration file $ORACLE_HOME/Apache/modplsql/cfg/wdbsvr.app.

- 相关参考

- 漏洞作者

- 漏洞信息

Oracle 9iAS Apache PL/SQL Module Web Administration Access Vulnerability
Configuration Error 4292
Yes No
2002-03-15 12:00:00 2009-07-11 11:56:00
Credited to David Litchfield.

- 受影响的程序版本

Stonesoft StoneBeat GUI 2.0 0.3
Stonesoft StoneBeat GUI 2.0 .0.3
Oracle Oracle9i Standard Edition 9.0.1
Oracle Oracle9i Standard Edition 9.0
Oracle Oracle9i Application Server Web Cache 2.0 .0.3
- Oracle Oracle9i Application Server
Oracle Oracle9i Application Server Web Cache 2.0 .0.2 NT
- Oracle Oracle9i Application Server
Oracle Oracle9i Application Server Web Cache 2.0 .0.2
- Oracle Oracle9i Application Server
Oracle Oracle9i Application Server Web Cache 2.0 .0.1
- Oracle Oracle9i Application Server
Oracle Oracle9i Application Server Web Cache 2.0 .0.0
- Oracle Oracle9i Application Server
Oracle Oracle9i Application Server 1.0.2
Oracle Oracle8i Standard Edition 8.1.7 .1
Oracle Oracle8i Standard Edition 8.1.7

- 漏洞讨论

The Oracle 9iAS web service is powered by the Apache webserver. Included is an Apache module for PL/SQL support. Administrative web pages associated with this server allow a web user to modify Database Access Descriptors and cache settings.

By default, no authentication is required to access these administrative pages. As a result, any attacker able to access the page may perform these administrative functions. The ability to modify DAD settings may allow an attacker to access or modify PL/SQL applications, or deny service to legitimate users.

- 漏洞利用

No exploit is required.

- 解决方案

Access can be restricted through configuration. Specify authorized user names or an administrative Database Access Descriptor in the configuration file /Apache/modplsql/cfg/wdbsvr.app.

Currently the SecurityFocus staff are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站