CVE-2005-1383
CVSS7.5
发布时间 :2005-05-03 00:00:00
修订时间 :2016-10-17 23:19:40
NMCOS    

[原文]The OHS component 1.0.2 through 10.x, when UseWebcacheIP is disabled, in Oracle Application Server allows remote attackers to bypass HTTP Server mod_access restrictions via a request to the webcache TCP port 7778.


[CNNVD]Webcache客户端请求绕过OHS mod_access限制(CNNVD-200505-876)

        Oracle应用服务器10g是一个综合解决方案,用于开发、集成和部署企业的应用系统、门户和网站。Oracle HTTP Server是其中的一个组件。
        Oracle Application Server的Oracle HTTP Server(OHS)存在访问限制绕过漏洞。

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

cpe:/a:oracle:application_server:10.1.0.3.1Oracle Oracle10g Application Server 10.1.0.3.1
cpe:/a:oracle:application_server:10.1.2Oracle Oracle10g Application Server 10.1.2
cpe:/a:oracle:application_server:10.1.0.2Oracle Oracle10g Application Server 10.1.0.2
cpe:/a:oracle:application_server:10.1.0.3Oracle Oracle10g Application Server 10.1.0.3

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1383
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-1383
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200505-876
(官方数据源) CNNVD

- 其它链接及资源

http://marc.info/?l=bugtraq&m=111472266123952&w=2
(UNKNOWN)  BUGTRAQ  20050428 Webcache Client Requests Bypass OHS mod_access Restrictions
http://www.red-database-security.com/advisory/oracle_webcache_bypass.html
(PATCH)  MISC  http://www.red-database-security.com/advisory/oracle_webcache_bypass.html
http://www.securityfocus.com/bid/13418
(PATCH)  BID  13418
http://xforce.iss.net/xforce/xfdb/20311
(PATCH)  XF  oracle9ias-application-cache-url-bypass(20311)

- 漏洞信息

Webcache客户端请求绕过OHS mod_access限制
高危 设计错误
2005-05-03 00:00:00 2005-10-20 00:00:00
远程  
        Oracle应用服务器10g是一个综合解决方案,用于开发、集成和部署企业的应用系统、门户和网站。Oracle HTTP Server是其中的一个组件。
        Oracle Application Server的Oracle HTTP Server(OHS)存在访问限制绕过漏洞。

- 公告与补丁

        目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:
        http://www.oracle.com

- 漏洞信息

15908
Oracle Application Server Webcache Requests OHS mod_access Restriction Bypass
Remote / Network Access Information Disclosure
Loss of Confidentiality
Exploit Public Vendor Verified

- 漏洞描述

Oracle Application Server contains a flaw that may lead to an unauthorized information disclosure. It is possible to restrict a list of URLs in Oracle HTTP Server (OHS, port 7779) by using the 'mod_access' function. However these restricted URLs can be accessed via the Oracle Web Cache on port 7778, resulting in a loss of confidentiality.

- 时间线

2005-04-26 Unknow
2005-04-26 Unknow

- 解决方案

Currently, there are no known upgrades to correct this issue. However, Oracle Corporation has released a patch for Oracle HTTP Server (OHS) to address this vulnerability. It is also possible to correct the flaw by implementing the following workaround: Add "UseWebCacheIP ON" to httpd.conf.

- 相关参考

- 漏洞作者

- 漏洞信息

Oracle Application Server HTTP Service Mod_Access Restriction Bypass Vulnerability
Design Error 13418
Yes No
2005-04-28 12:00:00 2009-07-12 02:06:00
Discovery of this issue is credited to Alexander Kornbrust.

- 受影响的程序版本

Oracle Oracle9i Application Server 9.2 .0.6
Oracle Oracle9i Application Server 9.0.3 .1
Oracle Oracle9i Application Server 9.0.3
Oracle Oracle9i Application Server 9.0.2 .3
Oracle Oracle9i Application Server 9.0.2 .2
Oracle Oracle9i Application Server 9.0.2 .1
Oracle Oracle9i Application Server 9.0.2 .0.1
Oracle Oracle9i Application Server 9.0.2 .0.0
Oracle Oracle9i Application Server 9.0.2
Oracle Oracle9i Application Server 1.0.2 .2.2
Oracle Oracle9i Application Server 1.0.2 .2
Oracle Oracle9i Application Server 1.0.2 .1s
Oracle Oracle9i Application Server 1.0.2
Oracle Oracle9i Application Server
- Compaq Tru64 5.1
- Compaq Tru64 5.0 f
- Compaq Tru64 5.0 a
- Compaq Tru64 5.0
- Compaq Tru64 4.0 g
- HP HP-UX 11.11
- HP HP-UX 11.0 4
- HP HP-UX 11.0
- HP HP-UX 10.34
- HP HP-UX 10.30
- HP HP-UX 10.26
- HP HP-UX 10.20
- HP HP-UX 10.16
- HP HP-UX 10.10
- HP HP-UX 10.9
- HP HP-UX 10.8
- HP HP-UX 10.1 0
- HP HP-UX 10.0 1
- HP HP-UX 10.0
- HP HP-UX 9.10
- HP HP-UX 9.9
- HP HP-UX 9.8
- HP HP-UX 9.7
- HP HP-UX 9.6
- HP HP-UX 9.5
- HP HP-UX 9.4
- HP HP-UX 9.3
- HP HP-UX 9.1
- HP HP-UX 9.0
- HP HP-UX 8.9
- HP HP-UX 8.8
- HP HP-UX 8.7
- HP HP-UX 8.6
- HP HP-UX 8.5
- HP HP-UX 8.4
- HP HP-UX 8.2
- HP HP-UX 8.1
- HP HP-UX 8.0
- HP HP-UX 7.8
- HP HP-UX 7.6
- HP HP-UX 7.4
- HP HP-UX 7.2
- HP HP-UX 7.0
- IBM AIX 4.3.3
- IBM AIX 4.3.2
- IBM AIX 4.3.1
- IBM AIX 4.3
- IBM AIX 4.2.1
- IBM AIX 4.2
- IBM AIX 4.1.5
- IBM AIX 4.1.4
- IBM AIX 4.1.3
- IBM AIX 4.1.2
- IBM AIX 4.1.1
- IBM AIX 4.1
- IBM AIX 4.0
- IBM AIX 3.2.5
- IBM AIX 3.2.4
- IBM AIX 3.2
- IBM AIX 3.1
- IBM AIX 3.0 x
- IBM AIX 2.2.1
- IBM AIX 1.3
- IBM AIX 1.2.1
- IBM AIX 5.1
- Microsoft Windows 2000 Professional SP2
- Microsoft Windows 2000 Professional SP1
- Microsoft Windows 2000 Professional
- Microsoft Windows NT 4.0 SP6a
- Microsoft Windows NT 4.0 SP5
- Microsoft Windows NT 4.0 SP4
- Microsoft Windows NT 4.0 SP3
- Microsoft Windows NT 4.0 SP2
- Microsoft Windows NT 4.0 SP1
- Microsoft Windows NT 4.0
- Sun Solaris 2.5.1 _x86
- Sun Solaris 2.5.1
- Sun Solaris 1.1.4 -JL
- Sun Solaris 1.1.4
- Sun Solaris 1.1.3 _U1
- Sun Solaris 1.1.3
- Sun Solaris 1.1.2
- Sun Solaris 1.1.1
- Sun Solaris 8_x86
- Sun Solaris 8_sparc
- Sun Solaris 7.0_x86
- Sun Solaris 7.0
- Sun Solaris 2.6_x86HW5/98
- Sun Solaris 2.6_x86HW3/98
- Sun Solaris 2.6_x86
- Sun Solaris 2.6 HW5/98
- Sun Solaris 2.6 HW3/98
- Sun Solaris 2.6
- Sun Solaris 2.5_x86
- Sun Solaris 2.5
- Sun Solaris 2.4_x86
- Sun Solaris 2.4
- Sun Solaris 2.3
- Sun Solaris 2.2
- Sun Solaris 2.1
- Sun Solaris 2.0
- Sun Solaris 1.2
- Sun Solaris 1.1
Oracle Oracle10g Application Server 10.1.2
Oracle Oracle10g Application Server 10.1 .0.3.1
Oracle Oracle10g Application Server 10.1 .0.3
Oracle Oracle10g Application Server 10.1 .0.2
Oracle Oracle10g Application Server 9.0.4 .1
Oracle Oracle10g Application Server 9.0.4 .0
Oracle Oracle HTTP Server 9.2 .0
+ Apache Software Foundation Apache 1.3.22
Oracle Oracle HTTP Server 9.0.1
Oracle Oracle HTTP Server 8.1.7
+ Apache Software Foundation Apache 1.3.12
+ Oracle Oracle8 8.1.7
+ Oracle Oracle8i Enterprise Edition 8.1.7 .0.0
+ Oracle Oracle8i Standard Edition 8.1.7

- 漏洞讨论

Oracle HTTP Server(OHS) of Oracle Application Server is prone to an access restriction bypass vulnerability.

It is possible to configure a list of forbidden URIs in OHS. This is accomplished using 'mod_access'. A URI that is listed is not supposed to be accessible to certain clients, depending on the configuration. However, reports indicate that the Oracle Webcache client may be used to access URIs regardless of the restrictions outlined in OHS 'mod_access'.

- 漏洞利用

The following examples are available:
(Port 7778 = Webcache, Port 7779 = OHS)

The following URLs are NOT protected if you access them via Webcache:
http://example.com:7778/dmsoc4j/AggreSpy?format=metrictable&nountype=ohs_child&orderby=Name
http://example.com:7778/server-status
http://example.com:7778/dms0

The following URLs are protected:
http://example.com:7779/dmsoc4j/AggreSpy?format=metrictable&nountype=ohs_child&orderby=Name
http://example.com:7779/server-status
http://example.com:7779/dms0

- 解决方案

It is reported that the vendor has addressed this vulnerability by introducing the parameter 'UseWebcacheIP' to the Oracle HTTP Server(OHS). This is not confirmed. Customers are advised to contact the vendor to obtain further information in regards to this parameter.

Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站