exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Oracle WebCenter / Fatwire Header Injection

Oracle WebCenter / Fatwire Header Injection
Posted Apr 17, 2013
Authored by Kestutis Gudinavicius | Site sec-consult.com

Oracle WebCenter Sites Satellite Server versions 7.6.0 Patch1, 7.6.2, 11.1.1.6.0, and 11.1.1.6.1 suffer from HTTP header injection and cache poisoning vulnerabilities.

tags | exploit, web, vulnerability
advisories | CVE-2013-1509
SHA-256 | b211d5ba79c2e4506fc8c437bbb356031d7bc5df5b5dceb6705801d00369973b

Oracle WebCenter / Fatwire Header Injection

Change Mirror Download
SEC Consult Vulnerability Lab Security Advisory < 20130417-2 >
=======================================================================
title: HTTP header injection/Cache poisoning in Oracle WebCenter
Sites Satellite Server
product: Oracle WebCenter Sites Satellite Server (former FatWire
Satellite Server)
vulnerable version: 7.6.0 Patch1, 7.6.2, 11.1.1.6.0, 11.1.1.6.1
fixed version: Patch information see sections below
CVE: CVE-2013-1509
impact: medium
homepage: http://www.oracle.com/us/corporate/acquisitions/fatwire/index.html
found: 2012-09-17
by: K. Gudinavicius
SEC Consult Vulnerability Lab
https://www.sec-consult.com
=======================================================================

Vendor description:
-------------------
FatWire Satellite Server is a predecessor product of Oracle WebCenter Sites
Satellite Server.

"Oracle WebCenter Sites Satellite Server enables organizations to deliver
segmented, targeted, and dynamically assembled content across global Web
properties with rapid response times and intelligent edge caching to optimize
and speed the delivery of dynamic Web experiences."

Source: http://www.oracle.com/us/products/middleware/webcenter/satellite-server/overview/index.html


Vulnerability overview/description:
-----------------------------------
Due to unsanitized user input it is possible to inject arbitrary HTTP header
values in certain HTTP responses of the Satellite Server. This can be
exploited, for example, to perform session fixation and malicious redirection
attacks via the Set-Cookie and the Refresh headers. Moreover, the Satellite
Server caches these HTTP responses with the injected HTTP header resulting in
all further requests to the same resource being served with the poisoned HTTP
response, while these objects remain in cache.


Proof of concept:
-----------------
An arbitrary header can be injected in the HTTP responses of the
downloadable resources. The values of the blobheadername2 and the
blobheadervalue2 URL parameters are user controllable. In the following
example the Refresh header is injected:

http://fatwire/cs/Satellite?blobcol=urldata&blobheadername1=content-type&blobheadername2=Refresh&
blobheadervalue1=application/pdf&blobheadervalue2=0;url=http://www.sec-consult.com&blobkey=id&
blobnocache=false&blobtable=MungoBlobs&blobwhere=1342534304149&ssbinary=true&site=S08

The returned HTTP response will contain the injected Refresh header and its
value. Furthermore, the HTTP response will be cached, so the next time users
will be accessing the same downloadable resource using the standard URL, they
will be affected and redirected using the injected Refresh header value.

HTTP/1.1 200 OK
Date: Thu, 06 Sep 2012 15:59:04 GMT
Refresh: 0;url=http://www.sec-consult.com
Last-Modified: Thu, 06 Sep 2012 15:54:20 GMT
Content-Type: application/pdf
Connection: close
Content-Length: 772193


Vulnerable / tested versions:
-----------------------------
The following installation has been tested:
* FatWire Satellite Server 7.6.0 Patch1.


Vendor contact timeline:
------------------------
2012-11-26: Contacting vendor through secalert_us@oracle.com
2012-11-26: Vendor response, will investigate issues
2012-11-27: Investigation ongoing, the following ID assigned:
S0321206 - ARBITRARY HTTP HEADER INJECTION/CACHE POISONING IN FATWIRE
2013-01-25: S0321206 Issue fixed in main codeline, scheduled for a future CPU
2013-04-12: S0321206 is fixed in upcoming CPU on 2013-04-16
2013-04-16: Oracle releases April 2013 CPU
2013-04-17: Public release of SEC Consult advisory


Solution:
---------
Apply latest patches, see:
http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html


Workaround:
-----------


Advisory URL:
-------------
https://www.sec-consult.com/en/Vulnerability-Lab/Advisories.htm


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
SEC Consult Unternehmensberatung GmbH

Office Vienna
Mooslackengasse 17
A-1190 Vienna
Austria

Tel.: +43 / 1 / 890 30 43 - 0
Fax.: +43 / 1 / 890 30 43 - 25
Mail: research at sec-consult dot com
https://www.sec-consult.com

EOF K. Gudinavicius / @2013


Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close