exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

MG-2004-01.txt

MG-2004-01.txt
Posted Mar 30, 2004
Authored by Guido van Rooij, Arjan de Vet | Site madison-gurkha.com

Hard coded login sequence values for Oracle SSO allow for easy man in the middle attacks.

tags | advisory
SHA-256 | 7b8e79653622db46a6b91adc1109b89bba51e9e2a63859147c6505fd5a25220e

MG-2004-01.txt

Change Mirror Download

Name: Problem with customized login pages for Oracle SSO
Id: MG-2004-01
Issued: 2004-03-30
Authors: Guido van Rooij (Madison Gurkha)
Arjan de Vet (Madison Gurkha)
Application: All known versions
Platforms: All supported platforms
Reference: http://www.madison-gurkha.com/advisories/MG-2004-01.txt
CVE: ---


Description:

Oracle has a Single Sign-on application called OSSO.

Among others, it has a web based login form. This form can be
customized as explained in "Oracle 9iAS Single Sign-on
Administrators Guide, Release 2(9.0.2), Part No. A96115-01". In
this document, a sample login form is published (section 8).

The problem with this login form is that it can be abused by
unauthorized persons to gain access to the supplied usercode and
password. This can be done by tricking a valid user to open a
URL that is the real URL of the customized SSO login page but
with a modified URL parameter.

The problem is that the attack makes use of the real login page.
Thus, if users check host certificates only, they will not be
able to detect that they are being tricked. Also, after logging
in, they can be redirected to the proper application on the
intended system to hide the fact that usercode and password have
been stolen.

Note that the problem is a design problem in the way custom
login pages must be implemented, not a problem with a sample
script.

Impact:

Users can accidentally reveal their SSO usercode/password
combination to unauthorized persons.

Vendor response:

Oracle came with the following solution:

The p_submit_url value in the customized login page can be
hard-coded. This will mitigate this issue since it will not be
an input value to the page anymore. The p_submit_url URL value
in the 902 SSO server is in the following format:

http(s)://sso_host:port/pls/orasso/orasso.wwsso_app_admin.ls_login

Recommendation:

We recommend implementing the proposed solution.

Of course, we hope that Oracle will update its documentation as
well such that the p_submit_url parameter will be removed from
all example code.

History:

2003-12: discovered
2004-01-12: vendor informed
2004-02-18: vendor came with solution
2004-03-10: communicated solution
2004-03-30: publication
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close