what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

MG-2004-01.txt

MG-2004-01.txt
Posted Mar 30, 2004
Authored by Guido van Rooij, Arjan de Vet | Site madison-gurkha.com

Hard coded login sequence values for Oracle SSO allow for easy man in the middle attacks.

tags | advisory
SHA-256 | 7b8e79653622db46a6b91adc1109b89bba51e9e2a63859147c6505fd5a25220e

MG-2004-01.txt

Change Mirror Download

Name: Problem with customized login pages for Oracle SSO
Id: MG-2004-01
Issued: 2004-03-30
Authors: Guido van Rooij (Madison Gurkha)
Arjan de Vet (Madison Gurkha)
Application: All known versions
Platforms: All supported platforms
Reference: http://www.madison-gurkha.com/advisories/MG-2004-01.txt
CVE: ---


Description:

Oracle has a Single Sign-on application called OSSO.

Among others, it has a web based login form. This form can be
customized as explained in "Oracle 9iAS Single Sign-on
Administrators Guide, Release 2(9.0.2), Part No. A96115-01". In
this document, a sample login form is published (section 8).

The problem with this login form is that it can be abused by
unauthorized persons to gain access to the supplied usercode and
password. This can be done by tricking a valid user to open a
URL that is the real URL of the customized SSO login page but
with a modified URL parameter.

The problem is that the attack makes use of the real login page.
Thus, if users check host certificates only, they will not be
able to detect that they are being tricked. Also, after logging
in, they can be redirected to the proper application on the
intended system to hide the fact that usercode and password have
been stolen.

Note that the problem is a design problem in the way custom
login pages must be implemented, not a problem with a sample
script.

Impact:

Users can accidentally reveal their SSO usercode/password
combination to unauthorized persons.

Vendor response:

Oracle came with the following solution:

The p_submit_url value in the customized login page can be
hard-coded. This will mitigate this issue since it will not be
an input value to the page anymore. The p_submit_url URL value
in the 902 SSO server is in the following format:

http(s)://sso_host:port/pls/orasso/orasso.wwsso_app_admin.ls_login

Recommendation:

We recommend implementing the proposed solution.

Of course, we hope that Oracle will update its documentation as
well such that the p_submit_url parameter will be removed from
all example code.

History:

2003-12: discovered
2004-01-12: vendor informed
2004-02-18: vendor came with solution
2004-03-10: communicated solution
2004-03-30: publication
Login or Register to add favorites

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    27 Files
  • 13
    Aug 13th
    18 Files
  • 14
    Aug 14th
    50 Files
  • 15
    Aug 15th
    33 Files
  • 16
    Aug 16th
    23 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close