exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

SNS Advisory 84

SNS Advisory 84
Posted Oct 26, 2005
Authored by Little eArth Corporation | Site lac.co.jp

SNS Advisory 84 - Oracle Application Server has vulnerabilities of HTTP Response Splitting. This makes possible to represent an unreal content as if it is real or to cause Cross Site Scripting attacks.

tags | advisory, web, vulnerability, xss
SHA-256 | d2593262db3bce5fcc290a10c71016c69956f1b4127c661c1b9c404cf7abd8d5

SNS Advisory 84

Change Mirror Download
----------------------------------------------------------------------
SNS Advisory No.84
Oracle Application Server HTTP Response Splitting Vulnerability

Problem first discovered on: Tue, 01 Feb 2005
Published on: Tue, 21 Oct 2005
----------------------------------------------------------------------

Severity Level:
---------------
Medium


Overview:
---------
Oracle Application Server has vulnerabilities of HTTP Response Splitting.
This makes possible to represent an unreal content as if it is real or
to cause Cross Site Scripting attacks.


Problem Description:
--------------------
Oracle Application Server has Session URL Rewriting function, which can embed
and specify session management parameters in URL.

In Session URL Rewriting function, the server does not sanitize Special
character appropriately when resetting the specified session
management parameters as Cookie.

Therefore, arbitrary HTTP header or content can be outputted as the
response when specifying session management parameters including
arbitrary content prefixed with a linefeed code.

In the result, representing unreal content as if it is real or causing
Cross Site Scripting attacks can be possible. And this might be
exploited for Phishing Fraud, Session Hijack, and so on.


Tested Versions:
----------------
Oracle9i Application Server Release 2 (9.0.2.3)
Oracle Application Server 10g Release 1 (9.0.4.2)
Oracle Application Server 10g Release 2 (10.1.2.0)


Solution:
---------
Apply Critical Patch Update - October 2005
http://www.oracle.com/technology/deploy/security/pdf/cpuoct2005.html


Discovered by:
--------------
Keigo Yamazaki (LAC)


Disclaimer:
-----------
The information contained in this advisory may be revised without prior
notice and is provided as it is. Users shall take their own risk when
taking any actions following reading this advisory. LAC Co., Ltd.
shall take no responsibility for any problems, loss or damage caused
by, or by the use of information provided here.

This advisory can be found at the following URL:
http://www.lac.co.jp/business/sns/intelligence/SNSadvisory_e/84_e.html
----------------------------------------------------------------------


Login or Register to add favorites

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close