what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

SNS Advisory 84

SNS Advisory 84
Posted Oct 26, 2005
Authored by Little eArth Corporation | Site lac.co.jp

SNS Advisory 84 - Oracle Application Server has vulnerabilities of HTTP Response Splitting. This makes possible to represent an unreal content as if it is real or to cause Cross Site Scripting attacks.

tags | advisory, web, vulnerability, xss
SHA-256 | d2593262db3bce5fcc290a10c71016c69956f1b4127c661c1b9c404cf7abd8d5

SNS Advisory 84

Change Mirror Download
----------------------------------------------------------------------
SNS Advisory No.84
Oracle Application Server HTTP Response Splitting Vulnerability

Problem first discovered on: Tue, 01 Feb 2005
Published on: Tue, 21 Oct 2005
----------------------------------------------------------------------

Severity Level:
---------------
Medium


Overview:
---------
Oracle Application Server has vulnerabilities of HTTP Response Splitting.
This makes possible to represent an unreal content as if it is real or
to cause Cross Site Scripting attacks.


Problem Description:
--------------------
Oracle Application Server has Session URL Rewriting function, which can embed
and specify session management parameters in URL.

In Session URL Rewriting function, the server does not sanitize Special
character appropriately when resetting the specified session
management parameters as Cookie.

Therefore, arbitrary HTTP header or content can be outputted as the
response when specifying session management parameters including
arbitrary content prefixed with a linefeed code.

In the result, representing unreal content as if it is real or causing
Cross Site Scripting attacks can be possible. And this might be
exploited for Phishing Fraud, Session Hijack, and so on.


Tested Versions:
----------------
Oracle9i Application Server Release 2 (9.0.2.3)
Oracle Application Server 10g Release 1 (9.0.4.2)
Oracle Application Server 10g Release 2 (10.1.2.0)


Solution:
---------
Apply Critical Patch Update - October 2005
http://www.oracle.com/technology/deploy/security/pdf/cpuoct2005.html


Discovered by:
--------------
Keigo Yamazaki (LAC)


Disclaimer:
-----------
The information contained in this advisory may be revised without prior
notice and is provided as it is. Users shall take their own risk when
taking any actions following reading this advisory. LAC Co., Ltd.
shall take no responsibility for any problems, loss or damage caused
by, or by the use of information provided here.

This advisory can be found at the following URL:
http://www.lac.co.jp/business/sns/intelligence/SNSadvisory_e/84_e.html
----------------------------------------------------------------------


Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close