May 09 2008 12:49PM
Deniz Cevik (Deniz Cevik intellect com tr) 


Affected Software/Device: Oracle Application Server Portal

Vulnerability: Authentication Bypass

Tested Version: 10G

Risk: Medium

Description:

Oracle Application Server Portal (OracleAS Portal) is a Web-based
application for building and deploying portals. It provides a secure,
manageable environment for accessing and interacting with enterprise
software services and information resources.

Initially /dav_portal/portal/ directory is being protected using basic
authentication. It is possible to bypass and access content of
dav_portal by adding a specially crafted cookie value in the http
request header.

Sample Request:

In order to construct a special http request first visit
"http:/site/pls/portal/%0A" url. This request adds special session id
into cookie. Subsequent connection attempts to
"http://site/dav_portal/portal/"; will reveal the contents of directory
without any authentication.

Deniz CEVIK
www.intellectpro.com.tr

 

 

[Ph4nt0m] <http://www.ph4nt0m.org/>  

[Ph4nt0m Security Team]

                   <http://blog.ph4nt0m.org/> [EMAIL PROTECTED]

          Email:  [EMAIL PROTECTED]

          PingMe:
<http://cn.pingme.messenger.yahoo.com/webchat/ajax_webchat.php?yid=hanqin_wu
hq&sig=9ae1bbb1ae99009d8859e88e899ab2d1c2a17724> 

          === V3ry G00d, V3ry Str0ng ===

          === Ultim4te H4cking ===

          === XPLOITZ ! ===

          === #_# ===

#If you brave,there is nothing you cannot achieve.#

 

 


--~--~---------~--~----~------------~-------~--~----~
 要向邮件组发送邮件,请发到 [email protected]
 要退订此邮件,请发邮件至 [EMAIL PROTECTED]
-~----------~----~----~----~------~----~------~--~---

<<inline: image001.gif>>

回复