Lucene search

K
certCERTVU:736923
HistoryMar 12, 2002 - 12:00 a.m.

Oracle 9iAS SOAP components allow anonymous users to deploy applications by default

2002-03-1200:00:00
www.kb.cert.org
74

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.918 High

EPSS

Percentile

98.9%

Overview

Oracle Application Server 9iAS installs with Simple Object Access Protocol (SOAP) enabled by default and allows unauthenticated remote users to deploy and undeploy SOAP services and providers.

Description

Oracle Application Server 9iAS supports Simple Object Access Protocol (SOAP), an XML-based protocol used by Oracle for Web administration of database services. Version 1.0.2.2.1 of Oracle 9iAS installs with SOAP components enabled by default. The typical installation of this Oracle product also includes SOAP tools that allow remote Web users to deploy and undeploy SOAP services and providers on the server, without authentication and without notice to the Oracle system adminstrator.


Impact

An attacker can control aspects of the Oracle system in ways not intended by its administrators. The attacker may be able to obtain or modify data or perform other actions that are not authorized.


Solution

The CERT/CC is currently unaware of a practical solution to this problem.


The following workarounds were suggested by David Litchfield and have not been tested by CERT/CC.

To disable SOAP, delete or comment-out the following lines in the file named “$ORACLE_HOME/Apache/Jserv/etc/jserv.conf”:

ApJServGroup group2 1 1
$ORACLE_HOME/Apache/Jserv/etc/jservSoap.properties
ApJServMount /soap/servlet ajpv12://localhost:8200/soap
ApJServMount /dms2 ajpv12://localhost:8200/soap
ApJServGroupMount /soap/servlet balance://group2/soap

Note that in the lines above, “$ORACLE_HOME” may be spelled out, and the port number may differ from 8200.

To prevent SOAP services from being deployed or undeployed, add the following line to the file named “$ORACLE_HOME/soap/werbapps/soap/WEB-INF/config/soapConfig.xml”:

<osc:option name=“autoDeploy” value=“false” />


Vendor Information

736923

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

Oracle __ Affected

Notified: February 08, 2002 Updated: February 26, 2002

Status

Affected

Vendor Statement

“Information is correct. Please link to Oracle Alert #28 at <http://otn.oracle.com/deploy/security/alerts.htm&gt;.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23736923 Feedback>).

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

Thanks to David Litchfield for reporting this vulnerability.

This document was written by Shawn Van Ittersum.

Other Information

CVE IDs: CVE-2001-1371
Severity Metric: 14.06 Date Public:

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.918 High

EPSS

Percentile

98.9%