HTTP Response Splitting in Oracle Enterprise Manager (pageName parameter) (CVE-2012-0527)

Type securityvulns
Reporter Securityvulns
Modified 2012-04-22T00:00:00



AppSecInc Team SHATTER Security Advisory

HTTP Response Splitting in Oracle Enterprise Manager (pageName parameter).

Risk Level: Medium

Affected versions: Oracle Enterprise Manager Database Control,, (and previous patchsets) Oracle Enterprise Manager Grid Control (and previous patchsets)

Remote exploitable: Yes

Credits: This vulnerability was discovered and researched by Esteban Martinez Fayo of Application Security Inc.

Details: HTTP Response Splitting is a web application vulnerability where input parameters are unsafely used in response headers allowing an attacker to make the server print one (or more) new line sequences in the header section which allows to set arbitrary headers, take control of the body, or break the response into two or more separate responses. This can be used to perform cross-site scripting, cross-user defacement and web cache poisoning, among other attacks. The 'pageName' parameter of web page /em/console/database/schema/grantObjPrivs is vulnerable to this kind of attacks.

Impact: An attacker that convinces a valid Oracle Enterprise Manager user to click or open a malicious link can take over the user's session.

Vendor Status: Vendor was contacted and a patch was released.

Workaround: There is no workaround for this vulnerability.

Fix: Apply Oracle Critical Patch Update April 2012 available at Oracle Support.

CVE: CVE-2012-0527


Timeline: Vendor Notification - 08/16/2011 Vendor Response - 08/18/2011 Fix - 4/17/2012 Public Disclosure - 4/19/2012

Copyright (c) 2012 Application Security, Inc. About Application Security, Inc.

AppSecInc is a pioneer and leading provider of database security solutions for the enterprise. By providing strategic and scalable software-only solutions - AppDetectivePro for auditors and IT advisors, and DbProtect for the enterprise - AppSecInc supports the database security lifecycle for some of the most complex and demanding environments in the world across more than 1,300 active commercial and government customers.

Leveraging the world's most comprehensive database security knowledgebase from the company's renowned team of threat researchers, TeamSHATTER, AppSecInc products help customers achieve unprecedented levels of data security from nefarious or accidental activities, while reducing overall risk and helping to ensure continuous regulatory and industry compliance.

Disclaimer: The information in the advisory is believed to be accurate at the time of publishing based on currently available information. Use of the information constitutes acceptance for use in an AS IS condition. There are no warranties with regard to this information. Neither the author nor the publisher accepts any liability for any direct, indirect, or consequential loss or damage arising from use of, or reliance on, this information. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (MingW32) - WinPT 1.4.3 Charset: UTF-8

iEYEARECAAYFAk+Qfs0ACgkQRx91imnNIgG0VgCePEMKr54zVy+j7xp2LPkmkbO4 d7cAn3NKD3adUs4L0ekEABkUf6tW0nxR =8LE+ -----END PGP SIGNATURE-----