what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

integrigy.oracle2.txt

integrigy.oracle2.txt
Posted Jul 24, 2003
Authored by Stephen Kost | Site integrigy.com

Integrigy Security Alert - The Oracle Applications AOL/J Setup Test Suite, used to trouble-shoot the Self-Service framework, can be exploited to remotely retrieve sensitive configuration and host information without application authentication. The AOL/J Setup Test Suite is installed by default for all 11i implementations. A mandatory patch from Oracle is required to solve this security issue. Affected versions: 11.5.1 - 11.5.8.

tags | advisory
SHA-256 | 854e86c2ad0a68b842923e90cca894c381a953aeda7c67d317b9cdd7deb2aefc

integrigy.oracle2.txt

Change Mirror Download

Integrigy Security Alert
______________________________________________________________________

Oracle E-Business Suite AOL/J Setup Test Information Disclosure
July 23, 2003
______________________________________________________________________

Summary:

The Oracle Applications AOL/J Setup Test Suite, used to trouble-shoot the
Self-Service framework, can be exploited to remotely retrieve sensitive
configuration and host information without application authentication. The
AOL/J Setup Test Suite is installed by default for all 11i implementations.
A mandatory patch from Oracle is required to solve this security issue.

Product: Oracle E-Business Suite
Versions: 11.5.1 - 11.5.8
Platforms: All platforms
Risk Level: Low
_____________________________________________________________________

Description:

The Oracle Applications Self-Service Framework (OA Framework) is the
foundation for self-service HRMS, iProcurement, iExpenses, and other web
applications. The OA Framework includes a Test Suite used to verify its
installation and configuration. The AOL/J Setup Test Suite is implemented
as Java Server Pages (JSP) and the main JSP page is "aoljtest.jsp". The
AOL/J Setup Test Suite is installed for all 11i web and forms servers in the
$COMMON_TOP/html/jsp/fnd directory.

Multiple vulnerabilities exist in the AOL/J Setup Test Suite allowing an
attacker to obtain valuable information on the configuration of Oracle
Applications without any database or application authentication. This
information includes the GUEST user password and application server security
key.

Solution:

Oracle has released a patch for the Oracle E-Business Suite 11i to correct
this vulnerability. Oracle has corrected multiple vulnerabilities in the
AOL/J Setup Test Suite JSPs.

The following Oracle patch must be applied --

Version Patch
------- -----
11i 2939083 (11.5.1 - 11.5.8)

Oracle Applications customers should consider this vulnerability low risk
and apply the above patch during the next normal maintenance cycle.
Customers with Internet facing application servers should apply the patch
immediately or consider removing or restricting access to the AOL/J Setup
Test Suite. In addition, the GUEST user account should be checked to ensure
that it has only publicly accessible responsibilities assigned to it.

Appropriate testing and backups should be performed before applying any
patches.

Additional Information:

http://www.integrigy.com/resources.htm
http://otn.oracle.com/deploy/security/pdf/2003alert55.pdf

For more information or questions regarding this security alert, please
contact us at alerts@integrigy.com.

Credit:

This vulnerability was discovered by Stephen Kost of Integrigy Corporation.
______________________________________________________________________

About Integrigy Corporation (www.integrigy.com)

Integrigy Corporation is a leader in application security for large
enterprise, mission critical applications. Our application vulnerability
assessment tool, AppSentry, assists companies in securing their largest and
most important applications. Integrigy Consulting offers security assessment
services for leading ERP and CRM applications.

For more information, visit www.integrigy.com.



Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    69 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close