Visit our newest sister site!
Hundreds of free aircraft flight manuals
Civilian • Historical • Military • Declassified • FREE!


TUCoPS :: Web :: Servers :: oracle13.htm

Oracle Web Listener 4.0.x on Windows NT bad default settings



Vulnerability

    Oracle

Affected

    Oracle Web Listener 4.0.x on Windows NT

Description

    Following  is  based  on  Cerberus  Information  Security Advisory
    (CISADV000315).   The  Cerberus  Security  Team  has  discovered a
    number of issues  with Oracle's Web  Listener, part of  the Oracle
    Application  Server,  that  can  allow  a  remote  attacker to run
    arbitrary commands on the web server

    Part of the  problem is caused  by default settings  after OAS has
    been installed.  The "ows-bin" virtual directory on an Oracle  Web
    Listener is the equivalent of  the "cgi-bin" on other web  servers
    and  by  default  this  is  set  to  C:\orant\ows\4.0\bin  -  this
    directory not  only contains  a number  of batch  files, DLLs  and
    executables  but  also  the  binary  image  file  for the Listener
    itself.   Even if  this default  setting has  been changed however
    you  may  still  be  at  risk  if  you have batch files in the new
    "ows-bin" directory.

    The Oracle Web  Listener will execute  batch files as  CGI scripts
    and by making a request to a batch file that requires one or  more
    arguments  it  is  possible  to  execute  any command the attacker
    wants  by  building  a  special  query  string.   For  example the
    following will give a directory listing:

        http://charon/ows-bin/perlidlc.bat?&dir

    It is even possible to use UNC paths so the Listener will  connect
    to the remote machine over NBSession, download the executable  and
    then execute it.

    By default the  Web Listener process  runs in security  context of
    SYSTEM   so  any  commands  issued  by  an  attacker will run with
    SYSTEM privileges.

    Another problem is that the Listener will expand the "*" character
    so even if the attacker doesn't know the name of a real batch file
    in the "ows-bin" they can request *.bat?&command

    Some of the executables  in the default directory  allow attackers
    to  kill  services,  return  configuration  information  and cause
    other undesirable events to occur.

Solution

    Due to the severity of  this problem Cerberus recommends that  the
    following be actioned  immediately.  If  "ows-bin" is the  default
    then  using  the  Oracle  Application  Server  Manager  remove the
    ows-bin virtual directory or point it to a more benign  directory.
    If "ows-bin"  is not  the default  then verfiy  that there  are no
    batch files in this  directory.  A check  for this has been  added
    to Cerberus' security scanner, CIS available from their website.


TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2014 AOH