Visit our newest sister site!
Hundreds of free aircraft flight manuals
Civilian • Historical • Military • Declassified • FREE!

TUCoPS :: Web :: Servers :: oracle25.htm

Oracle8i Release 3 (8.1.7), Oracle Application Server 9iAS Release 1. possible breakout of web root



    Oracle8i Release 3 (8.1.7), Oracle Application Server 9iAS Release


    Following  is  based  on  a  Oracle  Security Alerts.  A potential
    vulnerability  in  Oracle  JVM  has  been  discovered.  The Oracle
    Servlet  Engine  in  the  Oracle  JVM  security  policy recommends
    granting file permissions in a very controlled manner.  When  this
    policy  is  disregarded  and  FilePermission  is  granted to <<ALL
    FILES>>  within   a  web   domain,  there   exists  a    potential
    vulnerability of viewing directories and static files outside  the
    web root with the help of .jsp and .sqljsp extensions.


        call dbms_java.grant_permission('SCOTT', '', '<<ALL FILES>>','read');

    Thus, it may  also be possible  to execute .jsp  files outside the
    web root.

    Likelihood of occurrence: in a Netscape browser, a URL  containing
    "the current hierarchy level"  (".") and/or "the level  above this
    hierarchy level" (".."),


    To  avoid  this  vulnerability,  grant  permission to the explicit
    document root file path only:

        call dbms_java.grant_permission('SCOTT', '', '(actually directory path)','read');

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2015 AOH