Oracle Access Manager (formerly known as Oblix NetPoint and
Oracle COREid) provides a full range of identity administration and
security functions, that include Web single sign-on; user self-service
and self-registration; sophisticated workflow functionality; auditing
and access reporting; policy management; dynamic group management; and
delegated administration.
The main file of OAM is “obrareq.cgi”.
However,
I found “obrareq.cgi” doesn’t authenticate its paramters properly. So
attackers can do Attacks such as Dos and Information Disclosure
When
a user clicks the URLs above before login, the “Login” page appears.
The user needs to enter his/her username and password. When this is
done, the user could be redirected to a webpage controlled by an
attacker or to any file in Oracle.
My tests were performed on Firefox (26.0) in Ubuntu (12.04) and IE (9.0.15) in Windows 7.
The vulnerabilities fixed by Oracle in the following update:
http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html
http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html
CVE Details:
CVE-2014-2404: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-2404
CVE-2014-2452: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-2452
CVE-2014-2404: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-2404
CVE-2014-2452: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-2452
More Details: http://www.tetraph.com/blog/2014/06/oracle-access-manager-oam-vulnerabilities/
Posted by:WANG Jing (王晶). a PhD student in mathematics from Nanyang Technological University. He obtained his bachelor's degree in mathematics at University of Science and Technology of China.
http://www.tetraph.com/wangjing/
http://www.tetraph.com/wangjing/chinese.html
http://user.qzone.qq.com/137372921
No comments:
Post a Comment