PT-2013-47: Directory Traversal in Oracle Containers for J2EE

Vulnerable software

Oracle Containers for J2EE
Version: 10.1.3.5 and earlier

Link:
http://www.oracle.com/technetwork/middleware/ias/downloads/utilsoft-090603.html

Severity level

Severity level: Medium
Impact: Directory Traversal
Access Vector: Remote

CVSS v2:
Base Score: 4.3
Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N)

CVE: CVE-2014-0426

Software description

Oracle Containers for J2EE (OC4J) is the core J2EE runtime component of Oracle Application Server.

Vulnerability description

The specialists of the Positive Research center have detected a Directory Traversal vulnerability in Oracle Containers for J2EE (when running on Windows).

Oracle Containers for J2EE does not properly handle a Request-URI sent by the client. An attacker can apply to an arbitrary script outside of the application directory (*.jsp, *.jspsql, *.jspx, *.cgi, *.shtml, *.php, *.pl) via directory traversal sequences when running on Windows.

How to fix

Update your sofware up to the latest version

Advisory status

16.08.2013 - Vendor gets vulnerability details
15.04.2014 - Vendor releases fixed version and details
25.04.2014 - Public disclosure

Credits

The vulnerability was detected by Sergey Bobrov, Positive Research Center (Positive Technologies Company)

References

http://en.securitylab.ru/lab/PT-2013-47

Reports on the vulnerabilities previously discovered by Positive Research:

http://www.ptsecurity.com/research/advisory/
http://en.securitylab.ru/lab/