PT-2013-49: Null Byte Injection in Oracle Containers for J2EE
Oracle Containers for J2EE
Version: 10.1.3.5 and earlier
Severity level: Medium
Impact: Information Disclosure
Access Vector: Remote
Base Score: 5.0
Oracle Containers for J2EE (OC4J) is the core J2EE runtime component of Oracle Application Server.
The specialists of the Positive Research center have detected a Null Byte Injection vulnerability in Oracle Containers for J2EE.
Oracle Containers for J2EE does not properly handle a null byte in the path when transferring a request to another static page or a JSP script via pageContext.forward or jsp:forward functions. This vulnerability allows an attacker to break the script processing logic in global servlets (e.g., an attacker can generate a request for processing a JSP script as SHTML and thus gain access to the script’s source code).
Script processing logic failure combined with Directory Traversal when running on Windows may result in arbitrary command execution while calling a file containing an SHTML code (e.g., image or malicious log file uploaded by an attacker) as SHTML script.
How to fix
Update your sofware up to the latest version
16.08.2013 - Vendor gets vulnerability details
15.04.2014 - Vendor releases fixed version and details
25.04.2014 - Public disclosure
The vulnerability was detected by Sergey Bobrov and Andrey Medov, Positive Research Center (Positive Technologies Company)
Reports on the vulnerabilities previously discovered by Positive Research: