Vulnerability Note VU#168873

Oracle E-Business Suite Report Review Agent (RRA) allows arbitrary files to be retrieved with no authentication

Original Release date: 14 Apr 2003 | Last revised: 14 Apr 2003

Overview

A vulnerability in Oracle's E-Business Suite Report Review Agent (RRA) allows arbitrary files to be retrieved with no authentication.

Description

A vulnerability exists in the Oracle E-Business Suite Report Review Agent (RRA). This vulnerability may allow a remote attacker to retrieve arbitrary information from Oracle Applications Concurrent Manager servers prior to authentication. For more information, please see the following documents:

Impact

A remote attacker may be able to retrieve arbitrary information from Oracle Applications Concurrent Manager servers prior to authentication.

Solution

Apply a vendor supplied patch.

Mitigation

Monitor and/or restrict access to the Concurrent Manager server(s). It may be possible to use TCP Wrappers or similar technology to provide improved access control and logging. Additionally, an application-level firewall and Intrusion Detection System (IDS) may be able to filter requests. Note that these workarounds are designed to limit access and detect exploit attempts. These workarounds do not prevent exploitation of this vulnerability. For more information about which ports to filter, please see the Integrity Security Alert.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
Oracle CorporationAffected-14 Apr 2003
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A

References

Credit

This vulnerability was discovered by Stephen Kost of Integrigy Corporation.

This document was written by Ian A Finlay.

Other Information

  • CVE IDs: Unknown
  • Date Public: 10 Apr 2003
  • Date First Published: 14 Apr 2003
  • Date Last Updated: 14 Apr 2003
  • Severity Metric: 9.38
  • Document Revision: 14

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.