Vulnerability Note VU#736923
Oracle 9iAS SOAP components allow anonymous users to deploy applications by default
Oracle Application Server 9iAS installs with Simple Object Access Protocol (SOAP) enabled by default and allows unauthenticated remote users to deploy and undeploy SOAP services and providers.
Oracle Application Server 9iAS supports Simple Object Access Protocol (SOAP), an XML-based protocol used by Oracle for Web administration of database services. Version 126.96.36.199.1 of Oracle 9iAS installs with SOAP components enabled by default. The typical installation of this Oracle product also includes SOAP tools that allow remote Web users to deploy and undeploy SOAP services and providers on the server, without authentication and without notice to the Oracle system adminstrator.
An attacker can control aspects of the Oracle system in ways not intended by its administrators. The attacker may be able to obtain or modify data or perform other actions that are not authorized.
The CERT/CC is currently unaware of a practical solution to this problem.
The following workarounds were suggested by David Litchfield and have not been tested by CERT/CC.
To disable SOAP, delete or comment-out the following lines in the file named "$ORACLE_HOME/Apache/Jserv/etc/jserv.conf":
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Oracle||Affected||08 Feb 2002||26 Feb 2002|
CVSS Metrics (Learn More)
Thanks to David Litchfield for reporting this vulnerability.
This document was written by Shawn Van Ittersum.
- CVE IDs: Unknown
- Date Public: 10 Jan 2002
- Date First Published: 12 Mar 2002
- Date Last Updated: 12 Mar 2002
- Severity Metric: 14.06
- Document Revision: 12
If you have feedback, comments, or additional information about this vulnerability, please send us email.