|
Vulnerability Oracle Affected Oracle Web Listener 4.0.x on Windows NT Description Following is based on Cerberus Information Security Advisory (CISADV000315). The Cerberus Security Team has discovered a number of issues with Oracle's Web Listener, part of the Oracle Application Server, that can allow a remote attacker to run arbitrary commands on the web server Part of the problem is caused by default settings after OAS has been installed. The "ows-bin" virtual directory on an Oracle Web Listener is the equivalent of the "cgi-bin" on other web servers and by default this is set to C:\orant\ows\4.0\bin - this directory not only contains a number of batch files, DLLs and executables but also the binary image file for the Listener itself. Even if this default setting has been changed however you may still be at risk if you have batch files in the new "ows-bin" directory. The Oracle Web Listener will execute batch files as CGI scripts and by making a request to a batch file that requires one or more arguments it is possible to execute any command the attacker wants by building a special query string. For example the following will give a directory listing: http://charon/ows-bin/perlidlc.bat?&dir It is even possible to use UNC paths so the Listener will connect to the remote machine over NBSession, download the executable and then execute it. By default the Web Listener process runs in security context of SYSTEM so any commands issued by an attacker will run with SYSTEM privileges. Another problem is that the Listener will expand the "*" character so even if the attacker doesn't know the name of a real batch file in the "ows-bin" they can request *.bat?&command Some of the executables in the default directory allow attackers to kill services, return configuration information and cause other undesirable events to occur. Solution Due to the severity of this problem Cerberus recommends that the following be actioned immediately. If "ows-bin" is the default then using the Oracle Application Server Manager remove the ows-bin virtual directory or point it to a more benign directory. If "ows-bin" is not the default then verfiy that there are no batch files in this directory. A check for this has been added to Cerberus' security scanner, CIS available from their website.