Short Name |
APP:ORACLE:OHS-PROXY-BYPASS |
---|---|
Severity |
Minor |
Recommended |
No |
Recommended Action |
Drop |
Category |
APP |
Keywords |
Oracle HTTP Server Proxy Bypass |
Release Date |
2005/05/04 |
Update Number |
1213 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+ |
This signature detects attempts to exploit a known vulnerability in the way Oracle HTTP Server (OHS) applies access control policy to local resources. All remote HTTP requests proxied by the Oracle Web Cache can bypass the OHS access restriction. Attackers can remotely obtain protected contents.
Oracle HTTP Server(OHS) of Oracle Application Server is prone to an access restriction bypass vulnerability. It is possible to configure a list of forbidden URIs in OHS. This is accomplished using 'mod_access'. A URI that is listed is not supposed to be accessible to certain clients, depending on the configuration. However, reports indicate that the Oracle Webcache client may be used to access URIs regardless of the restrictions outlined in OHS 'mod_access'.