CVE-2005-1383 : Detail

CVE-2005-1383

89.15%V3
Network
2005-05-02
02h00 +00:00
2017-07-10
12h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

The OHS component 1.0.2 through 10.x, when UseWebcacheIP is disabled, in Oracle Application Server allows remote attackers to bypass HTTP Server mod_access restrictions via a request to the webcache TCP port 7778.

CVE Informations

Metrics

Metrics Score Severity CVSS Vector Source
V2 7.5 AV:N/AC:L/Au:N/C:P/I:P/A:P [email protected]

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 25559

Publication date : 2005-04-27 22h00 +00:00
Author : Alexander Kornbrust
EDB Verified : Yes

source: https://www.securityfocus.com/bid/13418/info Oracle HTTP Server(OHS) of Oracle Application Server is prone to an access restriction bypass vulnerability. It is possible to configure a list of forbidden URIs in OHS. This is accomplished using 'mod_access'. A URI that is listed is not supposed to be accessible to certain clients, depending on the configuration. However, reports indicate that the Oracle Webcache client may be used to access URIs regardless of the restrictions outlined in OHS 'mod_access'. (Port 7778 = Webcache, Port 7779 = OHS) The following URLs are NOT protected if you access them via Webcache: http://example.com:7778/dmsoc4j/AggreSpy?format=metrictable&nountype=ohs_child&orderby=Name http://example.com:7778/server-status http://example.com:7778/dms0 The following URLs are protected: http://example.com:7779/dmsoc4j/AggreSpy?format=metrictable&nountype=ohs_child&orderby=Name http://example.com:7779/server-status http://example.com:7779/dms0

Products Mentioned

Configuraton 0

Oracle>>Application_server >> Version 10.1.0.2

Oracle>>Application_server >> Version 10.1.0.3

Oracle>>Application_server >> Version 10.1.0.3.1

Oracle>>Application_server >> Version 10.1.2

References

http://www.securityfocus.com/bid/13418
Tags : vdb-entry, x_refsource_BID
http://marc.info/?l=bugtraq&m=111472266123952&w=2
Tags : mailing-list, x_refsource_BUGTRAQ
http://www.osvdb.org/15908
Tags : vdb-entry, x_refsource_OSVDB
http://secunia.com/advisories/15143
Tags : third-party-advisory, x_refsource_SECUNIA