Korean
<< Back
VID 22170
Severity 30
Port 80, ...
Protocol TCP
Class WWW
Detailed Description The Oracle9iAS server allows anonymous user to access the SOAP configuration file.
The Oracle9iAS application server supports the SOAP(Simple Access Protocol), a simple and lightweight protocol for exchanging information between peers in a decentralized, distributed environment using XML, for Web administration of database services. In the default installation of Oracle9iAS, the server contains the important configuration file called "soapConfig.xml". This configuration file includes the detailed information, such as the location of SOAP provider, service manager, administrative URL, and the sensitive information, such as the database server host name, user's ID and password. If this file has the appropriate permissions set, an HTTP request to access the files returns a "403 Forbidden" response. But, the default configuration of Oracle9iAS allows the anonymous user to access this important file without authentication. As the result, a remote attacker can read it directly or using the XSQLServlet via a virtual directory as the following:

http://target_server/soapdocs/webapps/soap/WEB-INF/config/soapConfig.xml
http://target_server/servlet/oraccle.xml.xsql.XSQLServlet/soapdocs/webapps/soap/WEB-INF/config/soapConfig.xml

* Platforms Affected :
Oracle9i Application Server 1.0.2
Oracle8i Application Server 8.1.7.1
Oracle8i Application Server 8.1.7
Oracle9i Application Server 9.0
Oracle9i Application Server 9.0.1

* References:
http://online.securityfocus.com/bid/4290
http://www.iss.net/security_center/static/8453.php
Recommendation No solution available as of June 2014.

As the workaround, Set the appropriate permissions to the "soapConfig.xml" for blocking access to it.
Related URL CVE-2002-0568 (CVE)
Related URL (SecurityFocus)
Related URL (ISS)