Oracle Application Server (OracleAS) Portal 10g allows remote attackers to bypass intended access restrictions and read the contents of /dav_portal/portal/ by sending a request containing a trailing "%0A" (encoded line feed), then using the session ID that is generated from that request. NOTE: as of 20080512, Oracle has not commented on the accuracy of this report.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
http://securityreason.com/securityalert/3867 | third party advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/42302 | vdb entry |
http://www.securityfocus.com/archive/1/491865/100/0/threaded | mailing list |
http://www.securitytracker.com/id?1020034 | vdb entry |
http://secunia.com/advisories/30140 | third party advisory |
http://www.securityfocus.com/bid/29119 | vdb entry exploit |