⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 oracle9i_soaprouter.nasl

📁 漏洞扫描源码,可以扫描linux,windows,交换机路由器
💻 NASL
字号:
## This script was written by Javier Fernandez-Sanguino <jfs@computer.org># # This software is distributed under the GPL license, please# read the license at http://www.gnu.org/licenses/licenses.html#TOCGPL## References:# http://otn.oracle.com/deploy/security/pdf/ias_soap_alert.pdf## Also relevant:# VU#476619# CERT's CA-2002-08#if(description){ script_id(11227); script_bugtraq_id(4289); script_version("$Revision: 38 $"); script_cve_id("CVE-2001-1371"); name["english"] = "Oracle 9iAS SOAP Default Configuration Vulnerability "; script_name(english:name["english"]);  desc["english"] = "In a default installation of Oracle 9iAS v.1.0.2.2, it is possible todeploy or undeploy SOAP services without the need of any kind of credentials.This is due to SOAP being enabled by default after installation in order to provide a convenient way to use SOAP samples. However, this feature poses a threat to HTTP servers with public access since remote attackers can createsoap services and then invoke them remotely. Since SOAP services cancontain arbitrary Java code in Oracle 9iAS this means that an attackercan execute arbitray code in the remote server.Solution: Disable SOAP or the deploy/undeploy feature by editing$ORACLE_HOME/Apache/Jserver/etc/jserv.conf and removing/commentingthe following four lines:ApJServGroup group2 1 1 $ORACLE_HOME/Apache/Jserv/etc/jservSoap.propertiesApJServMount /soap/servlet ajpv12://localhost:8200/soapApJServMount /dms2 ajpv12://localhost:8200/soapApJServGroupMount /soap/servlet balance://group2/soapNote that the port number might be different from  8200.Also, you will need to change in the file $ORACLE_HOME/soap/werbapps/soap/WEB-INF/config/soapConfig.xml:<osc:option name='autoDeploy' value='true' />to<osc:option name='autoDeploy' value='false' />More information:http://otn.oracle.com/deploy/security/pdf/ias_soap_alert.pdfhttp://www.cert.org/advisories/CA-2002-08.htmlhttp://www.kb.cert.org/vuls/id/476619Also read:Hackproofing Oracle Application Server from NGSSoftware:available at http://www.nextgenss.com/papers/hpoas.pdf Risk factor : High"; script_description(english:desc["english"]);  summary["english"] = "Tests for Oracle9iAS default SOAP installation";  script_summary(english:summary["english"]);  script_category(ACT_GATHER_INFO);  script_copyright(english:"This script is Copyright (C) 2003 Javier Fernandez-Sanguino"); family["english"] = "CGI abuses"; family["francais"] = "Abus de CGI"; script_family(english:family["english"], francais:family["francais"]); script_dependencie("find_service.nes", "http_version.nasl"); script_require_ports("Services/www", 80); script_require_keys("www/OracleApache"); exit(0);}# Check starts hereinclude("http_func.inc");port = get_http_port(default:80);if(get_port_state(port)){ # Make a request for /soap/servlet/soaprouter req = http_get(item:"/soap/servlet/soaprouter", port:port); soc = http_open_socket(port); if(soc) { send(socket:soc, data:req); r = http_recv(socket:soc); http_close_socket(soc); if("SOAP Server" >< r)	 	security_hole(port); }}

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -