{"vuid":"VU#698467","idnumber":"698467","name":"Oracle 9iAS default configuration allows access to \"globals.jsa\" file","keywords":["Oracle 9iAS","insecure permissions","globals.jsa","world-readable","configuration information"],"overview":"Oracle Database Server version 9iAS allows remote users to view the \"globals.jsa\" file used by Java Server Page (JSP) scripts. The \"globals.jsa\" file may contain Oracle usernames, passwords, and other configuration information not intended for public viewing, and attackers may use that information to mount attacks.","clean_desc":"On a Oracle Database Server, JSP scripts may use a \"globals.jsa\" file to define global application variables and store data. In the default configuration of Oracle 9iAS (and possibly other versions), the \"globals.jsa\" file is stored in the \"htdocs\" directory without access restrictions. Thus the file is publicly readable by any Web client user.","impact":"Attackers may view a \"globals.jsa\" file and use the information therein (which may include Oracle usernames and passwords) to mount attacks.","resolution":"The CERT/CC is currently unaware of a practical solution to this problem.","workarounds":"Add the following lines to the httpd.conf file found in the $ORACLE_HOME$/apache/apache/conf directory. <Files ~ \"^\\globals.jsa\"> Order allow,deny\n    Deny from all\n</Files>","sysaffected":"","thanks":"Thanks to David Litchfield for reporting this vulnerability.","author":"This document was written by Shawn Van Ittersum.","public":["http://www.oracle.com/","http://www.nextgenss.com/advisories/orajsp.txt","http://otn.oracle.com/deploy/security/alerts.htm"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2002-02-06T17:49:33Z","publicdate":"2002-02-06T00:00:00Z","datefirstpublished":"2002-02-27T00:14:05Z","dateupdated":"2002-02-27T15:05:31Z","revision":12,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"10","cam_population":"15","cam_impact":"4","cam_easeofexploitation":"20","cam_attackeraccessrequired":"20","cam_scorecurrent":"11.25","cam_scorecurrentwidelyknown":"13.5","cam_scorecurrentwidelyknownexploited":"22.5","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":11.25,"vulnote":null}