Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

Oracle 9iAS SOAP configuration file retrieval

Information

Severity

Severity

Low

Family

Family

Web application abuses

CVSSv2 Base

CVSSv2 Base

2.1

CVSSv2 Vector

CVSSv2 Vector

AV:L/AC:L/Au:N/C:P/I:N/A:N

Solution Type

Solution Type

Mitigation

Created

Created

18 years ago

Modified

Modified

6 years ago

Summary

In a default installation of Oracle 9iAS v.1.0.2.2.1, it is possible to access some configuration files. These file includes detailed information on how the product was installed in the server including where the SOAP provider and service manager are located as well as administrative URLs to access them. They might also contain sensitive information (usernames and passwords for database access).

Solution

Solution

Modify the file permissions so that the web server process cannot retrieve it. Note however that if the XSQLServlet is present it might bypass filesystem restrictions.

Common Vulnerabilities and Exposures (CVE)