Short Name |
HTTP:PKG:TUXEDO-DOS |
---|---|
Severity |
Minor |
Recommended |
No |
Category |
HTTP |
Keywords |
Tuxedo INIFILE Parameter Denial of Service |
Release Date |
2003/11/12 |
Update Number |
1213 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+ |
This signature detects attempts to exploit a known vulnerability against BEA Tuxedo Administration Console 8.1 and earlier. Attackers can send a maliciously crafted request containing an INIFILE parameter that includes a device name to cause the application to stop responding. Intervention is required to restore access.
A vulnerability has reported to exist in BEA Tuxedo and WebLogic Enterprise due to Tuxedo administration console. The script is reported to accept various initialization arguments such as INIFILE that are not properly sanitized for user-supplied input. This issue may allow an attacker to carry out attacks such as denial of service, file disclosure, and cross-site scripting. An attacker may be able to determine the existence of a file outside the web server root by supplying passing various path values for INIFILE. A denial of service condition could be caused in the software by providing a device name such as CON, AUX, COM1, COM2 instead of a valid file name as one of the arguments for INIFILE. This may cause the service to crash or hang. A cross-site scripting vulnerability has also been reported to exist in the software due to insufficient santization of user-supplied input to INIFILE. This problem presents itself when an invalid file name is supplied as an argument for INIFILE. This vulnerability could be exploited to steal cookie-based credentials. Other attacks are possible as well.