Oracle 9iAS Default SOAP Configuration Unauthorized Application Deployment

High Nessus Plugin ID 11227


Arbitrary code can be run on the remote host.


In a default installation of Oracle 9iAS v., it is possible to deploy or undeploy SOAP services without the need of any kind of credentials. This is due to SOAP being enabled by default after installation in order to provide a convenient way to use SOAP samples. However, this feature poses a threat to HTTP servers with public access since remote attackers can create soap services and then invoke them remotely. Since SOAP services can contain arbitrary Java code in Oracle 9iAS this means that an attacker can execute arbitrary code in the remote server.


Disable SOAP or the deploy/undeploy feature by editing $ORACLE_HOME/Apache/Jserver/etc/jserv.conf and removing/commenting the following four lines :

ApJServGroup group2 1 1 $ORACLE_HOME/Apache/Jserv/etc/ ApJServMount /soap/servlet ajpv12://localhost:8200/soap ApJServMount /dms2 ajpv12://localhost:8200/soap ApJServGroupMount /soap/servlet balance://group2/soap

Note that the port number might be different from 8200.
Also, you will need to change in the file $ORACLE_HOME/soap/werbapps/soap/WEB-INF/config/soapConfig.xml:
<osc:option name='autoDeploy' value='true' /> to <osc:option name='autoDeploy' value='false' />

See Also

Plugin Details

Severity: High

ID: 11227

File Name: oracle9i_soaprouter.nasl

Version: 1.19

Type: remote

Family: Databases

Published: 2003/02/11

Updated: 2018/08/22

Dependencies: 10107, 17975

Risk Information

Risk Factor: High

CVSS v2.0

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:oracle:application_server

Exploit Available: false

Exploit Ease: No exploit is required

Vulnerability Publication Date: 2001/11/30

Reference Information

CVE: CVE-2001-1371

BID: 4289

CERT-CC: CA-2002-08

CERT: 476619

CWE: 264