File Disclosure using df_next_page parameter

SEC Consult Security Advisory 20051223-1


title: File Disclosure using df_next_page parameter

in OracleAS Discussion Forum Portlet

program: OracleAS Discussion Forum Portlet

vulnerable version: Version of May 2005

homepage: http://

found: 2005-09-16

by: Johannes Greil > SEC-CONSULT /



vendor description:


Oracle's business is information - how to manage it, use it, share it,

protect it. For nearly three decades, Oracle, the world's largest

enterprise software company, has provided the software and services

that let organizations get the most up-to-date and accurate information

from their business systems.




vulnerability overview:



It is possible to read arbitrary files of the system such as the

WEB-INF directory through the discussion forum portlet. An attacker

needs to know the file names.



proof of concept:



By requesting the forum URL and adding a null character "%00" to the

"df_next_page" parameter, it is possible to retrieve the source code of

the JSP files or other content on the server.



http: //$host/portal/page?_pageid=XXX,XXX&_dad=portal&_schema=PORTAL&



vulnerable versions:



Version of May 2005



vendor status:


vendor notified: 2005-09-26

vendor response: 2005-09-27

patch available: -


The first response from Oracle was on 27th September (assigning bug

numbers) with a more detailed answer on 28th September. They explicitly

said that the forum is sample code and shouldn't be used in a production

environment although it can be found in such installations.


The last email from Oracle was on 21st October saying that they will fix

it "hopefully within the next 4 weeks". Asking them for a status update

at the beginning of December and another email on 19th December didn't

trigger any responses hence this advisory is being released.






Only use the forum portlet in test installations and not in a production





< Johannes Greil > / /

SGT ::: < tke, mei, bmu, dfa > :::