Oracle Apache+WebDB Documented Backdoor Vulnerability

BID:2171

Info

Oracle Apache+WebDB Documented Backdoor Vulnerability

Bugtraq ID: 2171
Class: Access Validation Error
CVE:
Remote: Yes
Local: No
Published: Dec 19 2000 12:00AM
Updated: Dec 19 2000 12:00AM
Credit: This vulnerability was first announced by Michal Zalewski <[email protected]> on December 19, 2000.
Vulnerable: Oracle Internet Application Server 3.0.7
- Debian Linux 2.2
- Redhat Linux 7.0
- Redhat Linux 6.2 i386
- Sun Solaris 2.5.1
- Sun Solaris 8_sparc
- Sun Solaris 7.0
- Sun Solaris 2.6
- SuSE Linux 7.0
- SuSE Linux 6.4
Not Vulnerable:

Discussion

Oracle Apache+WebDB Documented Backdoor Vulnerability

Oracle Internet Application Server is an integrated database and web package distributed by Oracle Corporation. A problem in the software may allow remote users unauthorized access to critical resources.

The problem occurs in the combination of Apache and WebDB software, a common implementation. The software requires a password to access the /WebDB directory on most implementations. However, a documented backdoor in the Oracle Internet Application Server allows remote users access to the /WebDB/admin_/ directory without access control. This makes it possible for a user with malicious intent to change passwords, alter web content, and change table names.

Exploit / POC

Oracle Apache+WebDB Documented Backdoor Vulnerability

Currently the SecurityFocus staff are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected].

Solution / Fix

Oracle Apache+WebDB Documented Backdoor Vulnerability

Solution:
This temporary fix was supplied by <[email protected]> :

Quick fix for the open /WebDB/admin_/gateway.htm file is to uncomment and supply real user account names to the administrators line in the [WVGATEWAY] section of wdbsvr.app.

© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

Free CVE JSON API cve.report/api

CVE.report and Source URL Uptime Status status.cve.report