My Oracle Support Banner

OpenSSO: DistAuth Application did not Filter the CR and LF Characters from the "goto" Parameter (Doc ID 1337800.1)

Last updated on SEPTEMBER 21, 2016

Applies to:

Oracle OpenSSO - Version: 8.0 to 8.0.2 - Release: 8.0 to 8.0
Information in this document applies to any platform.

Symptoms

The DistAuth application does not filter the CR (%0D) and LF (%0A) characters from the "goto" parameter which can cause a possible HTTP injection attack to happen. Even if you have configured the valid goto URL domains, the DistAuth application will still able to redirect to the URL stated in the goto URL. So the goto URL can be abused to take the user to an impostor site after login.
http://example.com:8080/openssoDistAuth/?goto=http://myhackersite.com/%0D%0A%0D%0A%0D%0AHello<script>alert(1)</script>



Cause

To view full details, sign in with your My Oracle Support account.

Don't have a My Oracle Support account? Click to get started!


In this Document
  Symptoms
  Cause
  Solution
  References

My Oracle Support provides customers with access to over a million knowledge articles and a vibrant support community of peers and Oracle experts.