Close Menu
    Latest Post

    Verifying 5G Standalone Activation on Your iPhone

    March 1, 2026

    Hands on: the Galaxy S26 and S26 Plus are more of the same for more money

    March 1, 2026

    IronCurtain: A Secure AI Agent Designed to Prevent Rogue Actions

    March 1, 2026
    Facebook X (Twitter) Instagram
    Trending
    • Verifying 5G Standalone Activation on Your iPhone
    • Hands on: the Galaxy S26 and S26 Plus are more of the same for more money
    • IronCurtain: A Secure AI Agent Designed to Prevent Rogue Actions
    • Kwasi Asare’s Entrepreneurial Journey: Risk, Reputation, and Resilience
    • The Rubin Observatory’s alert system sent 800,000 pings on its first night
    • GitHub Actions Now Supports Unzipped Artifact Uploads and Downloads
    • Project Genie: Experimenting with Infinite, Interactive Worlds
    • Text Generation Using Diffusion Models and ROI with LLMs
    Facebook X (Twitter) Instagram Pinterest Vimeo
    NodeTodayNodeToday
    • Home
    • AI
    • Dev
    • Guides
    • Products
    • Security
    • Startups
    • Tech
    • Tools
    NodeTodayNodeToday
    Home»Dev»Unauthenticated Blind SSRF in Oracle EBS
    Dev

    Unauthenticated Blind SSRF in Oracle EBS

    Samuel AlejandroBy Samuel AlejandroJanuary 10, 2026No Comments3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    src 1yfjha9 featured
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Cover image for Unauthenticated Blind SSRF in Oracle EBS

    When evaluating third-party off-the-shelf applications, security assessments often aim to provide clients with assurance regarding the vendor’s testing rigor and the application’s deployment.

    An unauthenticated blind Server-Side Request Forgery (SSRF) vulnerability was identified during an assessment of Oracle’s off-the-shelf software. Given the widespread use of Oracle products, it is likely that this software has undergone extensive testing by numerous organizations over time. This particular SSRF is considered low-risk, as its primary capability is limited to enumerating open ports on both internal and external hosts. However, the details of its discovery may still be valuable to security professionals.

    The Exploit

    This exploit was discovered while fuzzing an endpoint that had been previously associated with an XXE vulnerability. It is a common practice to re-test patched endpoints, as developers may inadvertently introduce new issues when hastily addressing security flaws.

    During the fuzzing process, a basic DOCTYPE declaration was inserted. Using a collaborator tool, it was observed that the system attempted to resolve the DNS of the provided URL, indicating a potential vulnerability. The collaborator tool used can be found here.

    The resulting request, after removing redundant headers and parameters and redacting target specifics, resembled the following:

    POST /OA_HTML/lcmServiceController.jsp HTTP/1.1
    Host: victim.com
    Content-Length: 56
    
    <!DOCTYPE root PUBLIC "-//B/A/EN" "http://**burpcollaboratorpayload:80**">
    

    The initial request timed out. However, a DNS hit was recorded in the Burp issue log, suggesting that an interaction occurred, but a firewall likely interfered with the full request.

    Subsequent attempts using TCP/443 (HTTPS) yielded similar results. To further investigate, a colleague assisted by monitoring for requests across a wide range of ports on an external IP address, which allowed for the enumeration of the specific port number (e.g., ’80’ as seen in the example request).

    This process revealed three distinct types of responses:

    • Timeout: This indicated that a firewall likely dropped the request.
    • HTTP 200 response with “A remote host refused an attempted connect operation.”: This suggested that the request reached the target host and port, but the port was not open.
    • HTTP 200 response with “Unexpected text in DTD.”: This confirmed that the request successfully reached an open host and port.

    Example Response (in this case indicating SSH is open on localhost)

    Leveraging this information, it became possible to enumerate open hosts and ports, both internal and external, by observing the nature of the returned responses.

    Furthermore, by utilizing the file:// protocol, the existence of local files could be enumerated. Attempts were made to employ other protocols and methods, hoping to capture sensitive data like hashes, but these efforts were unsuccessful in this particular scenario.

    Disclosure Timeline

    • April 2018: The vulnerability was discovered and reported to Oracle.
    • August 2018: Oracle confirmed the issue and implemented a fix in their main codebase.
    • October 2018: An Oracle Critical Patch Update was released, which included the fix for this vulnerability.
    • February 2019: A blog post detailing the vulnerability was published.
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleDid a clean Windows install? Do these 6 things before anything else
    Next Article The KDnuggets Gradio Crash Course
    Samuel Alejandro

    Related Posts

    Dev

    Text Generation Using Diffusion Models and ROI with LLMs

    March 1, 2026
    Dev

    RCCLX: Innovating GPU Communications on AMD Platforms

    February 28, 2026
    Dev

    RSC for LISP Developers

    February 26, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Latest Post

    ChatGPT Mobile App Surpasses $3 Billion in Consumer Spending

    December 21, 202517 Views

    Automate Your iPhone’s Always-On Display for Better Battery Life and Privacy

    December 21, 202515 Views

    Creator Tayla Cannon Lands $1.1M Investment for Rebuildr PT Software

    December 21, 202514 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    About

    Welcome to NodeToday, your trusted source for the latest updates in Technology, Artificial Intelligence, and Innovation. We are dedicated to delivering accurate, timely, and insightful content that helps readers stay ahead in a fast-evolving digital world.

    At NodeToday, we cover everything from AI breakthroughs and emerging technologies to product launches, software tools, developer news, and practical guides. Our goal is to simplify complex topics and present them in a clear, engaging, and easy-to-understand way for tech enthusiasts, professionals, and beginners alike.

    Latest Post

    Verifying 5G Standalone Activation on Your iPhone

    March 1, 20264 Views

    Hands on: the Galaxy S26 and S26 Plus are more of the same for more money

    March 1, 20265 Views

    IronCurtain: A Secure AI Agent Designed to Prevent Rogue Actions

    March 1, 20264 Views
    Recent Posts
    • Verifying 5G Standalone Activation on Your iPhone
    • Hands on: the Galaxy S26 and S26 Plus are more of the same for more money
    • IronCurtain: A Secure AI Agent Designed to Prevent Rogue Actions
    • Kwasi Asare’s Entrepreneurial Journey: Risk, Reputation, and Resilience
    • The Rubin Observatory’s alert system sent 800,000 pings on its first night
    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions
    • Disclaimer
    • Cookie Policy
    © 2026 NodeToday.

    Type above and press Enter to search. Press Esc to cancel.