Close Menu
    Latest Post

    Goldring GR3 Turntable Review: Style, Convenience, and an Integrated Phono Stage

    January 11, 2026

    Grok Is Generating Sexual Content Far More Graphic Than What’s on X

    January 11, 2026

    Engineering’s AI Reality Check: Proving Impact Beyond Activity

    January 11, 2026
    Facebook X (Twitter) Instagram
    Trending
    • Goldring GR3 Turntable Review: Style, Convenience, and an Integrated Phono Stage
    • Grok Is Generating Sexual Content Far More Graphic Than What’s on X
    • Engineering’s AI Reality Check: Proving Impact Beyond Activity
    • Owning AI: Mozilla’s Strategy for an Open-Source Future
    • The KDnuggets Gradio Crash Course
    • Unauthenticated Blind SSRF in Oracle EBS
    • Did a clean Windows install? Do these 6 things before anything else
    • A Thousand Blows Season 2 Review: A Grittier Return to Victorian London on Disney+
    Facebook X (Twitter) Instagram Pinterest Vimeo
    NodeTodayNodeToday
    • Home
    • AI
    • Dev
    • Guides
    • Products
    • Security
    • Startups
    • Tech
    • Tools
    NodeTodayNodeToday
    Home»Dev»Unauthenticated Blind SSRF in Oracle EBS
    Dev

    Unauthenticated Blind SSRF in Oracle EBS

    Samuel AlejandroBy Samuel AlejandroJanuary 10, 2026No Comments3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    src 1yfjha9 featured
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Cover image for Unauthenticated Blind SSRF in Oracle EBS

    When evaluating third-party off-the-shelf applications, security assessments often aim to provide clients with assurance regarding the vendor’s testing rigor and the application’s deployment.

    An unauthenticated blind Server-Side Request Forgery (SSRF) vulnerability was identified during an assessment of Oracle’s off-the-shelf software. Given the widespread use of Oracle products, it is likely that this software has undergone extensive testing by numerous organizations over time. This particular SSRF is considered low-risk, as its primary capability is limited to enumerating open ports on both internal and external hosts. However, the details of its discovery may still be valuable to security professionals.

    The Exploit

    This exploit was discovered while fuzzing an endpoint that had been previously associated with an XXE vulnerability. It is a common practice to re-test patched endpoints, as developers may inadvertently introduce new issues when hastily addressing security flaws.

    During the fuzzing process, a basic DOCTYPE declaration was inserted. Using a collaborator tool, it was observed that the system attempted to resolve the DNS of the provided URL, indicating a potential vulnerability. The collaborator tool used can be found here.

    The resulting request, after removing redundant headers and parameters and redacting target specifics, resembled the following:

    POST /OA_HTML/lcmServiceController.jsp HTTP/1.1
    Host: victim.com
    Content-Length: 56
    
    <!DOCTYPE root PUBLIC "-//B/A/EN" "http://**burpcollaboratorpayload:80**">
    

    The initial request timed out. However, a DNS hit was recorded in the Burp issue log, suggesting that an interaction occurred, but a firewall likely interfered with the full request.

    Subsequent attempts using TCP/443 (HTTPS) yielded similar results. To further investigate, a colleague assisted by monitoring for requests across a wide range of ports on an external IP address, which allowed for the enumeration of the specific port number (e.g., ’80’ as seen in the example request).

    This process revealed three distinct types of responses:

    • Timeout: This indicated that a firewall likely dropped the request.
    • HTTP 200 response with “A remote host refused an attempted connect operation.”: This suggested that the request reached the target host and port, but the port was not open.
    • HTTP 200 response with “Unexpected text in DTD.”: This confirmed that the request successfully reached an open host and port.

    Example Response (in this case indicating SSH is open on localhost)

    Leveraging this information, it became possible to enumerate open hosts and ports, both internal and external, by observing the nature of the returned responses.

    Furthermore, by utilizing the file:// protocol, the existence of local files could be enumerated. Attempts were made to employ other protocols and methods, hoping to capture sensitive data like hashes, but these efforts were unsuccessful in this particular scenario.

    Disclosure Timeline

    • April 2018: The vulnerability was discovered and reported to Oracle.
    • August 2018: Oracle confirmed the issue and implemented a fix in their main codebase.
    • October 2018: An Oracle Critical Patch Update was released, which included the fix for this vulnerability.
    • February 2019: A blog post detailing the vulnerability was published.
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleDid a clean Windows install? Do these 6 things before anything else
    Next Article The KDnuggets Gradio Crash Course
    Samuel Alejandro

    Related Posts

    Dev

    Six Key Components of UX Strategy

    January 10, 2026
    Dev

    Key CSS Developments: Conditional View Transitions, Text Effects, and Community Insights

    January 9, 2026
    Dev

    Older Tech In The Browser Stack

    January 8, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Latest Post

    ChatGPT Mobile App Surpasses $3 Billion in Consumer Spending

    December 21, 202512 Views

    Automate Your iPhone’s Always-On Display for Better Battery Life and Privacy

    December 21, 202510 Views

    Creator Tayla Cannon Lands $1.1M Investment for Rebuildr PT Software

    December 21, 20259 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    About

    Welcome to NodeToday, your trusted source for the latest updates in Technology, Artificial Intelligence, and Innovation. We are dedicated to delivering accurate, timely, and insightful content that helps readers stay ahead in a fast-evolving digital world.

    At NodeToday, we cover everything from AI breakthroughs and emerging technologies to product launches, software tools, developer news, and practical guides. Our goal is to simplify complex topics and present them in a clear, engaging, and easy-to-understand way for tech enthusiasts, professionals, and beginners alike.

    Latest Post

    Goldring GR3 Turntable Review: Style, Convenience, and an Integrated Phono Stage

    January 11, 20260 Views

    Grok Is Generating Sexual Content Far More Graphic Than What’s on X

    January 11, 20260 Views

    Engineering’s AI Reality Check: Proving Impact Beyond Activity

    January 11, 20260 Views
    Recent Posts
    • Goldring GR3 Turntable Review: Style, Convenience, and an Integrated Phono Stage
    • Grok Is Generating Sexual Content Far More Graphic Than What’s on X
    • Engineering’s AI Reality Check: Proving Impact Beyond Activity
    • Owning AI: Mozilla’s Strategy for an Open-Source Future
    • The KDnuggets Gradio Crash Course
    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions
    • Disclaimer
    • Cookie Policy
    © 2026 NodeToday.

    Type above and press Enter to search. Press Esc to cancel.