Skip to content

H3-2025-0045

Oracle EBS SQL Log Disclosure Vulnerability

Category SECURITY_MISCONFIGURATION
Base Score 6.5

Description

The Oracle EBS SQL Log Disclosure vulnerability occurs when an Oracle E-Business Suite (EBS) deployment inadvertently exposes its SQL log files to unauthorized parties. Through improper access control on critical log files stored in the OA_HTML/bin directory, sensitive details such as SQL query components, descriptions, user identifiers, and other processing information are made available. Attackers can exploit this condition by sending a simple GET request to a known endpoint, triggering a response containing raw log data. The logs typically include markers like 'DESCRIPTION=' and 'USER=', which reveal the context in which SQL queries are being constructed and executed. With this information, attackers gain valuable insight into the internal workings of the application, which might be used to further exploit the system or tailor subsequent injection attacks. Furthermore, the exposed log files may contain debugging information, configuration details, and error messages that can facilitate reconnaissance, leading to more targeted attacks. The vulnerability is compounded by the fact that the web server returns the content with a 'text/plain' content type and an HTTP 200 OK status, which signals to the attacker that the resource is accessible. Administrators who are unaware of this exposure risk accidentally providing a gateway for attackers to bypass intended security controls, thereby endangering confidential data and system integrity.

Impact

If exploited, attackers may access sensitive log data that reveals internal application processes, configuration settings, user details, and potentially exploitable error messages. This can lead to further attacks such as SQL injections, targeted exploits, and unauthorized modifications, ultimately compromising the overall security posture of the affected Oracle EBS system.

References