First published: Tue Mar 30 2004(Updated: )
The p_submit_url value in the sample login form in the Oracle 9i Application Server (9iAS) Single Sign-on Administrators Guide, Release 2(9.0.2) for Oracle SSO allows remote attackers to spoof the login page, which could allow users to inadvertently reveal their username and password.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Java System Application Server | =1.0.2 | |
Oracle Java System Application Server | =1.0.2.1s | |
Oracle Java System Application Server | =1.0.2.2 | |
Oracle Java System Application Server | =1.0.2.2.2 | |
Oracle Java System Application Server | =9.0.2 | |
Oracle Java System Application Server | =9.0.2.0.0 | |
Oracle Java System Application Server | =9.0.2.0.1 | |
Oracle Java System Application Server | =9.0.2.1 | |
Oracle Java System Application Server | =9.0.2.2 | |
Oracle Java System Application Server | =9.0.2.3 | |
Oracle Java System Application Server | =9.0.3 | |
Oracle Java System Application Server | =9.0.3.1 | |
Oracle HTTP Server | =8.1.7 | |
Oracle HTTP Server | =9.0.1 | |
Oracle HTTP Server | =9.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-1877 is classified as a medium severity vulnerability due to its potential for user credential exposure.
To fix CVE-2004-1877, apply the latest patches provided by Oracle for the affected versions of Oracle 9i Application Server.
CVE-2004-1877 can be exploited through a spoofing attack targeting the login page, leading to credential theft.
CVE-2004-1877 affects various versions of Oracle Java System Application Server, including 1.0.2, 9.0.2, and others listed in the vulnerability details.
Yes, user education about recognizing phishing attempts and verifying URL authenticity can help mitigate the risks associated with CVE-2004-1877.