CVE-2002-1630

HIGH7.5/ 10.0
Share:
Published: December 31, 2002 at 05:00 AM
Modified: April 3, 2025 at 01:03 AM
Source: cve@mitre.org

Vulnerability Description

The sendmail.jsp sample page in Oracle 9i Application Server (9iAS) allows remote attackers to send arbitrary emails.

CVSS Metrics

Base Score
7.5
Severity
HIGH
Vector String
AV:N/AC:L/Au:N/C:P/I:P/A:P

Weaknesses (CWE)

NVD-CWE-Other
Source: nvd@nist.gov

AI Security Analysis

01 // Technical Summary

Oracle 9i Application Server (9iAS) is vulnerable to a critical flaw allowing remote attackers to send arbitrary emails via the sendmail.jsp sample page. This vulnerability can be leveraged for phishing attacks, spam campaigns, and potentially credential harvesting, leading to significant reputational damage and data breaches.

02 // Vulnerability Mechanism

Step 1: Access the Vulnerable Page: The attacker accesses the sendmail.jsp page, typically located under a default installation directory of Oracle 9iAS.

Step 2: Craft the Malicious Payload: The attacker constructs a malicious email, including the desired sender, recipient, subject, and body. This crafted email may contain phishing links, malicious attachments, or other harmful content.

Step 3: Submit the Payload: The attacker submits the crafted email parameters through the sendmail.jsp page's input fields. The attacker might also inject malicious headers to bypass security measures.

Step 4: Email Delivery: The sendmail.jsp page, without proper sanitization, passes the attacker-controlled input directly to the underlying sendmail or mail command.

Step 5: Arbitrary Email Sending: The sendmail command executes, sending the attacker's crafted email to the specified recipient(s).

Step 6: Potential for Further Exploitation: Depending on the email content, the attacker may attempt to phish credentials, spread malware, or conduct other malicious activities.

03 // Deep Technical Analysis

The vulnerability stems from the sendmail.jsp page's lack of proper input validation and sanitization of user-supplied data, specifically the email parameters (e.g., recipient, sender, subject, body). The page likely directly calls a system command (e.g., sendmail or mail) to send the email, incorporating the user-provided input without sufficient filtering. This allows attackers to inject malicious content, including crafted email headers and bodies, to achieve their objectives. The root cause is a failure to implement input validation and output encoding, leading to command injection.

CVE-2002-1630 - HIGH Severity (7.5) | Free CVE Database | 4nuxd