lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <52EB70D4.6060502@security-explorations.com>
Date: Fri, 31 Jan 2014 10:45:56 +0100
From: Security Explorations <contact@...urity-explorations.com>
To: bugtraq@...urityfocus.com, full-disclosure@...ts.grok.org.uk
Subject: [SE-2013-01] Security vulnerabilities in Oracle
	Java Cloud Service


Hello All,

Those concerned about security of Java PaaS (Platform as a Service)
or cloud services in general might find the following information
interesting.

Security Explorations discovered multiple security vulnerabilities
in the environment of Oracle [1] Java Cloud Service [2].

Among a total of 28 issues found, there are 16 weaknesses that make
it possible to completely break Java security sandbox of a target
WebLogic server environment. An attacker can further leverage this
to gain access to application deployments of other users of Oracle
Java Cloud service in the same regional data center.

The nature of the weaknesses identified in Oracle's service indicates
that it was not a subject of a thorough security review and penetration
testing prior to the public offering. They illustrate known and widely
discussed security risks related to Java [3]. They also expose weak
understanding of Java security model and attack techniques by Oracle
engineers.

More information regarding our research can be found at the official
pages of SE-2013-01 project:

http://www.security-explorations.com/en/SE-2013-01.html

We hope the next time Larry Ellison is about to choose between boats
and work [4], work is gonna win as obviously certain areas at Oracle
need actual work, not the improvisation.

Thank you.

Best Regards,
Adam Gowdiak

---------------------------------------------
Security Explorations
http://www.security-explorations.com
"We bring security research to the new level"
---------------------------------------------

References:
[1] Oracle Corporation
     http://www.oracle.com
[2] Oracle Java Cloud Service
     https://cloud.oracle.com/mycloud/f?p=service:java:0
[3] SE-2012-01 Project, Security Vulnerabilities in Java SE
     http://www.security-explorations.com/en/SE-2012-01.html
[4] Ellison ditches own cloud keynote for billionaires' America's Cup 
boat race
     http://www.theregister.co.uk/2013/09/24/oracle_openworld_walkout/

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ