Skip to Main Content

APEX

Announcement

For appeals, questions and feedback about Oracle Forums, please email oracle-forums-moderators_us@oracle.com. Technical questions should be asked in the appropriate category. Thank you!

Host Header Injection Leading to Incorrect Response Handling in Oracle APEX

Lovely singhJan 16 2025

Description of the Issue:

We have identified an issue in our Oracle APEX application where the Host header value is being manipulated during requests, resulting in unexpected redirections and potential exposure to header injection vulnerabilities. Specifically, the injected Host value appears to influence the application's response behavior, including incorrect redirects and inclusion in HTTP responses.

Environment Details:

  • Oracle APEX version: [23.1.5]

Details of the Issue:

Observed Behavior:

  • When the Host header is modified to a value such as appscanheaderinjection.com, the application improperly processes the request and redirects to the injected host.
  • The manipulated Host header value is also included in the response headers and/or body, which is indicative of inadequate header validation.

Steps to Reproduce:

  • Send a GET request to the application endpoint with a modified Host header
    Host: appscanheaderinjection.com

Expected Behavior:

  • The application should validate the Host header and reject or sanitize any malicious or unexpected values.
  • Responses should not include unvalidated or user-controlled Host header values.

Please prioritize this ticket as it relates to a security vulnerability that may expose our application to external threats. Let us know if further details or testing scenarios are needed(Any guidance will be helpful)

Comments
Post Details
Added on Jan 16 2025
4 comments
351 views