Archive for Juli, 2009

Oracle Metasploit Presentation

Donnerstag, Juli 30th, 2009

Yesterday Chris Gates gave his presentation (here the summary) about hacking Oracle with Metasploit at the Blackhat 2009 USA. Chris described the Oracle Attack Methodology and how to use Metasploit for this methodology (here is one of my older tutorials for Backtrack2 from 2006 following this methodology (but showing only a subset)):

  • Locate Oracle Systems.
  • Determine Oracle Version.
  • Determine Oracle SID.
  • Guess/Bruteforce USER/PASS.
  • Privilege Escalation via SQL Injection.
  • Manipulate Data/Post Exploitation.
  • Cover Tracks.

The first new Metasploit module is TNS mixin (similar functionality to tnscmd.pl).
This module is detecting the SID via status command (8-9i only), via Brute Force, via Dictionary Attack (with the SID.txt from Red-Database-Security),spying the SID from Enterprise Manager Control/Database Control. If you need more information about detecting Oracle SID you should hava a look on „Detecting Oracle SIDs“ is from Alexandr Polyakov.

A small correction: Th TNS MIXIN is detecting the version of the TNS listener and NOT the version of the Oracle database. In most cases this is identifical but not always. A pentester should check the results from the view v$version as well („select * from v$version“).

The next step is to use guess username/password combinations using Pete’s Oracle default password list. If this was successful, it is possible to escalate the privileges if the database is unpatched. Chris provides SQL exploits for several (older) PL/SQL packages (lt_findricset, lt_findricset_cursor, dbms_metadata, dbms_cdc_ipublish, dbms_cdc_publish, lt_compressworkspace, lt_mergeworkspace, lt_removeworkspace, lt_rollbackworkspace).

After the privilege escalation Metasploit can run OS commands (e.g. install a trojan, get a remote shell, create users, …). Chris was using Java to run OS commands via Oracle. Keep in mind that this is one possibility. Additional options can be found in the Oracle documentation or here.

If you need more info about Oracle security you can check my „Oracle Security Cheat Sheet“ paper.

Well done Chris.

Oracle & Metasploit Presentation from Blackhat USA are already online

Mittwoch, Juli 29th, 2009

The Oracle & Metasploit material (PDF, Slides) from the Blackhat 2009 conference from Chris Gates is already online. A short review will be done tomorrow.

6 Advisories (2 from RDS) for Oracle CPU July 2009 posted

Montag, Juli 27th, 2009

I just posted 2 new advisories for the July 2009 CPU from Oracle on my website.

The first advisory (CVE-2009-1021) is about PL/SQL Injection vulnerabilities in the package DBMS_EXPORT_EXTENSION. In July 2006 Oracle fixed already vulnerabilities in this package but the bugfix was not implemented properly.

The second advisory (CVE-2009-1969) is about an information disclosure problem in Oracle audit logs. In some cases these audit logs can contain password hashes.

Last Friday Denis Yurichev released 4 new advisories concerning the TNS Listener in Oracle 10g/11g. All advisories are explained with a proof-of-concept code.

The first and most critical bug (CVSS 9.0 Win/6.5 Linux) advisory (CVE-2009-1020)  is remote exploitable but requires an authentication. All databases (9.2.08, 10.1.0.5, 10.2.0.4 and 11.1.0.7) are affected.

The second advisory (CVE-2009-1019) is remote exploitable without authentication. The P.o.C.of Denis creates a denial of service against the database. All databases (9.2.08, 10.1.0.5, 10.2.0.4 and 11.1.0.7) are affected.

The third advisory (CVE-2009-1963) is remote exploitable with authentication. The P.o.C.of Denis creates a denial of service against the database.  11.1.0.7 is affected.

The fourth advisory (CVE-2009-1970), remote exploitable without authentication, is  a denial of service vulnerability against the database. Oracle  10.1.0.5, 10.2.0.4 and 11.1.0.6 are affected.

SQLMap 0.7-1 released

Sonntag, Juli 26th, 2009

Bernardo Damele has released a new version of his SQL Injection Tool SQLMap 0.7.1. This version comes with new features like support for Mac OSX, support of Metasploit wrapping functions plus several bugfixes (changelog).

Article about Oracle CPU Quality

Freitag, Juli 24th, 2009

Today Eric Maurice from Oracle Global Product Security released an interesting article about „Ensuring Critical Patch Update Quality„. He explains the entire test process,  timeline (e.g. 15 weeks before the CPU is released the fixes will be selected), ….