Archive for the ‘Tools’ Category

Perl – Script to run OS commands via Oracle based Web Apps released

Freitag, Mai 1st, 2009

Sumit Siddarth from www.notsosecure.com has released a small perl script to run OS commands via Oracle based Web Apps. Sumit is using the bug in dbms_export_extension. This problem was fixed with CPU July 2006 but all databases without this (or higher CPU or patchset) are affected (Oracle 8.1.7.4, 9.2.0.1 – 9.2.0.7, 10.1.0.2 – 10.1.0.4, 10.2.0.1-10.2.0.2, XE) . More details are available in my updated tutorial.

I tested the script together with him against several of my test database.

Run OS Commands via webapps via perl script

The script is easy to use. Under MacOS I had to install p5-libwww-perl to run it.

At the moment the script does not work against Oracle databases without java but I am sure sooner or later this will be changed. In my opinion the most generic way to run OS commands (as user Oracle) is PL/SQL native (Oracle 9i, Oracle 10g/11g).

SQLMap 0.7 rc is out

Donnerstag, April 23rd, 2009

Yesterday Bernardo Damele released sqlmap 0.7 rc1 for Linux. This new version of SQLMap was published at the Blackhat Europe and allows the execution of OS commands on SQL Server, MySQL and Postgres.

Oracle is not part of it but I am quite sure sooner or later the execution of Oracle commands will be supported as well…

The blackhat presentation „Advanced SQL injection to operating system full control“ is also available for download.

Pangolin 2.0.2.820 with enhanced Oracle support

Montag, April 20th, 2009

Zwell has posted an entry on Full Disclosure (FD) about a new version of Pangolin. This new version comes with an enhanced Oracle support

[…]
Sometimes we meet Oracle database when we do web sql injection testing. All we do is to dump some data in the db. But you know what? Actually, we can do more and more operation of it, just like:
1. Fast data dumping even cannot use union select
2. Dump server information like : db name, sid, real internet ip address, user list, user hash and so on.
3. Execute PL/SQL
4. Privilege escalation
5. Crack user password
6. Execute system command
7. Install oracle rootkit
8. and so many others

Maybe you could say it cannot execute multi-sql through a single query. Don’t worry. There is a demo at http://down2.nosec.org/swf/pangolin_oracle.html, you can watch it and learn a lot of things about Oracle sql injection.
[…]

Most of the stuff is not new… (at least not for me)

1. Fast data dumping even cannot use union select
==>usage of utl_http to get additional data.  A faster way getting all results from multiple queries in a single query is described in a blog entry here.

utl_http is often revoked from public for security reasons. The usage of httpuritype is normally more reliable from the security perspective.

2. Dump server information:
==> via sys_context function. That’s standard Oracle functionality. Nothing special.

3. Execute PL/SQL
==> Pangolin is doing this via an exploit in dbms_export_extension. The bug in dbms_export_extension is old but this exploit was new for me…

4.  Privilege escalation
==> I guess they are doing this via the exploit in dbms_export_extension

5.  Crack (Oracle database) user password
==> Matrixay is doing this since several years.

6. Execute OS commands
==> several techniques (create table, dbms_scheduler, extproc, java, oracle text, plsql_native_9, plsql_native_10, set_events) are available to do this. Via PL/SQL this is easy to achieve…

7. Install Oracle rootkit
==> yeah. Simple via plsql

Maybe you could say it cannot execute multi-sql through a single query.
==> Stacked queries are not possible in Oracle. Correct me if I’m wrong. You are using a PL/SQL Injection vulnerability in a SQL function. This is a small but important difference.

BTW. :
The current version of Pangolin is using Openssl to crack Oracle passwords but not adding the Openssl license to pangolin. This is a license violation of the OpenSSL license…

Here is a screen shot of Pangolin 2.0 (taken from the flash movie from the pangolin website):

Pangolin 2.0

SQL Injection Tool Pangolin 2.0 published

Donnerstag, April 16th, 2009

The SQL Injection Tool Pangolin is now available in version 2.0.  I already talked about this SQL Injection tool in a previous blog entry.

Pangolin is now available in different versions. The free version does no longer support Oracle, MySQL, DB2, Postgres, Sybase, …  That’s why I can not provide an updated video of Pangolin.

The Standard edition with Oracle support costs 200 USD. For 8000 USD you will get the Enterprise Edition including sourcecode. I guess the new version does no longer contain a backdoor…

Oracle Database Scanner Repscan 2.5 trial available

Mittwoch, April 15th, 2009

We just finished the latest version of our  Oracle database scanner Repscan 2.5. You can download a trial version of Repscan from our exclusive distributor and partner Sentrigo.

Here some of the Repscan highlights:

  • Scan 1 or 100 databases in 1 run
  • GUI and/or commandline interface
  • Repscan client runs on Windows, Mac OSX and Linux
  • Advanced multi-threading password plugin architecture
  • Password plugins for Oracle DES, Oracle SHA1, MD4, MD5, SHA1, APEX3
  • Checks Database, History, Roles, HTMLDB 1.4-1.6, APEX 2.0-3.2, OID, OVS passwords
  • Optimized dictionary files
  • Shows the patch level of all your databases in one-click
  • Finds security problems such as unsecure code, SQL Injections, hard coded passwords, deprecated functions
  • Detects altered data via SHA2 checksums (including modifications of privilege and user tables)
  • Complements and integrates with Sentrigo’s Hedgehog family of database activity monitoring software

Link Repscan Trial