Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
Security Businesses Oracle Databases Programming Software IT

New Attack Exploits "Safe" Oracle Inputs 118

Trailrunner7 writes "Database security super-genius David Litchfield has found a way to manipulate common Oracle data types, which were not thought to be exploitable, and inject arbitrary SQL commands. The new method shows that you can no longer assume any data types are safe from attacker input, regardless of their location or function. 'In conclusion, even those functions and procedures that don't take user input can be exploited if SYSDATE is used. The lesson here is always, always validate and prevent this type of vulnerability getting into your code. The second lesson is that no longer should DATE or NUMBER data types be considered as safe and not useful as injection vectors: as this paper (PDF) has proved, they are,' Litchfield writes."
This discussion has been archived. No new comments can be posted.

New Attack Exploits "Safe" Oracle Inputs

Comments Filter:
  • heh (Score:5, Interesting)

    by stoolpigeon ( 454276 ) * <bittercode@gmail> on Friday April 25, 2008 @02:28PM (#23201688) Homepage Journal
    It's an interesting piece but when he points out that there really is little chance of it being used in the real world, that is an understatement. Using this method in the real world wouldn't even make sense.
     
    In order to pull this off you need to have alter session priveleges. And you need to already have injected sql into the database- which means there is absolutely no point to taking the extra steps to modify some other data type to allow you to do what you have already done.
     
    It's an interesting mental exercise but I don't think it really has an practical ramifications. If you've already handed out alter session to anyone using a form you've hosed yourself so many times over, playing with sysdate or number is the least of your worries.
     
    Anything that reminds people to be careful about how they handle input is good, but I think a lot of people are going to think this is a bigger deal than it is.
    • Re:heh (Score:5, Insightful)

      by arth1 ( 260657 ) on Friday April 25, 2008 @02:38PM (#23201832) Homepage Journal
      Lack of input validation is usually a bigger problem than what you think it is -- the context might make the instance safe, but code tends to be re-used, coding practices repeated, and projects getting additions that might introduce a vector that weren't there before.

      The only time when lack of validation is good practice is at extreme low level where you control the input. Otherwise, it usually signifies a coder that lacks the ability to think outside his own procedures.

      Regards,
      --
      *Art
      • I'm not arguing that. All I'm saying is that this depends upon a chain of failures prior to becoming possible and those failures are even greater than the exploit itself.
         
        I don't know enough about sysadmin to make a good comparison, but my dba brain thinks this is like, saying 'hey you might think ls is pretty safe- but not if you give people root privileges before they use it.' But that might be a bad example.
        • by arth1 ( 260657 )
          Not really a bad example, no. However, good sysadmins will try to do their best to limit the damage even if the unthinkable (like privilege escalation) should occur.
          SELinux is a good example of this -- unless something is explicitly permitted and happens in a permissible context, it's forbidden. Even for root.
          The downside is that the more draconian the measures, the more likely it is that laziness or lack of understanding will win. Instead of taking five steps to securely opening a window slot, someone w
        • My DBA brain thought "What kind of idiot assembles SQL as a string and runs it inside a stored procedure like that?"
          • Re: (Score:1, Insightful)

            by Anonymous Coward
            The kind of idiot who wouldn't have a paper to publish on their website if they actually weren't creating their own security holes.

            This is IT security equivalent of a strawman argument.
            • The kind of idiot who wouldn't have a paper to publish on their website if they actually weren't creating their own security holes.

              This is IT security equivalent of a strawman argument.
              No, the kind of idiot who wants to leave this kind of hole open to drop all your tables (or best, fill them with junk/wrong/malicious records) if he's fired. It's a nice way to create an "extendend severance package".
          • by SQLGuru ( 980662 )
            This isn't a problem of type safety. The types are actually still as safe as they were ever considered. This is a problem of IMPLICIT dataconversion. The NLS settings affect how dates and numbers are converted to strings if you don't specify the formatting. I always EXPLICITLY convert my values to a known format (when I convert to/from string).

            string_var := 'blah blah blah' || num_var; --or even just to_char( num_var )
            vs
            string_var := 'blah blah blah' || to_char( num_var, '9999d99' );

            I've always contende
      • Re: (Score:1, Offtopic)

        by JDizzy ( 85499 )
        Always assume your input is an arbitrary location and length of pi. *joking*

        This is why assuming a datatype, even the ones advertised as constant, or immutable (strongly typed), are bad.

        I might be missing some DBA jargon here though, about schema types, instead of language.
    • Re: (Score:2, Informative)

      Agreed. Handing out ALTER SESSION privs to anyone using a form is just plain dumb, dumb, dumb. You may as well put PLEASE HACK ME in flashing red letters at the top of the form.
      • on the bright side, if you did put PLEASE HACK ME in flashing red letters at the top of the form you'd figure out where you security is lacking pretty fast. ^_^
    • That's exactly what I was thinking, what retard grants the application's database user ALTER privileges on database objects?
      • by Shados ( 741919 )
        I guess a web based database development tool... But then, when you can execute ANYTHING and have admin priviledge on the database, you don't really need exploits :)
    • Correct me if I'm wrong, but even if someone has Alter session privileges, in order to execute "alter session", someone must be able to execute arbitrary stuff. In that case, trying to inject makes no sense, just plain insert/delete/whatever without using those date/number fields would do.
      • Re: (Score:3, Informative)

        by DazzaL ( 1029774 )
        It is not true to say that you need ALTER SESSION privilege granted to actually issue ALTER SESSION commands. Yes, that sounds counter-intuitive but it is true that you can issue SOME alter session commands if you can connect to a database regardless of what privs you have.

        In this case setting NLS_DATE_FORMAT can be done by ANYONE regardless of whether they have ALTER SESSION granted.

        some observations:

        1. in most web apps you wont have access to the database, just the webserver...the database should be

        • <quote>It is not true to say that you need ALTER SESSION privilege granted to actually issue ALTER SESSION commands. Yes, that sounds counter-intuitive but it is true that you can issue SOME alter session commands if you can connect to a database regardless of what privs you have.

          In this case setting NLS_DATE_FORMAT can be done by ANYONE regardless of whether they have ALTER SESSION granted.
          </quote>

          Still, you need to be already able to inject in order to issue a modified "ALTER SESSION".

          <quot
    • by Anonymous Coward
      Your comment "he points out that there really is little chance of it being used in the real world, that is an understatement" is reminiscent of those who proclaimed no one would need more than one 360k floppy.

      It best concluding non vulnerability without time and personal investment is naive and at best considering the large volume new security measurements in evidence prove that statements like these are foolish usually false and cause much more damage by breeding a false sense of security and complacency
    • Re:heh (Score:5, Insightful)

      by Joe U ( 443617 ) on Friday April 25, 2008 @02:54PM (#23202058) Homepage Journal
      Too many poor developers just make the web app run as dbo. They also tend to use 'select * from' all too often.

      Drives me nuts, because I'm the exact opposite, you don't get any (yes including read) access except a few stored procedures you need to read/write data.
      • Re: (Score:2, Informative)

        by martinmarv ( 920771 )
        In the environments I've worked in (enterprise applications and large CMS-based websites), using stored procedures for everything can be a pain. For me, the best approach is a happy medium:-
        • Don't restrict yourself to stored procedures, but do use them for updates, or database-side processing
        • Do use a dedicated account for database access and make sure only appropriate permissions are granted
        • Use parameterised queries (seems like most common frameworks support this)

        Also

        • Always validate user input
        • Alway
        • by Joe U ( 443617 )
          I agree completely.

          While I do try to use stored procedures for all projects, parameterised queries is a very good second choice. I don't understand why they're not used as much.

          When you get into unvalidated inserts and selects, that's what drives me nuts.
      • Re: (Score:3, Informative)

        by Kozz ( 7764 )

        Reminds me of a webapp I worked on once. The programmer, in his infinite wisdom, would "SELECT * FROM TABLENAME", then stuff all 2500 records into a PHP array. Then he would promptly iterate over this array, selecting only two columns (of about thirty) he wanted from the desired rows matching his criteria.

        I held my gag reflex long enough to perform only the requested change and make it functional. Then I declined all work after that.

    • Re:heh (Score:5, Insightful)

      by moderatorrater ( 1095745 ) on Friday April 25, 2008 @02:59PM (#23202144)

      he points out that there really is little chance of it being used in the real world, that is an understatement
      I believe it was George Guninski who saw the possible exploit in buffer overflows several decades ago and said something along the lines of "this is possible, but the difficulty in crafting the message makes this seems unlikely". If there's the possibility of an attack vector, then someone will use it. Computers are fast enough to try hundreds of attacks per second; "unlikely" often means "only works 1/1000 times, therefore used every day".
      • by glwtta ( 532858 )
        Computers are fast enough to try hundreds of attacks per second; "unlikely" often means "only works 1/1000 times, therefore used every day".

        What does that have to do with anything? It's unlikely to be used not because it's unlikely to succeed, but because it's just a neat trick you can do with an already compromised system.

        There's a big difference between "difficult to pull off" and "not worth bothering".
        • What does that have to do with anything?

          It has everything to do with exploits. It means that if there is the slightest chance that something will be exploited then it will be exploited even if the attacker has to rely on brute force methods to find the right entry.
    • Plus, anyone using this method of injection would probably cause widespread failures across the board in any app that depends on db procedures. The app would probably crash immediately. This isn't a very subtle way of hacking a db.
      • by SQLGuru ( 980662 )
        ALTER SESSION only changes the value for that one session. To affect multiple users, you need ALTER SYSTEM privs which (should be) very tightly controlled. Each connection would need to reset the NLS parms each time they connect for this to matter. So, really, it's only a good way to try to get some of your own code executed.

        And while the doc doesn't say it, you could put an anonymous block in there, so you don't need privs to create anything....you just rely on the privs of the connection to execute cod
    • Re: (Score:1, Informative)

      by Anonymous Coward
      Neither ALTER SESSION nor creating PL/SQL stored procedures is a highly privileged operation in Oracle. Users use ALTER SESSION to set a preference for date formatting and you don't need any system privileges for this. Each database user has their own schema in which they can create stored procedures if they have the CREATE PROCEDURE system privilege. And you can create a stored procedure that is invoked using the rights of the caller or the rights of the owner. Most procedures execute using the rights o
    • Re: (Score:3, Informative)

      by blirp ( 147278 )
      In order to pull this off you need to have alter session priveleges.

      No, you don't. What you need is to somehow be able to modify NLS_NUMERIC_CHARACTERS or NLS_DATE_FORMAT. This is easily demonstrated with ALTER SESSION. But there might be a bug/exploit somewhere down the road that allows this in some other manner. Each of the two exploits are unusable, but combined ...

      M.

  • IF programmer_is_smart_and_validates_data THEN PRINT no_big_deal ELSE PRINT he_has_bigger_worries
  • Itsatrap! (Score:2, Offtopic)

    by esocid ( 946821 )
    Come on, do I have to tag this myself?
  • Use ORMs (Score:3, Informative)

    by chrysalis ( 50680 ) on Friday April 25, 2008 @02:38PM (#23201834) Homepage
    Interesting flaw.

    However, don't ORMs (and database-independant abstraction layers like AdoDB) protect against this?
    • Re:Use ORMs (Score:4, Informative)

      by Shados ( 741919 ) on Friday April 25, 2008 @02:52PM (#23202050)
      Yup. Basically, the only real way this could be exploited would be something like a stored procedure which takes one of the "vulnerable" types as parameters, exposed directly to the clients, and concatenate the types with little to no casting.

      Something like (pseudocode, the following wouldn't even pass syntax check, obviously, but its stupid hard to find a working case)

      DECLARE @blah SOMEVULNERABLETYPE

      Exec "select * from stuff where stuff.Blah =" + @blah;

      If @blah was a string, everyone would realise its vulnerable...but in this case, numbers, dates, etc, would be assumed safe (how do you put code in a number??), when it supposingly was discovered its not safe.

      However, if you went through a database driver (not even an ORM!), and made a prepared statement, passed a Java (for example) variable as parameter to a query, well, no invalid input will be able to get through. If you add an ORM layer on top of that which does extra validation, then even if all of the types (both java and database) were vulnerable, it wouldn't go through either...

      This is really more of a theoritical vulnerabilty than a real one... it can't realistically be exploited in the wild, and its hard to even -imagine- a scenario in a well coded app.
      • I think this is more of a programming error than a vulnerability. The examples are concatenating the session's representation of a date and then running the resultant sql. It doesn't make much sense to use dynamic sql when you can just directly compare the date variable without having to represent it as a string. An easy way to bypass this kind of problem (if you really want it to be a dynamic query) is to explicitly specify what date format you want e.g. to_date(@date, 'YYYYMMDD') Of course, you wouldn'
      • by zifn4b ( 1040588 )

        I can't think of a reason why anyone would want to use a stored procedure that builds dynamic SQL. For this type of thing, you should use a parameterized SQL query with a good provider like the Oracle Data Provider for .NET. If you always use the Parameter objects instead of concatenating them to the query text, you should be ok.

        This seems to only really affect poorly written code. If developers were trained in best practices, we would have more secure software. Sadly, a lot of the books out there tha

        • by Shados ( 741919 )
          In this case, it doesn't even affect poorly written code: it affects some theoritical near-impossible scenario. I only skimmned the description, but as far as I can understand, you almost need a researcher to be able to write code that can be exploited... a normal (or bad) dev wouldn't be able to pull it off (neither would I, as far as I can tell!).

          I agree with the rest of your point, however.
  • Isn't a central premise taught in database programming 101 about NEVER assuming any input valid, and doing your own validation even if it was validated prior by a supposedly trustworthy source? I've never taken any classes in programming, so I would have no idea.
    • by 0racle ( 667029 ) on Friday April 25, 2008 @03:07PM (#23202248)
      People learn database programming now? I thought they just threw together whatever SQL and PHP they could find online and called themselves programmers.
    • by Shados ( 741919 ) on Friday April 25, 2008 @03:25PM (#23202454)
      DB Programming (even the science part, such as the relational model) is virtually never taught in colleges. When it is, its as an elective class most of the time, even in the big name tear-through-your-wallet colleges.

      Still cracks me up how in every interview I pass, I always get asked "Ok, so can you explain to me the difference between an inner and an outer join?" or "What is the main benefit of an index on a database table?". Shows the state of the workforce...
      • by Chirs ( 87576 )
        Heck, I couldn't answer the first question, so it's not universal knowledge.

        But then I'm an embedded realtime systems guy, not a database guy.
        • by Shados ( 741919 )
          It isn't universal knowledge because its not taught in schools =P But considering how pervasive databases are in the industry, and that, after all, people go to school to (at least, quite often) become productive and get a job, it definately should be taught.

          Its (for databases) on the same level as "Whats the difference between a WHILE and a FOR loop". Since the basics aren't taught, well...you have 500000 servers getting hacked (see article a couple notch down in today's list).

          I'm sure there's a lot of th
        • Re: (Score:3, Informative)

          by VGPowerlord ( 621254 )
          Since Shados didn't say what the difference is, I will.

          Inner and outer joins always have a join condition.
          An INNER JOIN only returns the records that satisfy the join condition.
          An OUTER JOIN always returns all the results of one (LEFT or RIGHT) or both (FULL) tables, returning nulls for all the requested data in the other table when the join condition is not met.

          Maybe that's not clear enough. I'll make a pair of contrived tables to demonstrate.

          people
          id | name
          01 | Bill
          02 | Tina

          items
          id | item
          01 | ca

      • by Goyuix ( 698012 )

        Still cracks me up how in every interview I pass, I always get asked "Ok, so can you explain to me the difference between an inner and an outer join?" or "What is the main benefit of an index on a database table?". Shows the state of the workforce...
        So, since you have identified questions you might ask a college intern - what questions would you or have you [been?] asked that were really good database questions?
        • by Shados ( 741919 )
          In a good interview for a job thats beyond entry level, you don't ask silly questions. You start a discussion on the challenges and solutions involved in a given situation, and go from there.

          Something like: "Have you ever had to work as a backend database developer?" "Yeah, I did in a 2 year contract at company XYZ" "Sweet, can you describe to me what you were doing?" ::potential employe described it:: "Interesting. See, we're trying to do something similar here, but have stumbled on problem XYZ while tryin
      • by cduffy ( 652 )
        Meh. I went to CSU Chico (certainly not a tear-through-your-wallet school) about a decade ago. Database programming was required (IIRC), and reasonably comprehensive for what I think (rightly? wrongly?) was a 200-level class (the softballs you mentioned, the various normal forms and transformations between them, etc etc).

        There might be schools that graduate folks without that knowledge, but I'd sure hope there wouldn't be many of them.
        • by Shados ( 741919 )
          Yup, I agree with you, but its actually the majority of schools, -especially- the purist "CS" schools. My girlfriend comes from CMU (which is rated fairly high as far as CS schools go), and while she did take a database course like the one you describe, it was an elective!

          I can't say I've surveyed all of the schools, but I know enough people from various schools to beleive its the monitory that requires it (and that ironically, the lower rated schools are more likely to have it as mendatory, go figure!).

          I r
          • by SQLGuru ( 980662 )
            Was your degree CS or MIS? My degree is CS and for me database classes were electives (which I didn't take).....in fact, I've learned through the school of "trial by fire"....a friend of mine has an MIS degree and he did get exposed to databases as a required class (might have just been Access, but the fundamentals are there).

            I think the main reason that most CS courses don't require it is that CS is a very broad discipline that could be used for embedded programming, OS programming, game programming, etc.
            • by cduffy ( 652 )

              (might have just been Access, but the fundamentals are there)

              I'm very skeptical of any MIS class having adequately covered the fundamentals -- schema normalization rather than form building, for example. That might just be a symptom of the school where I went to, OTOH, where the MIS courses (in the view of the CS department, at least) had nothing which in any way could be associated with "rigor".

              Frankly, I think that inadequate coverage of a topic is worse than none at all -- if folks have the impression th

              • by SQLGuru ( 980662 )
                My comment was more about Access providing the fundamentals of a database engine with which to teach, not that the content of the course was more or less adequate for teaching. That's usually just as much a factor of the curriculum as it is the individual professor.

                Layne
  • nTier validation (Score:5, Insightful)

    by Joe U ( 443617 ) on Friday April 25, 2008 @02:45PM (#23201932) Homepage Journal
    The 3 minimum levels of validation:

    Validate at the client tier. (To save a return trip)
    Validate at the application server tier. (to save a database trip)
    Validate at the data tier. (to save your data)

    Why is this so hard for developers to understand?
    • Because too many database developers are restricted to working on one tier. They rely on the (incorrect) assumption that the guy working on the next lower tier has done their job properly.
      • Re: (Score:2, Offtopic)

        by Joe U ( 443617 )
        Then the project manager should be lectured on proper development techniques.
        • Re: (Score:1, Offtopic)

          by EricWright ( 16803 )
          You must have different project managers than I do. Ours our completely obsessed with setting (and missing) milestone dates. They don't care HOW things get done, or even if they're done properly.

          Brother, can you spare a decent PM?
          • by Kozz ( 7764 ) on Friday April 25, 2008 @04:28PM (#23203072)

            Preaching to the choir, I'm sure!

            I was recently criticized for taking the time to do something "right" (i.e. verify and understand the problem and the technology needed to create a reliable solution). My boss indicated that his (crappy) code was meant as an "emergency fix". But come on, we all know that if his code had accomplished the job (however terribly), he'd have left it right there and never attempted to improve it.

    • Re: (Score:3, Interesting)

      by Kjella ( 173770 )
      Developers? No. Try making a PHB understand that. Or a project manager, which either cuts that or some feature the client will notice right away. Or the guy that gets the ungrateful job of coordinating three teams of completely different teams in different subprojects with different managers, trying to keep a common model of "valid data". The real way it works is more like:

      1. User validation = stupid "have you filled out these fields" validation
      2. Application validation = application logic validation
      3. Data
      • by Joe U ( 443617 )
        A properly designed database layer shouldn't have the ability to take in bad data from any source and shouldn't trust the app server (if possible).

        One method that I used that worked amazingly well was to use stored procedures with strict validation for all data access to/from the databases. No one had any access except explicit execute access to the stored procedures. Yeah, it was harder to design, but it flew. Porting to other app servers was really easy too, the procedures did all of the data work.

        Some de
        • Sometimes the DB layer is too restrictive (load balancing,data logging,etc.) so you end up with another API "layer". For example,

          DB backend <--> DB API on app server #1 <--> Apps on app server #2 <--> GUI/web/whatever

          The DB API is the general glue between your apps and the server. But then on most apps you can just stick that in the DB as stored procedures, as you've done.
    • You are missing the point of the attack. The validation IS done, but the attack subverts it.

      Validating dates, especially international ones, is enormously complex, and the validation process itself is extremely prone to errors and undesired behavior. If you expect all database clients to do full validation of all input data before passing it on to the database, you are going to see some really miserably performing clients, and not a lot of extra security. Each validation step would also have its own poin
      • by Shados ( 741919 )
        Actually, its not that tough in modern environments... Java, .NET, whatever, will have globalization enabled datetime objects, along with one or more parsing method, that most likely throw an exception if it cannot, and will return a datetime object otherwise...

        So get the culture from the request, parse the date, if it throws an exception, return an error, otherwise pass the -datetime object- (not the string!) to the database API, and there really isn't anything that can happen. Even if an invalid date was
        • We are not talking about using some kind of framework. We are talking about THE ACTUAL FRAMEWORK. You folks imagine that there is some magic perfect code down there that you just call to parse a date and you forget that it actually has to implemented somewhere. Oracle has been ported to roughly a zillion different platforms. Do you really think they are going to rely on the platform to parse their dates?

      • by jedidiah ( 1196 )
        That's *ss backwards. The clients are what can trivially scale,
        the database isn't. This is the perfect example of something that
        can be easily done in parallel. The real problem is that you
        have distributed enforcement of business rules and the
        possibility that rules aren't properly enforced when they are
        pushed out away from the database.

        Although even this is fairly easy to manage.

        Bog down the database and you bog down everyone.
        • by Joe U ( 443617 )
          I've always maintained that the database should enforce data integrity. Not just hold data, but actually stop bad data from ever getting saved.

          That being said, I might be spoiled using SQL server. I've done some setups where a SQL server (sometimes MSDE) runs on the app server and enforces the rules (with some server caching tables as well) and passes data out to a SQL server cluster which holds the actual data. (It's really hard to explain without showing diagrams and violating my NDA, but it worked well f
  • Ok, this may be barely on topic (and I've had more on-topic posts than this one modded "offtopic") but the summary describes David Litchfield as a "super-genius". Neither the dictionary [reference.com] nor Wikipedia [wikipedia.org] has entries on "super-genius". Well actually wikipedia does have it listed (linked) but it describes "a flash cartoon flash game flash animation web portal channel and studio" and a rock and roll band.

    The wikipedia entry on IQ does not contain the word "genius", let alone "super-genius".

    So if someone (preferabl
    • by ch-chuck ( 9622 )
      Super-genius - that's when a super-villian switches to the light side of the force.
    • Or, and here's a thought, you could just treat as it is, a little bit of exaggeration to add some spice to what would otherwise be a fairly boring news piece.

      Just because it's not rigourously defined it doesn't mean you can't use it. You clearly know what they intended, and that's what is important here.
      • by sm62704 ( 957197 )
        a little bit of exaggeration to add some spice

        Exaggeration and spice belong in entertainment, not news. News should be factual and concise.

        to what would otherwise be a fairly boring news piece.

        If it's too boring to read it's too boring to post. However, the submitter (IINM) commented with a link.
    • Re: (Score:2, Informative)

      by BigBlueOx ( 1201587 )
      The term "super-genius" was coined in modern English in 1952 in "Operation: Rabbit". The fact that the supposedly encyclopedic Wikipedia refuses to index on this term, despite my frequent repeated submissions of well thought out and quite lengthy protest emails, just goes to show their blighted pig-ignorance.

      http://en.wikipedia.org/wiki/Operation:_Rabbit [wikipedia.org]
      • And to think I wasted my mod points on trivialities in the "Developer" section. If only I'd known something important was coming.

        Wile E. Coyote, Sooper Jeenyus -- I like the sound of that.
      • by sm62704 ( 957197 )
        Ah, I found the reference in the wikipedia article on the cartoon. That would neab that the term is a joke! There is, in fact, no such thing as a "super-genius". "Genius" refers to someone with super-intelligence (that would be Einstien, whose picture illustrates the Wikipedia entry on "genius").
  • by Anonymous Coward
    delete from comments where 1");--

    First Post!!!!!!!!!!
  • So, in order to pull this off, you must first already have elevated permissions and the ability to execute arbitrary code. In other words, if you've been compromised, you can be compromised in new and exciting (well, maybe not exciting) ways. Wow, what an earth-shattering revelation!
  • by GoNINzo ( 32266 ) <<moc.oohay> <ta> <ozNINoG>> on Friday April 25, 2008 @03:03PM (#23202192) Journal
    This makes it clear it's only a matter of time before xkcd predictions become reality [xkcd.com].
  • by Anonymous Coward on Friday April 25, 2008 @03:12PM (#23202302)
    First off, this isn't a new class of attack. This type of attack is already known as second order SQL injection. Second, as several people have noted, you need to be able to execute the ALTER SESSION command. That means you're already issuing SQL commands directly. So, this attack is really only useful when can already inject, but need SQL to run in the context of a more privileged stored procedure. Finally, this attack relies on a very abnormal statement form. All said, that's a whole lot of dominoes that need to line up for a simple elevated SQL privilege.

    This whole thing just sounds like an odd bug that someone at NGS found somewhere. It's certainly clever, but it's not a common pattern or new class of bug--and definitely not worthy of a white paper. What I find really odd is that Litchfield and the NGS guys used to do really impressive work. This is way below the bar of what they've produced in the past.
  • If an unbreakable server breaks, and everyone has their hands over their heads chanting the oracle "unbreakable" mantra whilst picking each other asses with their toes, did it actually break?
    • by Shados ( 741919 )
      What will break is your company's check book when the Oracle guys are done billing you for support :)
  • Honestly, I never understand the people that constantly trumpet "Validate! Validate! Validate!" whenever they're dealing with a web/database app. If you're escaping/sanitizing your inputs properly, then you don't need to chase your tail making sure your users haven't entered something "evil".

    The specifics vary by platform, but if you're building a dynamic SQL statement in SQL Server, for instance, you'd use the Replace function on the concatenated values to change any occurrence of ' to ''. For MySQL, cha

    • by Shados ( 741919 ) on Friday April 25, 2008 @04:51PM (#23203274)
      No no no. This has a tons of potential holes, such as an encoding based attack in UTF16 or similar encoding. Use -prepared statements-.

      Escaping/sanitizing is just one step up from validating. Let the -driver- do it for you, not the language or the framework. The database itself is the only one who truly knows how to handle itself, and drivers tap into that in prepared statements. -THAT- will protect you. Parameterized query APIs do -not- simply escape stuff in the back. Things are done at the level of the connection, chatting with the database API to create a cached/compiled version of the query, then plug in parameters -after- the query was parsed (so at that point its impossible to modify it).

      That is -much- safer than just cleaning up a string (because it cannot abuse encoding/string related features), and has the extra advantage in many DBMS to also allow you to reuse query plan cache, thus improving performance and making it easier to benchmark and profile queries.
      • How I wish Ruby on Rails actually did parameters, but all it does is stupid escaping. Even for parameterized queries like,

        find( :first, :conditions => [ "test_column=?", my_test ])

        Ruby on Rails will *replace* ? with the my_test that it escapes! I have no idea what they were thinking. And I do agree with you that parameterized queries are the only safe way, and should be the ONLY way to actually query databases. Heck, it is faster for recurring queries because all you have to do is pass the parameters and
        • I found your quote interesting. The font you choose is hard for these old eyes to read. Must you use something smaller and harder to read than the default font? It interferes with your message.
    • You're still using dynamic SQL; you should use parametrized queries.

      • I agree, but there are some situations where you simply can't. Take for instance dynamically specifying the database to use in an SQL Server query. You get various syntax errors if you try to do "SELECT * FROM @database.dbo.MyTable", so you have to concatenate. For all other situations, stick to stored procedure parameters.
  • Of course this is prevented by the simplest way to prevent SQL injection in Oracle - USE BIND VARIABLES. Each of his examples is thwarted by binding the parameters, instead of simple string concatenation.
  • Or an "We told you so". This attack vector relies on dynamic SQL inside pl/sql procedures.

    Something that EVERY developer I ever learned from, and EVERY knowledgeable person on every Oracle forum I have frequented will tell you to avoid like hell.

    Since :

    1. It is an attack vector (as was shown now again)

    2. It breaks compile time syntax checks and might put unverifiable errors into production code.

    3. It breaks the built-in package/function dependency checks of pl/sql.

    4. It is pretty much impossible to

    • Your argument is compelling except for the fact that many Oracle customers are pretty clueless and will not program with the excellent rigor that you do. This is compounded by Oracle's overblown security claims, which gives a false sense of security to less skilled developers.
      • by aix tom ( 902140 )

        That is unfortunately true.

        I remember one case where I had a discussion with one "developer" on a discussion board who tried to change his application which :

        • 1. Assembled the SQL in PHP
        • 2. Sent it to Oracle
        • 3. Read the resultset

        to

        • 1. Assemble the SQL in PHP
        • 2. Send it to an Oracle procedure as a ONE STRING bind variable
        • 3. Executed it in the procedure with EXECUTE IMMEDIATE
        • 4. Returned the result as a cursor bind variable.

        And he claimed he made it "more secure by using bind variables"

        Thats like

  • Did anyone actually tried this vulnerability ? I tried it on one of our test systems (Oracle 10.2.0.3.0) but can't reproduce the examples (can't hack the SYSDATE function with ALTER SESSION). Has this been fixed in recent Oracle versions ?

"All the people are so happy now, their heads are caving in. I'm glad they are a snowman with protective rubber skin" -- They Might Be Giants

Working...