what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 47 RSS Feed

Files from Alexander Kornbrust

Email addressak at red-database-security.com
First Active2005-07-14
Last Active2009-04-16
APEX Password Hash Disclosure
Posted Apr 16, 2009
Authored by Alexander Kornbrust | Site red-database-security.com

Unprivileged database users can see password hashes in APEX version 3.0.

tags | exploit, info disclosure
advisories | CVE-2009-0981
SHA-256 | 4ea827b7dad31bf7f8a520ba5bd15585d49f4dbefc840fa534832c2dba249d7e
DBMS_AQIN SQL Injection
Posted Apr 16, 2009
Authored by Alexander Kornbrust | Site red-database-security.com

The package DBMS_AQIN contains a SQL injection vulnerability in the procedure DEQ_EXEJOB. Oracle versions 10.1.0.5 through 11.1.0.7 are affected.

tags | advisory, sql injection
advisories | CVE-2009-0992
SHA-256 | 5964a7374194365921ab37c0db44964a7c72c74b0ff677173feef43536686a35
D2T2_-_Alexander_Kornbrust_-_Practical_Oracle_Forensics.zip
Posted Apr 21, 2008
Authored by Alexander Kornbrust | Site conference.hitb.org

Practical Oracle Forensics - Oracle forensics is a new discipline without special tools/scripts. Most presentations about Oracle forensics are still very basic. The typical approach in these presentations is to show what tools/(log)files are available to do forensics. In the real world with huge databases (many GB, sometimes TB) it is normally not helpful. This presentation is using a different approach. Based on the different type of attackers (leaving employee, nosy DBA/employee, external hacker etc.) we have different traces in Oracle and we show in different scenarios how to find evidence. We provide a free toolset to do a (basic) forensic analysis without having deep Oracle knowledge.

SHA-256 | 20612b361c886e97ff98ce3ea92f2c60e6d189c077a2b13341e46c3521bd8f78
oracle-hardcode.txt
Posted Apr 16, 2008
Authored by Alexander Kornbrust | Site red-database-security.com

Oracle 9i Release 1 through 10g Release 2 suffer from a hard coded password vulnerability.

tags | advisory
SHA-256 | 5a626b3f3db0d29867bfeb5c6c55255678262395a263f8d3e5ad0123e3b0aa0a
oraclesdogeom-sql.txt
Posted Apr 16, 2008
Authored by Alexander Kornbrust | Site red-database-security.com

Oracle 9i Release 1 through 10g Release 1 suffer from a SQL injection vulnerability in the SDO_GEOM package.

tags | advisory, sql injection
SHA-256 | 5c6480feed1ae87a9b01f04e8303b0822b3ea652afdbae60cea161366ac61511
oraclesdoidx-sql.txt
Posted Apr 16, 2008
Authored by Alexander Kornbrust | Site red-database-security.com

Oracle 9i Release 1 through 11g Release 1 suffer from a SQL injection vulnerability in the SDO_IDX package.

tags | advisory, sql injection
SHA-256 | d6d0053dc2be5c9cf1894ba082e60dc8f4f2aa3f839d4a47bb79a73fc0baee27
oraclesdoutil-sql.txt
Posted Apr 16, 2008
Authored by Alexander Kornbrust | Site red-database-security.com

Oracle 10g Releases 1 and 2 suffer from a SQL injection vulnerability in the SDO_UTIL package.

tags | advisory, sql injection
SHA-256 | 014f11cb69ac5e56681ff953324c818122c8520818bfd0427b2c1fb0b6b0c4d1
oracle_apex_sql_injection_check_db_password.txt
Posted Jul 19, 2007
Authored by Alexander Kornbrust | Site red-database-security.com

Oracle APEX suffers from a SQL injection vulnerability in the function wwv_flow_security.check_db_password.

tags | advisory, sql injection
SHA-256 | be85cdf82928543a15cd632048bd34f09111e4e5b7b86a1a31f11c3889e30768
oracle_sql_injection_dbms_prvtaqis.txt
Posted Jul 19, 2007
Authored by Alexander Kornbrust | Site red-database-security.com

Oracle 9i Release 1 through 10g Release 1 suffer from a SQL injection vulnerability in package DBMS_PRVTAQIS.

tags | advisory, sql injection
SHA-256 | 8f517541964af9ad28be18b98dc9a458db1af887ce0fdafcc0226c566e46723b
oracle_cpu_jul_2007.txt
Posted Jul 19, 2007
Authored by Alexander Kornbrust | Site red-database-security.com

Oracle 8i through 10g Release 2 allow updates, deletes and inserts via specially crafted views without having the right privileges.

tags | advisory
SHA-256 | f648f25b709a85c097126511d08bafb72d2ced88a799165bf3975637df3a482d
oracle-tns.txt
Posted Apr 19, 2007
Authored by Alexander Kornbrust | Site red-database-security.com

The Oracle Discoverer Servlet suffers from a flaw that allows for the TNS listener to be shutdown.

tags | advisory
SHA-256 | 6cd2e4a0b0c557d28f86cc4b2adb74c3a579002df62bea34f5fb4e09d883e8bd
oracle1016-xss.txt
Posted Apr 19, 2007
Authored by Alexander Kornbrust | Site red-database-security.com

Oracle Secure Enterprise Search version 10.1.6 suffers from a cross site scripting flaw.

tags | exploit, xss
SHA-256 | 7aff1e9b18ed5ee3a39d4482abc354b9e1131595d41325b2d9bdfc084897e7dc
oracle-sqlinj2.txt
Posted Apr 19, 2007
Authored by Alexander Kornbrust | Site red-database-security.com

Oracle 8i through 10g release 2 suffers from a SQL injection vulnerability in SYS.DBMS_UPGRADE_INTERNAL.

tags | advisory, sql injection
SHA-256 | 9167b0d43caa7db52dbfb7cc46a2cf827743d33ea95fb3f95418a2eb2d069b6b
oracle-sqlinj.txt
Posted Apr 19, 2007
Authored by Alexander Kornbrust | Site red-database-security.com

Oracle 8i through 10g release 2 suffers from a SQL injection vulnerability in SYS.DBMS_AQADM_SYS.

tags | advisory, sql injection
SHA-256 | 1d36561760e55a09bc52dc5e4fef603f3873b8856b518f5b9405b4d4f1cfa6f3
oracle-bypass.txt
Posted Apr 19, 2007
Authored by Alexander Kornbrust | Site red-database-security.com

It is possible to bypass the Oracle database logon trigger.

tags | advisory, bypass
SHA-256 | abf861aed916223bb9344c108ae7bcdecf70bbde07d488f29de921d949c8a625
bypass_dbms_assert.pdf
Posted Jul 28, 2006
Authored by Alexander Kornbrust | Site red-database-security.com

Whitepaper titled "Bypassing Oracle dbms_assert".

tags | paper
SHA-256 | 9f7cfa0b9fa6a325fd9b6f069b22b6795f046e87d923264ea157ee119a0bce84
oracle-SYS.DBMS_UPGRADE.txt
Posted Jul 20, 2006
Authored by Alexander Kornbrust | Site red-database-security.com

Oracle 10g Release 1 is susceptible to SQL injection flaws due to the SYS.DBMS_UPGRADE package.

tags | advisory, sql injection
SHA-256 | 18c7d147268f4340c1b4b135f96de0783f6f3ec9d81dbf61704fb19e444a06b8
oracle-SYS.DBMS_STATS.txt
Posted Jul 20, 2006
Authored by Alexander Kornbrust | Site red-database-security.com

Oracle 10g Release 1 is susceptible to SQL injection flaws due to the SYS.DBMS_STATS package.

tags | advisory, sql injection
SHA-256 | 3a7cab283b50bd36f1df7a0d097581f90730373dc3f861271e3fd452eacc7f17
oracle-SYS.KUPW.txt
Posted Jul 20, 2006
Authored by Alexander Kornbrust | Site red-database-security.com

Oracle 10g Release 1 is susceptible to SQL injection flaws due to the SYS.KUPW$WORKER package.

tags | advisory, sql injection
SHA-256 | f6324aa9af8254b31f82d5d99a144a429093d3ce534bbaefbedac9033a70dac6
oracle-SYS.DBMS_CDC_IMPDP.txt
Posted Jul 20, 2006
Authored by Alexander Kornbrust | Site red-database-security.com

Oracle 10g Release 1 is susceptible to SQL injection flaws due to the SYS.DBMS_CDC_IMPDP package.

tags | advisory, sql injection
SHA-256 | 7aee6cd1fd328ddd01a554087c7fe9ec3a27fddb63bc5df119ead3f784d82aa5
Oracle-select.txt
Posted Apr 14, 2006
Authored by Alexander Kornbrust | Site red-database-security.com

Oracle versions 9.2.0.0-10.2.0.3 suffer from an unpatched vulnerability which allows users with SELECT only privileges on a base table to insert/update/ delete data via a specially crafted view.

tags | advisory
SHA-256 | 52fce6051885e4c90f88131ef99b44526f5d4aaf91684d6e8bede57d2e41a144
oracle_sql_injection_kupvft.txt
Posted Jan 25, 2006
Authored by Alexander Kornbrust | Site red-database-security.com

The package SYS.KUPV$FT contains 3 SQL injection vulnerabilities in the functions ATTACH_JOB, OPEN_JOB, HAS_PRIVS. Oracle fixed these vulnerabilities with the package dbms_assert.

tags | advisory, vulnerability, sql injection
SHA-256 | cacfccadb67c767daee94524725fa95624e17dcb4d30045bcd1abbb1c25e6f85
oracle_tde_wallet_password.txt
Posted Jan 25, 2006
Authored by Alexander Kornbrust | Site red-database-security.com

The event 10053 is storing the masterkey of Oracle Transparent Data Encryption unencrypted in a trace-file. A skilled attacker or non-security DBA could set this special event to get the plaintext masterkey for the TDE encryption.

tags | advisory
SHA-256 | f4ca69910f6b6bd84af219a014b2bd03ffa45c23b0ba4521dcb398e9865c28a3
oracle_reports_read_any_file.txt
Posted Jan 25, 2006
Authored by Alexander Kornbrust | Site red-database-security.com

The Oracle Reports parameter desformat can read any file by using an absolute or relative file name. Parts of the file content are displayed in the Reports error message.

tags | advisory
SHA-256 | 71bda64001af5d5de9c3ae98cca97149f55cf7d9152db5019ba1564dcdd1c929
oracle_reports_overwrite_any_file.txt
Posted Jan 25, 2006
Authored by Alexander Kornbrust | Site red-database-security.com

By specifing a special value for the parameter desname Oracle Reports can overwrite any file on the application server. On Windows systems an attacker can overwrite any files (e.g. boot.ini) on the application server. On UNIX system an attacker can overwrite all files (e.g. opmn.xml) which belongs to the Oracle Application Server user. This attack can be done with a simple URL.

tags | advisory
systems | windows, unix
SHA-256 | 100bcb12928b2140f513bf2498d97f32bac11ba0f7d933420a1441a525169dcd
Page 1 of 2
Back12Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close