Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

7/21/2008
05:10 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

Oracle Counters SQL-Injection Holes With Update

There were an additional seven patches for PeopleSoft and J.D. Edwards applications, seven for the recently acquired BEA product suite, and six for Oracle E-Business Suite.

Oracle patched 45 security vulnerabilities July 15, and an inspection of the details of that critical patch update show that 11 of the fixes were for the Oracle database system and nine for Oracle Application Server.

There were an additional seven patches for PeopleSoft and J.D. Edwards applications, seven for the recently acquired BEA product suite, and six for Oracle E-Business Suite.

The Oracle Times Ten In-Memory Database system warranted three patches. The remaining patches covered a wide variety of Oracle products.

The information Oracle released with its critical patch update, its quarterly patching method, was, as usual, limited. The key thing Oracle is trying to prevent, said Amichai Shulman, CTO of Imperva, is SQL injection attacks where SQL data access language is substituted for the expected user input on a form or Web application page. Shulman said it was difficult to determine the seriousness of some of the 45 fixes. "They're very sparse on details," he noted.

Imperva is an Israeli firm that makes a Web application firewall. Earlier this year, Imperva discovered a vulnerability and submitted it to Oracle and saw it fixed in the April critical patch update.

Oracle discloses little about the nature of the exploit or what vulnerability it addresses, except to paying customers. "As a matter of policy, Oracle does not disclose detailed information about an exploit condition or results that can be used to conduct a successful exploit," it stated in the July 15 update. Clicking on a link between a critical patch and the information on how to go about it takes a reader to a customers-only technical support log-on site.

That leaves it to individual customers to investigate the patch and see whether it affects them in a critical way, said Shulman.

Some of those included in the latest update might be critical, Shulman said. All 11 database fixes can only be exploited by a user who's been authenticated -- that is, submitted a name and password to the system for identification.

But Shulman said that still leaves the database subject to exploitation by any application user with a legitimate name and password. With authentication, a user may gain the same privilege level as the owner of a stored procedure, the brief programs stored inside the database that perform a particular, frequently used function. With that ownership level, a user could alter the stored procedure to inject SQL that brought back information that the user was illegitimately seeking, Shulman said.

The three patches to the Times Ten In-Memory system were vulnerabilities that could be exploited remotely without a user name or password, he noted.

The appearance of a fix in a critical patch update by no means indicates it will lead to speedy fixes of all installations of the product. As InformationWeek reported earlier this year, an informal poll of Oracle users by the CTO of a security firm revealed about two-thirds don't bother to patch Oracle products.

Slavik Markovich, CTO of database security firm Sentrigo, polled 305 Oracle customers as he spoke at Oracle user group meetings in Reston, Va.; Chicago; Salt Lake City; Buffalo, N.Y.; Los Angeles; and nine other locations. Only 10% of attendees had applied the latest patch, and only 32.5% had applied one of the patches since the CPU program began in 2004. That left more than two-thirds of Oracle installations with unpatched systems.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 10/30/2020
'Act of War' Clause Could Nix Cyber Insurance Payouts
Robert Lemos, Contributing Writer,  10/29/2020
6 Ways Passwords Fail Basic Security Tests
Curtis Franklin Jr., Senior Editor at Dark Reading,  10/28/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How to Measure and Reduce Cybersecurity Risk in Your Organization
In this Tech Digest, we examine the difficult practice of measuring cyber-risk that has long been an elusive target for enterprises. Download it today!
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-5991
PUBLISHED: 2020-10-30
NVIDIA CUDA Toolkit, all versions prior to 11.1.1, contains a vulnerability in the NVJPEG library in which an out-of-bounds read or write operation may lead to code execution, denial of service, or information disclosure.
CVE-2020-15273
PUBLISHED: 2020-10-30
baserCMS before version 4.4.1 is vulnerable to Cross-Site Scripting. The issue affects the following components: Edit feed settings, Edit widget area, Sub site new registration, New category registration. Arbitrary JavaScript may be executed by entering specific characters in the account that can ac...
CVE-2020-15276
PUBLISHED: 2020-10-30
baserCMS before version 4.4.1 is vulnerable to Cross-Site Scripting. Arbitrary JavaScript may be executed by entering a crafted nickname in blog comments. The issue affects the blog comment component. It is fixed in version 4.4.1.
CVE-2020-15277
PUBLISHED: 2020-10-30
baserCMS before version 4.4.1 is affected by Remote Code Execution (RCE). Code may be executed by logging in as a system administrator and uploading an executable script file such as a PHP file. The Edit template component is vulnerable. The issue is fixed in version 4.4.1.
CVE-2020-7373
PUBLISHED: 2020-10-30
vBulletin 5.5.4 through 5.6.2 allows remote command execution via crafted subWidgets data in an ajax/render/widget_tabbedcontainer_tab_panel request. NOTE: this issue exists because of an incomplete fix for CVE-2019-16759. ALSO NOTE: CVE-2020-7373 is a duplicate of CVE-2020-17496. CVE-2020-17496 is ...