Top 10 Database. Misconfigurations. mtrinidad@appsecinc.com



Similar documents
Database Security and Auditing: Leading Practices. Rob Barnes Director, Enterprise Auditing Solutions Application Security, Inc.

Database Auditing: Best Practices. Rob Barnes, CISA Director of Security, Risk and Compliance Operations

Database Security & Auditing

Anatomy of a Database Attack

Hacking databases for owning your data. Cesar Cerrudo Esteban Martinez Fayo Argeniss (

Detecting and Stopping Cyber Attacks Against Oracle Databases June 25, 2015

Oracle Database Security Myths

Hacking Database for Owning your Data

Oracle Security Auditing

Oracle Security Auditing

Securing Database Servers. Database security for enterprise information systems and security professionals

Security Awareness For Server Administrators. State of Illinois Central Management Services Security and Compliance Solutions

Thick Client Application Security

How to Audit the Top Ten E-Business Suite Security Risks

Defending the Database Techniques and best practices

Microsoft SQL Server Security Best Practices

Hack Your SQL Server Database Before the Hackers Do

MySQL Security: Best Practices

Manipulating Microsoft SQL Server Using SQL Injection

Discovering passwords in the memory

Implementing Database Security and Auditing

Security Solution Architecture for VDI

Guarding Against SQL Server Attacks: Hacking, cracking, and protection techniques.

Introduction to IT Security

Passing PCI Compliance How to Address the Application Security Mandates

The Need for Real-Time Database Monitoring, Auditing and Intrusion Prevention

Web Application Penetration Testing

Security and Control Issues within Relational Databases

Barracuda Web Site Firewall Ensures PCI DSS Compliance

Database Assessment. Vulnerability Assessment Course

Top Ten Database Security Threats

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

McAfee Database Security. Dan Sarel, VP Database Security Products

Common Cyber Threats. Common cyber threats include:

Columbia University Web Security Standards and Practices. Objective and Scope

Secure Web Applications. The front line defense

Real World Healthcare Security Exposures. Brian Selfridge, Partner, Meditology Services

What is Web Security? Motivation

Top Ten Fraud Risks in the Oracle E Business Suite

3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management

Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet

Global Partner Management Notice

Penetration Testing: Advanced Oracle Exploitation Page 1

Database Security Guide

Where every interaction matters.

NNT CIS Microsoft SQL Server 2008R2 Database Engine Level 1 Benchmark Report 0514a

Need for Database Security. Whitepaper

How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering

Hunting flaws in Microsoft SQL Server

Database Security SQL Server 2012

Locking down a Hitachi ID Suite server

Securing SharePoint 101. Rob Rachwald Imperva

Guardium Change Auditing System (CAS)

Protecting Sensitive Data Reducing Risk with Oracle Database Security

A Decision Maker s Guide to Securing an IT Infrastructure

Device Hardening, Vulnerability Remediation and Mitigation for Security Compliance

Protecting Your Organisation from Targeted Cyber Intrusion

Host/Platform Security. Module 11

What? Me, Worry? I've Already Been Hacked. Haven't You?

Rational AppScan & Ounce Products

The Top Web Application Attacks: Are you vulnerable?

Penetration Testing Report Client: Business Solutions June 15 th 2015

Making Database Security an IT Security Priority

Oracle Database Security. Nathan Aaron ICTN 4040 Spring 2006

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Virtualization System Security

Data Breaches and Web Servers: The Giant Sucking Sound

Windows Remote Access

Server Security. Contents. Is Rumpus Secure? 2. Use Care When Creating User Accounts 2. Managing Passwords 3. Watch Out For Aliases 4

Network Security Audit. Vulnerability Assessment (VA)

1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information

GUIDE TO SYBASE SECURITY

MySQL Security for Security Audits

Data Privacy: The High Cost of Unprotected Sensitive Data 6 Step Data Privacy Protection Plan

Guidelines for Website Security and Security Counter Measures for e-e Governance Project

SECURITY TRENDS & VULNERABILITIES REVIEW 2015

Data-Centric Security vs. Database-Level Security

<Insert Picture Here> Oracle Database Vault

Internal Penetration Test

SQL Injection 2.0: Bigger, Badder, Faster and More Dangerous Than Ever. Dana Tamir, Product Marketing Manager, Imperva

Simple Steps to Securing Your SSL VPN

Nixu SNS Security White Paper May 2007 Version 1.2

Hedgehog: Host-Based Database Activity Monitoring & Prevention

Web Application Hacking (Penetration Testing) 5-day Hands-On Course

Oracle E-Business Suite APPS, SYSADMIN, and oracle Securing Generic Privileged Accounts. Stephen Kost Chief Technology Officer Integrigy Corporation

OWASP Top Ten Backdoors

Lotus Domino Security

Cracking the Perimeter via Web Application Hacking. Zach Grace, CISSP, CEH January 17, Mega Conference

Web Application Security. Radovan Gibala Senior Field Systems Engineer F5 Networks

Transcription:

Top 10 Database Vulnerabilities and Misconfigurations Mark Trinidad mtrinidad@appsecinc.com

Some Newsworthy Breaches From 2011 2

In 2012.. Hackers carry 2011 momentum in 2012 Data theft, hacktivism, espionage Databases continue to be the primary target Same old attack vectors continue to yield success SQL injection here to stay? New attacks emerge Costs associated with data breaches continues to rise 3

Database Risks for 2012 Organizations have long focused their security efforts on the perimeter and endpoints This approach has left the data center highly vulnerable to anyone who can gain access via: 1. SQL Injection 2. Spear Phishing 3. Malware / Drive by downloads 4. Advanced Persistent Threats 5. Insider Attacks / Mistakes 6. Social Engineering 4

Data Breach Costs Are On The Rise $214 Over 535 million DBMS records have $204 $202 been compromised since 2008 $197 Cost per record estimated at $214- $318 for 2010 Annual losses valued at over $388 Billion $7.2 Million is the average cost of a data breach $181 2006 2007 2008 2009 2010 Cost Per Exposed Record Sources: Ponemon Institute, Symantic/Norton, Verizon Business Data Breach Report 5

Database Risks for 2012 Full of Holes Team SHATTER and others keep finding high risk vulnerabilities for database vendors to patch Exploit scripts posted to the web within hours of every patch release Fully patched but misconfigured databases are another easy target Database attacks bypass traditional network and host intrusion prevention mechanisms Public exploit code + slow patch cycle = High risk DBMS exposure 6

Already in 2012 24 Million Accounts 2 Fixes (only 5 in Oct 2011) 7

Top 10 DB Vulnerabilities and Misconfigurations 8

DB1: Default and Weak Passwords Default accounts are never good Not only DBMS have own default accounts, but applications install them too Weak passwords can be cracked Just google <database type> password cracker dozens of them out there Names, places, dictionary words make poor passwords Rainbow tables make anything under 7 or 8 characters weak Database login activity seldom monitored If you re not watching, an attacker can guess passwords all day 9

Default Account Examples User: system / Password: manager User: sys / Password: change_on_install User: scott / Password: tiger User: SA / Password: null User: db2admin / Password: db2admin User: db2as / Password: ibmdb2 User: SA / Password: null User: root / Password: null User: admin / Password: admin User: myusername / Password: mypassword User/Password the Same: DATABASE SECURITY DBSNMP NOT MY PROBLEM 10

Top 10 DB Vulnerabilities and Misconfigurations 11

DB2: SQL Injection in the DBMS Same concept as at Web App Specific functions in the DBMS are vulnerable to SQL injection Patching is needed for the fix Since the weaknesses are in the DBMS itself, vendor patches are required to remediate Typically takes 6+ months to patch a database 12

Exploiting SQL Injection Attack Target: Oracle 11g Privilege Level: Any Login with CREATE PROCEDURE Outcome: Access to all Database Data! Attacker can run any SQL as WMSYS Vulnerabilities Exploited: Privilege Escalation via SQL Injection in [WM]SYS.LT.ROLLBACKWORKSPACE 13

14

15

16

Top 10 DB Vulnerabilities and Misconfigurations 17

DB3: Excessive User & Group Privileges Theory of least privilege Great in theory; hard in practice Entitlements hard to manage Users can gain access by way of a role that is granted another role that is granted another role Often default database privilege grants are excessive and dangerous 18

How Did the User Get The Privilege? User Role Role Role Role Role 19

Exploiting Excessive Privileges Attack Target: Oracle 11g Release 1 Privilege Level: Anyone with CREATE SESSION privilege Outcome: Gain DBA access & complete OS control Vulnerabilities Exploited: Default PUBLIC privilege to execute DBMS_JVM_EXP_PERMS.IMPORT_JVM_PER PERMS PER MS 20

No users have ALL FILES - full OS access Attempt to execute OS command fails 21

Setup the JVM access control policy The attack in action. PUBLIC can import JVM permissions! 22

USER1 has full OS access OS commands run successfully New OS file created by our exploit 23

Freely Available Exploit Code! 24

Top 10 DB Vulnerabilities and Misconfigurations 25

DB4: Unnecessary Enabled DBMS Features Minimize Attack Surface Attackers will only have more to use against you Powerful Features are Good and Bad Integrated Java and other extensible languages Various levels of OS access available 26

Minimize Attack Surface Java UTL_FILE xp_cmdshell CREATE _ NOT _ FENCED (allows logins to create SPs) OLEDB Ad Hoc Query OPENROWSET OPENDATASOURCE xp_cmdshell Permissions on User Table (mysql.user) 27

Top 10 DB Vulnerabilities and Misconfigurations 28

DB5: Broken Configuration Management Configuration Option Overload Beginning Name the instance, choose the data storage location Now Advanced feature sets, add-on modules, specific security settings, etc. What s the right configuration? 1 st What is our current configuration? 2 nd What should be our configuration? 29

Misconfigurations Are Potential Threats Oracle Configuration Management (OCM) stores configuration data about sysaudits table If properly hostnames, usernames, datafile configured audit records can be lost locations, etc. TRUST_ALLCLNTS configuration parameter If set to default (which is YES) all clients attempting to connect will be considered trusted Default TCP Ports 1433 and 1434 30

Top 10 DB Vulnerabilities and Misconfigurations 31

DB6: Buffer Overflows Crash or Exploit Simple: crash the server Advanced: load and run malicious code Only a vendor patch fixes the issue Like a SQL Injection vulnerability Need vendor fix 32

Example: Attacking DB2: Denial of Service Attack Target: IBM DB2 LUW 9.1 Fix Pack 8 Privilege Level: Any database user Outcome: Crash database server Vulnerabilities Exploited: Heap buffer overflow in built-in scalar function REPEAT Patched by Database Vendor: IBM DB2 LUW 9.1 Fix Pack 9 33

Connect to the database Run the exploit. No privileges needed! 34

No more database. 35

Freely Available Exploit Code 36

Top 10 DB Vulnerabilities and Misconfigurations 37

DB7: Privilege Escalation I am now DBA Vulnerabilities can lead to low- privileged users becoming DBA Only a vendor patch fixes the issue Risk management when considering patch rollout 38

Exploiting Privilege Escalation Attack Target: Oracle11g Release 2 Pi Privilege il Level: CREATE PROCEDURE and EXEC on MDSYS.RESET_INPROG_INDEX Outcome: Full control of the database (assume DBA role) Vulnerabilities Exploited: Privilege escalation in MDSYS.RESET_INPROG_INDEX Patched by Database Vendor: Oracle January 2011 CPU 39

The Attack Step by Step 1. Setup a) Create procedure myproc containing code to grant my account DBA b) Create function myfn containing code to create a trigger in the system schema 2. Exploit a) Exploit the vulnerability, causing MDSYS to run myfn. Creates the trigger. 3. Reap Rewards a) Use PUBLIC privileges to run a SQL statement that causes the trigger to fire. System runs the trigger, which calls myproc which grants my account DBA. 40

Create a new user (user1) and grant privileges. 41

Setup step 1: Create attack code (myproc) to grant DBA privileges to user1 42

Setup Step 2: Create a function (myfn) that creates an evil trigger that calls the attack code (myproc) 43

Run the exploit. Causes MDSYS to run myfn and create the evil trigger. Insert statement causes the evil trigger to run myproc and grants DBA 44

Attacker is now DBA 45

Google Told Me All About It.. 46

Top 10 DB Vulnerabilities and Misconfigurations 47

DB8: DoS Remember the SQL Slammer Worm? 75,000 victims in 10 minutes Microsoft had the patch 6 months prior Again, patch management for DBMS is crucial 48

Exploiting Denial of Service Attack Target: IBM DB2 LUW 9.7 Fix Pack 1 Privilege Level: Anyone on the network Outcome: No access to DB2 database Vulnerabilities Exploited: Denial of Service in the Tivoli DB2 monitoring agent Patched by Database Vendor: IBM DB2 LUW 9.7 Fix Pack 2 49

DB2 Monitoring Agent has crashed. Run the exploit. No database login needed! 50

Attacking DB2: Denial of Service Outcome: DB2 9.7 Database is unavailable Vulnerabilities Exploited: DoS in the Tivoli DB2 monitoring agent How Did We Do It? Freely available exploit code Google: KUDDB2 remote denial of service 51

Top 10 DB Vulnerabilities and Misconfigurations 52

DB9: Unpatched Database Vulnerable the day the patch is released Exploit/POC code emerges quickly What s the difference compared to a zero-day vulnerabilities? What do we patch first? Citi Critical lbusiness systems??low risk systems? 53

Top 10 DB Vulnerabilities and Misconfigurations 54

DB10: Unencrypted Data At Rest and In Motion Data at Rest File system encryption Transparent Data Encryption (TDE) http://www.teamshatter.com/topics/general/team-shatterexclusive/encrypting-data-at-rest/ Data In Motion SSL Oracle ASO Kerberos http://www.teamshatter.com/topics/general/team-shatterexclusive/network-encryption-in-modern-relationaldatabase-management-systems/ 55

Top 10 DB Vulnerabilities and Misconfigurations 56

DB11: Not Doing Anything Reliance on Perimeter Protection Only Does Not Work Sony, Epsilon etc. Who s responsible for DB Security? Who are the stakeholders? DBA? Security? 57

Database Security Tips for 2012 1. Devise a Database Security Plan 2. Locate Sensitive e Information 3. Minimize Attack Surface 4. Fix Default, Blank and Weak Passwords 5. Regularly Patch Databases 6. Implement Least Privileges 7. Encrypt Sensitive Data in Rest and in Motion 8. Train and Enforce Corporate Best Practices 58

Database Security Tips for 2012 Devise a Database Security Plan Start with an established DBMS checklist DISA STIG is an excellent starting point DISA publishes detailed guidelines on how to secure and configure MS SQL server and Oracle Customize to meet your orgs needs. There may be industry regulations to follow PCI, SOX, HIPAA Once a DBMS security policy is established, build a roll-out out plan Pick one or two of the highest priority issues to remediate first As you progress, layer on additional checks and tests 59

Database Security Tips for 2012 Locate Sensitive Information Determine where all sensitive info resides Secure those databases first Minimize Attack Surface The DBMS ships with many features that are not used Some of these features have functionality that render a DBMS vulnerable to attack Where possible, disable unused DBMS features 60

Database Security Tips for 2012 Fix Default, Blank and Weak Passwords Ensure all databases require complex passwords Eliminate default, blank and weak passwords Use different passwords for each system External authentication systems can be a great option Regularly Patch Databases Critical patches insure that vulnerabilities are remediated on a regular basis Patching in conjunction with auditing and monitoring increases DBMS protection 61

Database Security Tips for 2012 Implement Least Privileges Ensure employees only have access to the sensitive data required to do their jobs Map job functions to privileges on IT assets Never assign privileges il to guest accounts or PUBLIC Untangle the web of user entitlements Encrypt Sensitive Data at Rest and in Motion Never er store sensitive e data in clear text t in a DBMS where any DBA/IT staff can access it Ensure the data is encrypted and not allowed to travel unencrypted on the network 62

Database Security Tips for 2012 Train and Enforce Corporate Security Best Practices Ensure all employees are aware of the orgs. security best practices Create a training i program and consistently reinforce policy Extend critical protections at the network and application layer to the DBMS Perform regular DBMS audits, pen tests and misconfiguration checks Activity monitoring to ensure sensitive data is not downloaded or transferred 63

Last Thoughts Attackers are targeting the data center, your defenses should be focused there Most breaches in 2011 were simple attacks that exploited common flaws or the result of human error/failure Almost all were avoidable through simple controls In 2012, improve security AND improve education (re-educate) security and non- security professionals 64

References Team SHATTER Top 10 Database Vulnerabilities Book Security Heuristics of Application Testing Technology for Enterprise Research http://www.teamshatter.com http://www.teamshatter.com/topics/general/team-shatterexclusive/top-10-database-vulnerabilities-and-misconfigurations/ Practical Oracle Security By Josh Shaul CTO, Application Security, Inc. Mark Trinidad Sr. Product Manager Application Security, Inc. mtrinidad@appsecinc.com +1-212-912-4100 blog.appsecinc.com www.teamshatter.com 65