Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet



Similar documents
AppDefend Application Firewall Overview

Attack Vector Detail Report Atlassian

Web Application Report

Security Implications of Oracle Product Desupport April 23, 2015

New Security Features in Oracle E-Business Suite 12.2

Where every interaction matters.

Web application vulnerability statistics for

Integrigy Corporate Overview

Oracle Database Security Myths

Adobe Systems Incorporated

Web App Security Audit Services

How to Audit the Top Ten E-Business Suite Security Risks

What is Web Security? Motivation

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

Web Application Security. Vulnerabilities, Weakness and Countermeasures. Massimo Cotelli CISSP. Secure

2,000 Websites Later Which Web Programming Languages are Most Secure?

Encrypting Sensitive Data in Oracle E-Business Suite

Web Application Security Assessment and Vulnerability Mitigation Tests

Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Chapter 1 Web Application (In)security 1

Last update: February 23, 2004

05.0 Application Development

FINAL DoIT v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES

ArcGIS Server Security Threats & Best Practices David Cordes Michael Young

Cloud Security:Threats & Mitgations

DFW INTERNATIONAL AIRPORT STANDARD OPERATING PROCEDURE (SOP)

How To Protect A Web Application From Attack From A Trusted Environment

WHITE PAPER FORTIWEB WEB APPLICATION FIREWALL. Ensuring Compliance for PCI DSS 6.5 and 6.6

Credit Cards and Oracle E-Business Suite Security and PCI Compliance Issues

Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified

Basic & Advanced Administration for Citrix NetScaler 9.2

Advanced Administration for Citrix NetScaler 9.0 Platinum Edition

WHITE PAPER. FortiWeb Web Application Firewall Ensuring Compliance for PCI DSS 6.5 and 6.6

AppSentry Application and Database Security Auditing

WEB APPLICATION FIREWALLS: DO WE NEED THEM?

Web application security

Web Application Penetration Testing

Secure Web Application Coding Team Introductory Meeting December 1, :00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda

F5 and Microsoft Exchange Security Solutions

Sitefinity Security and Best Practices

(WAPT) Web Application Penetration Testing

Testing the OWASP Top 10 Security Issues

Implementation of Web Application Firewall

Web Application Vulnerability Testing with Nessus

OWASP Top Ten Tools and Tactics

Learn Ethical Hacking, Become a Pentester

Web Engineering Web Application Security Issues

We protect you applications! No, you don t. Digicomp Hacking Day 2013 May 16 th 2013

The Top Web Application Attacks: Are you vulnerable?

Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008

Cross-Site Scripting

OWASP and OWASP Top 10 (2007 Update) OWASP. The OWASP Foundation. Dave Wichers. The OWASP Foundation. OWASP Conferences Chair

mission critical applications mission critical security Internal Auditor Primer: Oracle E-Business Suite Security Risks Primer

Mingyu Web Application Firewall (DAS- WAF) All transparent deployment for Web application gateway

How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering

3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management

Reducing Application Vulnerabilities by Security Engineering

MatriXay WEB Application Vulnerability Scanner V Overview. (DAS- WEBScan ) The best WEB application assessment tool

Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group

Web Application Hacking (Penetration Testing) 5-day Hands-On Course

Criteria for web application security check. Version

Executive Summary On IronWASP

FINAL DoIT v.8 APPLICATION SECURITY PROCEDURE

Managing Oracle E-Business Suite Security

Information Technology Policy

SAST, DAST and Vulnerability Assessments, = 4

Web Application Security. Radovan Gibala Senior Field Systems Engineer F5 Networks

Magento Security and Vulnerabilities. Roman Stepanov

IT Security Conference Romandie - Barracuda Securely Publishing Web Application a field dedicated to expert only?

Data Breaches and Web Servers: The Giant Sucking Sound

locuz.com Professional Services Security Audit Services

Web Application Security

WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY

IJMIE Volume 2, Issue 9 ISSN:

Barracuda Web Site Firewall Ensures PCI DSS Compliance

Top Ten Web Application Vulnerabilities in J2EE. Vincent Partington and Eelco Klaver Xebia

Intrusion detection for web applications

THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS

Thick Client Application Security

Strategic Information Security. Attacking and Defending Web Services

Detecting and Stopping Cyber Attacks Against Oracle Databases June 25, 2015

Network Test Labs (NTL) Software Testing Services for igaming

Passing PCI Compliance How to Address the Application Security Mandates

Developing Value from Oracle s Audit Vault For Auditors and IT Security Professionals

How To Fix A Web Application Security Vulnerability

TECHNICAL AUDITS FOR CERTIFYING EUROPEAN CITIZEN COLLECTION SYSTEMS

Essential IT Security Testing

STOPPING LAYER 7 ATTACKS with F5 ASM. Sven Müller Security Solution Architect

NSFOCUS Web Application Firewall White Paper

Certified Secure Web Application Security Test Checklist

Arrow ECS University 2015 Radware Hybrid Cloud WAF Service. 9 Ottobre 2015

elearning for Secure Application Development

From the Bottom to the Top: The Evolution of Application Monitoring

Cloud Security Framework (CSF): Gap Analysis & Roadmap

Securing Oracle E-Business Suite in the Cloud

Transcription:

Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet March 8, 2012 Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director of Business Development Integrigy Corporation

Agenda Oracle EBS Web Security Unknown Vulnerabilities Q&A 1 2 3 4 5 Unpatched Security Vulnerabilities Encryption

About Integrigy ERP Applications Oracle E-Business Suite Databases Oracle and Microsoft SQL Server Products Services AppSentry ERP Application and Database Security Auditing Tool AppDefend Enterprise Application Firewall for the Oracle E-Business Suite Validates Security Protects Oracle EBS Verify Security Ensure Compliance Build Security Security Assessments ERP, Database, Sensitive Data, Pen Testing Compliance Assistance SOX, PCI, HIPAA Security Design Services Auditing, Encryption, DMZ You

Integrigy Published Security Alerts Security Alert Versions Security Vulnerabilities Critical Patch Update July 2011 11.5.10 12.1.x Oracle E-Business Suite security configuration issue Critical Patch Update October 2010 11.5.10 12.1.x 2 Oracle E-Business Suite security weaknesses Critical Patch Update July 2008 Critical Patch Update April 2008 Critical Patch Update July 2007 Oracle 11g 11.5.8 12.0.x 12.0.x 11.5.7 11.5.10 12.0.x 11.5.1 11.5.10 2 Issues in Oracle RDBMS Authentication 2 Oracle E-Business Suite vulnerabilities 8 vulnerabilities, SQL injection, XSS, information disclosure, etc. 11 vulnerabilities, SQL injection, XSS, information disclosure, etc. Critical Patch Update October 2005 11.0.x, 11.5.1 11.5.10 Default configuration issues Critical Patch Update July 2005 Critical Patch Update April 2005 Critical Patch Update Jan 2005 Oracle Security Alert #68 11.5.1 11.5.10 11.0.x 11.5.1 11.5.10 11.0.x 11.5.1 11.5.10 11.0.x Oracle 8i, 9i, 10g SQL injection vulnerabilities Information disclosure SQL injection vulnerabilities Information disclosure SQL injection vulnerabilities Buffer overflows Listener information leakage Oracle Security Alert #67 11.0.x, 11.5.1 11.5.8 10 SQL injection vulnerabilities Oracle Security Alert #56 11.0.x, 11.5.1 11.5.8 Buffer overflow in FNDWRR.exe Oracle Security Alert #55 11.5.1 11.5.8 Oracle Security Alert #53 10.7, 11.0.x 11.5.1 11.5.8 Multiple vulnerabilities in AOL/J Setup Test Obtain sensitive information (valid session) No authentication in FNDFS program Retrieve any file from O/S

Agenda Oracle EBS Web Security Unknown Vulnerabilities Q&A 1 2 3 4 5 Unpatched Security Vulnerabilities Encryption

EBS DMZ Architecture Firewall (existing) C Firewall (optional) C Firewall (existing) C Internal Users B 8000 https://supplier.example.com SSL A 443 SSL Reverse Proxy 8000 HTTP EBS External App Server 1521 SQL*Net EBS Database Server 1521 SQL*Net EBS Internal App Server External Users (supplier) A HTTPS/SSL should always be used otherwise passwords and data are sent in the clear. B A reverse proxy server should be implemented such as Apache, Blue Coat, or F5 BIG-IP. Firewall between layers block access between layers except for explicitly defined ports. C

Oracle EBS R12 Web Footprint Oracle Application Server Java Server Pages (JSP) 8,000 JSP pages Client Browser http https Apache OC4J OA Framework 11,600 pages Core Servlets 30 servlet classes sqlnet APPS Database Web Services Servlets 70 servlet classes Oracle Forms 4,000 forms Oracle EBS installs all modules (250+) and all web pages for every application server All web pages access the database using the APPS database account

Oracle EBS DMZ MOS Notes Deploying Oracle E-Business Suite in a DMZ requires a specific and detailed configuration of the application and application server. All steps in the Oracle provided MOS Note must be followed. 380490.1 Oracle E-Business Suite R12 Configuration in a DMZ 287176.1 DMZ Configuration with Oracle E-Business Suite 11i MOS = My Oracle Support

URL Firewall Oracle EBS DMZ Configuration Oracle R12 Application Server Client Browser https Apache OC4J Java Server Pages (JSP) 8,000 JSP pages 90 OA Framework (OA/RF.jsp) 11,600 pages 250 3 Core Servlets 30 servlet classes Node Trust Level 2 APPS Database Web Services Servlets 70 servlet classes 1 Oracle Forms 4,000 forms Proper DMZ configuration reduces accessible pages and responsibilities to only those required for external access. Reducing the application surface area eliminates possible exploiting of vulnerabilities in non-external modules.

OWASP Top 10 Oracle EBS Mapping Ten top security risks commonly found in web applications listed by level of risk A1: Injection A2: Cross Site Scripting (XSS) A3: Broken Authentication and Session Management A4: Insecure Direct Object References A5: Cross Site Request Forgery (CRSF) A6: Security Misconfiguration A7: Insecure Cryptographic Storage A8: Failure to Restrict URL Access A9: Insufficient Transport Layer Protection A10: Unvalidated Redirects and Forwards High Risk Medium Risk http://www.owasp.org/index.php/top_10 Low Risk

WASC Threat Classification Web Application Security Consortium Comprehensive list of threats to the security of a web site attacks and weaknesses Attacks Abuse of Functionality Brute Force Buffer Overflow Content Spoofing Credential/Session Prediction Cross-Site Scripting Cross-Site Request Forgery Denial of Service Fingerprinting Format String HTTP Response Smuggling HTTP Response Splitting HTTP Request Smuggling HTTP Request Splitting Integer Overflows LDAP Injection Mail Command Injection Null Byte Injection OS Commanding Path Traversal Predictable Resource Location Remote File Inclusion (RFI) Routing Detour Session Fixation SOAP Array Abuse SSI Injection SQL Injection URL Redirector Abuse XPath Injection XML Attribute Blowup XML External Entities XML Entity Expansion XML Injection XQuery Injection Weaknesses Application Misconfiguration Directory Indexing Improper File System Permissions Improper Input Handling Improper Output Handling Information Leakage Insecure Indexing Insufficient Anti-automation Insufficient Authentication Insufficient Authorization Insufficient Password Recovery Insufficient Process Validation Insufficient Session Expiration Insufficient Transport Layer Protection Server Misconfiguration http://www.webappsec.org High Risk * Medium Risk * Low Risk * No Risk

Agenda Oracle EBS Web Security Unknown Vulnerabilities Q&A 1 2 3 4 5 Unpatched Security Vulnerabilities Encryption

SQL Injection Explained Attacker modifies URL with extra SQL http://<server>/pls/vis/fnd_gfm.dispatch? p_path=fnd_help.get/us/fnd/@search');%20f nd_user_pkg.updateuser('operations',%20's EED',%20'welcome1 Oracle EBS executes appends SQL to the SQL statement being executed SQL executed as APPS database account Example changes any application account password This vulnerability was patched as part of Oracle Security Alert #32

Oracle EBS Security Vulnerabilities Oracle E-Business Suite security vulnerabilities fixed between January 2005 and January 2012 232

Oracle EBS Web Vulnerabilities Fixed ~60 SQL Injection in web pages ~70 Cross Site Scripting ~15 Authorization/Authentication ~5 Business Logic Issues

Oracle Critical Patch Updates Oracle releases security patches on a quarterly basis to fix security bugs in all Oracle products Database, App Server, EBS Cumulative Patches Must apply large patch for all modules Upgrades Required May require application upgrades (12.1.5 12.1.6) Includes Dependencies Patches often update more than just the vulnerable file Testing Required Patches must go through testing cycle

Virtual Patching Eliminate risk and exploitation of the security bug by blocking access to the vulnerable code 1. Write your own rules - Web Application Firewall (WAF) - Oracle E-Business Suite modsecurity 2. AppDefend - Integrigy analyzes the Critical Patch Update (CPU) - Delivers pre-defined rules for all CPU web bugs

Agenda Oracle EBS Web Security Unknown Vulnerabilities Q&A 1 2 3 4 5 Unpatched Security Vulnerabilities Encryption

OWASP Top 10 Oracle EBS Mapping Ten top security risks commonly found in web applications listed by level of risk A1: Injection (SQL, HTML, XML, ) A2: Cross Site Scripting (XSS) A3: Broken Authentication and Session Management A4: Insecure Direct Object References A5: Cross Site Request Forgery (CRSF) A6: Security Misconfiguration A7: Insecure Cryptographic Storage A8: Failure to Restrict URL Access A9: Insufficient Transport Layer Protection A10: Unvalidated Redirects and Forwards High Risk Medium Risk http://www.owasp.org/index.php/top_10 Low Risk

Cross Site Scripting (XSS) Illustrated A Attacker enters malicious JavaScript into job application description field to for example automatically approve resume B HR Manager opens job application in Oracle and script executes in browser C Script calls an Oracle EBS URL in a hidden frame to execute some EBS functionality

Cross Site Scripting Sample Attacks <script>alert(0)</script> <img src="x:x" onerror="alert(0)"> <iframe src="javascript:alert(0)"> <object data="javascript:alert(0)"> <isindex type=image src=1 onerror=alert(0)> <img src=x:alert(alt) onerror=eval(src) alt=0> with(document)alert(cookie) eval(document.referrer.slice(10)); (É=[Å=[],µ=!Å+Å][µ[È=-~-~++Å]+({}+Å) [Ç=!!Å+µ,ª=Ç[Å]+Ç[+!Å],Å]+ª])() [µ[å]+µ[å+å]+ç[è]+ª](å) </a onmousemove="alert(1)"> data:text/html,<script>alert(0)</script> %C0%BCscript%C0%BEalert(1)%C0%BC/script%C0%BE <ScRIPT x src=//0x.lv?

Cross Site Scripting References XSS Cheat Sheet http://ha.ckers.org/xss.html WSC Script Mapping Project http://www.webappsec.org/projects/scriptmapping OWASP XSS Reference https://www.owasp.org/index.php/cross-site_scripting

Deep Inspection Analyze all user provided input to identify and block malicious input 1. Oracle E-Business Suite XSS Filter - Limited filter easy to bypass 2. Web Application Firewalls - Static signatures or regular expressions - Too expensive (CPU) to fully parse all inputs 3. AppDefend - Intelligent checking of parameters, user input - Uses best practice libraries OWASP AntiSamy

Agenda Oracle EBS Web Security Unknown Vulnerabilities Q&A 1 2 3 4 5 Unpatched Security Vulnerabilities Encryption

Oracle EBS HTTP Network Traffic POST http://oa.integrigy.com:8010/oa_html/oa.jsp? page=/oracle/apps/fnd/sso/login/webui/mainlo ginpg HTTP/1.1 _AM_TX_ID_FIELD=1wcuM2LWP _FORM=DefaultFormNameKBTL4xsJ usernamefield=sysadmin passwordfield=mypassword SubmitButton%24%24unvalidated=falseI_3t5ZET

Using SSL Encryption Encrypt all end-user traffic externally as well as internally. 1. Implement SSL on Oracle EBS Application Servers - Use Oracle s MOS SSL Notes - Be sure to disable SSLv2 and weak ciphers 2. Use SSL encryption and acceleration on load balancers - Simplifies setup and configuration - Removes load from application servers to load balancer with dedicated SSL encryption hardware

Oracle EBS SSL MOS Notes Enabling SSL for Oracle E-Business Suite in a DMZ requires a complex setup because of certificates. Follow the steps for configuring SSL in the Middle Tier. 376700.1 Enabling SSL in Oracle E- Business Suite Release 12 123718.1 11i: A Guide to Understanding and Implementing SSL for Oracle Applications MOS = My Oracle Support

Another Layer of Security Web Application Firewalls (WAF) are specialized firewalls designed to detect and prevent web application attacks by analyzing the HTTP web requests. Prevents common web application attacks Detects and blocks SQL injection, XSS, and known vulnerabilities in widely used web applications Often implemented as an appliance Dedicated appliance used to protect all web applications in an organization May be required for compliance such as PCI-DSS PCI-DSS 2.0 requirement 6.6 requires use of a WAF or periodic reviews

Web Application Firewall Options Reverse Proxy Server with ModSecurity with OWASP CRS Open-source option on your hardware Load Balancer with WAF WAF, SSL termination features of many load balancers Stand-alone WAF Dedicated, appliance WAF AppDefend Distributed WAF running within application Java stack

Web Application Firewall Shortcomings Must be heavily customized for Oracle EBS Rules, application profiles, and learning must be developed, tuned, and tested by you Unable to block unused Oracle EBS modules Due to the complexity of the Oracle naming and design, very difficult to implement blocking of EBS modules with WAF rules Significant cost, effort, and skill required to deploy WAFs are usually an appliance that must be deployed and the learning curve for configuring and operating an enterprise WAF is steep

Integrigy AppDefend for R12 AppDefend is an enterprise application firewall designed and optimized for the Oracle E-Business Suite R12. Prevents Web Attacks Detects and reacts to SQL Injection, XSS, and known Oracle EBS vulnerabilities Limits EBS Modules More flexibility and capabilities than URL firewall to identify EBS modules Application Logging Enhanced application logging for compliance requirements like PCI-DSS 10.2 Protects Web Services Detects and reacts to attacks against native Oracle EBS web services (SOA, SOAP, REST)

Agenda Oracle EBS Web Security Unknown Vulnerabilities Q&A 1 2 3 4 5 Unpatched Security Vulnerabilities Encryption

Contact Information Stephen Kost Chief Technology Officer Integrigy Corporation web: www.integrigy.com e-mail: info@integrigy.com blog: integrigy.com/oracle-security-blog Copyright 2012 Integrigy Corporation. All rights reserved.