7.5
CVSSv2

CVE-2006-0586

Published: 08/02/2006 Updated: 07/11/2023
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 765
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Multiple SQL injection vulnerabilities in Oracle 10g Release 1 before CPU Jan 2006 allow remote malicious users to execute arbitrary SQL commands via multiple parameters in (1) ATTACH_JOB, (2) HAS_PRIVS, and (3) OPEN_JOB functions in the SYS.KUPV$FT package; and (4) UPDATE_JOB, (5) ACTIVE_JOB, (6) ATTACH_POSSIBLE, (7) ATTACH_TO_JOB, (8) CREATE_NEW_JOB, (9) DELETE_JOB, (10) DELETE_MASTER_TABLE, (11) DETACH_JOB, (12) GET_JOB_INFO, (13) GET_JOB_QUEUES, (14) GET_SOLE_JOBNAME, (15) MASTER_TBL_LOCK, and (16) VALID_HANDLE functions in the SYS.KUPV$FT_INT package. NOTE: due to the lack of relevant details from the Oracle advisory, a separate CVE is being created since it cannot be conclusively proven that these issues has been addressed by Oracle. It is unclear which, if any, Oracle Vuln# identifiers apply to these issues.

Vulnerable Product Search on Vulmon Subscribe to Product

oracle oracle10g personal_10.1.0.3

oracle application server 10.1.2.0.2

oracle oracle10g standard_10.1.0.3.1

oracle application server 10.1.2.1.0

oracle application server 10.1.0.3

oracle oracle10g enterprise_10.1.0.4

oracle oracle10g enterprise_10.1.0.3

oracle oracle10g enterprise_10.1.0.3.1

oracle oracle10g standard_10.1.0.2

oracle oracle10g standard_10.1.0.4

oracle application server 10.1.2.0.1

oracle oracle10g personal_10.1.0.2

oracle oracle10g standard_10.1.0.3

oracle oracle10g standard_10.1.0.5

oracle oracle10g personal_10.10.3.1

oracle application server 10.1.0.4

oracle oracle10g enterprise_10.1.0.2

oracle application server 10.1.0.2

oracle oracle10g standard_10.1.0.4.2

oracle application server 10.1.0.3.1

oracle application server 10.1.2

oracle oracle10g personal_10.1.0.4

Exploits

#!/usr/bin/perl # # Remote Oracle KUPV$FTATTACH_JOB exploit (10g) # # Grant or revoke dba permission to unprivileged user # # Tested on "Oracle Database 10g Enterprise Edition Release 101030" # # REF: wwwsecurityfocuscom/bid/16294 # # AUTHOR: Andrea "bunker" Purificato # rawlabmindcreationscom # # DATE: ...
#!/usr/bin/perl # # Remote Oracle KUPV$FTATTACH_JOB exploit (10g) # - Version 2 - New "evil cursor injection" tip! # - No "create procedure" privileg needed! # - See: wwwdatabasesecuritycom/ (Cursor Injection) # # Grant or revoke dba permission to unprivileged user # # Tested on "Oracle Database 10g Enterprise Edition Release 10103 ...
/** * Exploit for Oracle10g R1 and R2 prior to CPU Oct 2006 * Joxean Koret <joxeankoret@yahooes> * Privileges needed: * * - EXECUTE_CATALOG_ROLE * - CREATE PROCEDURE * */ select * from user_role_privs ; CREATE OR REPLACE FUNCTION F1 RETURN NUMBER AUTHID CURRENT_USER IS PRAGMA AUTONOMOUS_TRANSACTION; BEGIN EXECUTE IMMEDIATE 'GRANT DBA TO TES ...