1521 - ORACLE_DB
Overview
Oracle Database (commonly referred to as Oracle RDBMS or simply as Oracle) is a multi-model database management system produced and marketed by Oracle Corporation.
The latest release version is Oracle Database 18c (February 2018), but many 10g and 11g are still in use.
SID vs Service Name
To connect to an Oracle database a SID or a Service Name is required. The SID is an unique name of the instance (eg the oracle process running on the server), while the Service Name is an alias to one or multiples instances.
The main purpose of this system is to manage an unique Service Name for multiples instances in a cluster of servers. Multiple services names can also be specified for a same SID in order to distinguish among different uses of the same database.
Oracle client installation
Download the last version of the Oracle Instant Client from the official Oracle website. As of December 2018, the last version is 18.3.0.0.0 and is backwards compatible with Oracle Database 11.2 or later.
The following packages are required for some of the techniques and tools presented in the present note:
2. Unzip the packages into a single directory such as /opt/oracle
Prior to version 18.3, create the appropriate links for the version of Instant Client. For example:
Install the libaio package. This is called libaio1 on some Linux distributions.
Configure the needed environment variables by adding the following definition to the appropriate configuration file (~/.bashrc, ~/.zshrc, etc.):
Network scan
Nmap can be used to scan the network for exposed Oracle databases. Note that while the default port for an Oracle database instance is 1521, it is common to find multiples instances on a server, running on various ports.
TNS listener version
Nmap and the Metasploit module auxiliary/scanner/oracle/tnslsnr_version can be used to retrieve the version of the TNS listener in use:
SID and Service Name retrieval
The SID or Service Name of the database must be specified when trying to authenticate to an Oracle database.
On some older version of TNS listeners, SID and Service Name can be directly enumerated. Some third parties components may also be used to enumerate SID and Service Name. A vulnerable web application or an access to the file system may be leveraged to retrieve database SID or Service Name.
If none of the techniques described above apply, the TNS listener SID must be brute forced.
The Oscanner tool can be used on Linux to conduct basic SID enumeration as well as default / common credentials brute forcing on retrieved SID:
More exhaustive SID retrieval techniques and tools:
Component | Tool(s) | Description |
---|---|---|
TNS < Oracle 9.2.0.8 |
| Direct query to the unprotected listener to enumerate SID. |
Oracle Enterprise Manager Control Default port 1158 |
| Access to the /em/console page of the manager may contain a login form with the database Service Name value. |
Oracle XML DB (XDB) Default port 8080 |
| If an Oracle XML DB (XDB) service is exposed on the server and credentials could be obtained (default are scott:tiger before Oracle 12.1.0.2), make authenticated request to retrieve the SID from the Oracle XML DB httpd server. |
Oracle Application Server Default port 5560 |
| The default servlet Spy may reveal a Service Name value. |
* |
| SID bruteforce if others methods are not available. Metasploit include a list of default / common SID. The hostname of the server, and variations of the hostname, should be tried as well. |
SAP environment |
| Multiple ways exist to enumerate an Oracle Database SID or Service Name integrated to a SAP environment. The SAP Web Application Server or the SAP RFC endpoint may leak SID or Service Name. Moreover, as Oracle SID integrated in a SAP environment are limited to Latin symbols and must be 3 or less symbols in length, a limited brute force can be conducted. |
Vulnerable Web application | Web stack trace error messages | SQL error messages from invalid queries using the Web application may leak the database SID or Service Name. |
File system access | Web application LFI or directory listing FTP or SMB access ... | An access to the file system may be leveraged to retrive the Oracle service configuration file tnsnames.ora stored in the $ORACLE-home/NETWORK/admin folder. |
Authentication brute force
The Oscanner tool can be used to conduct a default / common credentials brute force:
The oracle_login_password.txt from the fuzzdb project is a combo file of default / common usernames and passwords.
The patator tool can be used to brute force credentials on the service:
Error messages may be returned if the credentials tested are valid:
Database privilege escalation
Multiples Metasploit modules can be used to exploit Oracle vulnerabilities to elevate privileges from a low privileged user to SYSDBA on outdated Oracle Database Server.
Query the database
The XXX CLI tool can be used to make queries to the database:
The DBeaver GUI tool can be used to simply access the database content without knowing the proper MSSQL syntax.
OS access and commands execution
Last updated