In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-01-15 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >
Share
Shulou(Shulou.com)05/31 Report--
The editor today takes you to understand how to use SAP ASE security vulnerabilities to invade the database server. The knowledge points in the article are introduced in great detail. Friends who feel helpful can browse the content of the article with the editor, hoping to help more friends who want to solve this problem to find the answer to the problem. Let's follow the editor to learn more about "how to use SAP ASE security vulnerabilities to invade the database server".
There are a series of new serious vulnerabilities in SAP's Sybase database software. Attackers without privileges can take full control of the target database and even the underlying operating system in some scenarios.
The six vulnerabilities discovered by Trustware, a network security company, exist in Sybase Adaptive Server Enterprise (ASE), a relational database management software for transaction-based applications.
The cyber security company said the vulnerabilities specifically affected the operating system and the entire platform and were discovered during a security test of the product.
CVE-2020-6248 is the most serious vulnerability, with a CVSS score of 9.1, which can be exploited by an attacker to execute malicious commands during a database backup.
"there is no security check for overwriting critical configuration files during database backup operations, which means that anyone who can run DUMP commands, such as database owners, can perform very dangerous tasks," Trustware researchers said in the report.
The second vulnerability (CVE-2020-6252) affects ASE Cockpit, a web-based administrative console for monitoring the status and availability of ASE servers. This vulnerability affects only the ASE 16 Windows version and can be exploited by local attackers to obtain user account credentials, overwrite operating system files, and even execute malicious code with LocalSystem privileges.
Two other vulnerabilities, CVE-2020-6241 and CVE-2020-6253, allow authenticated attackers to execute specially crafted database query statements via SQL injection to elevate privileges, allowing users without special privileges to gain database administrator access.
In the utilization scenario of CVE-2020-6253, an attacker can first control an ASE database dump file and modify the file with malicious data before loading it to the target ASE server.
When executing a stored procedure ("dummy_esp"), a fifth vulnerability (CVE-2020-6243) occurs when the server fails to perform the necessary checks on an authenticated user. The vulnerability allows Windows users to run arbitrary code and delete data on the ASE server.
Finally, CVE-2020-6250 is an information disclosure vulnerability that affects the ASE Linux/UNIX version, which can be used by authenticated attackers to read the system administrator password from the installation log.
"these logs are only readable by SAP accounts, but combined with other vulnerabilities, attackers can gain access to the file system and completely invade SAP ASE," the researchers pointed out. "
After Trustwave responsibly disclosed its discovery of Sybase, SAP pushed a patch last month to fix these security vulnerabilities.
According to Trustwave, "organizations often store the most critical data in databases, which in turn are often exposed or publicly exposed in an untrusted environment."
"so it is important to quickly fix and test these vulnerabilities because they threaten not only the data in the database, but also the entire host running the database."
The latest version of ASE has fixed these security vulnerabilities, and it is recommended that users upgrade to this version as soon as possible.
Thank you for reading, the above is "how to use SAP ASE security vulnerabilities to invade the database server" all the content, learn friends hurry up to operate it. I believe that the editor will certainly bring you better quality articles. Thank you for your support to the website!
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.