Headline
Oracle RMAN Missing Auditing
Proof of concept exploit for Oracle RMAN on Oracle database versions 19c, 18c, 12.2.0.1, and 12.1.0.2 where an RMAN controlfile operation is not adequately logged.
Title: CVE-2021-2207 - RMAN Controlfile Operation Not AuditedProduct: DatabaseManufacturer: OracleAffected Version(s): 12.1.0.2, 12.2.0.1, 18c, 19cTested Version(s): 19cRisk Level: lowScore: 2.3Solution Status: FixedCVE Reference: CVE-2021-2207Author of Advisory: Emad Al-MousaOverview:Audit failure is a security weakness in software product especially if a security audit is in-place to detect a certain operation. Oracle RMAN isa database Recovery Manager utility for backup and restore operations, so any security weakness/vulnerability can be exploited by insider threat orexternal attacker to view confidential data in unauthorized manner.*****************************************Vulnerability Details:oracle database controlfile restore is not logged in unified auditing logs*****************************************Proof of Concept (PoC):In this simulation, unified auditing logs the backup of controlfile successfully while restore operation was not as shown below:rman target /RMAN> backup current controlfile;RMAN> restore controlfile to '/tmp/emad_ctl.ctl';Querying Unified Audit logs:SQL> select audit_type,client_program_name,event_timestamp,rman_operation,rman_object_type,rman_device_type from unified_audit_trail where audit_type like 'RMAN%'' order by event_timestamp desc;control file backup was recorded under RMAN_OBJECT_TYPE column while restore operation was logged, but it was not clear for which database object….in our case its the controlfile !*****************************************References:https://www.oracle.com/security-alerts/cpuapr2021.htmlhttps://databasesecurityninja.wordpress.com/2023/09/01/cve-2021-2207-rman-controlfile-operation-not-audited/
Related news
Vulnerability in the Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u291, 8u281, 11.0.10, 16; Java SE Embedded: 8u281; Oracle GraalVM Enterprise Edition: 19.3.5, 20.3.1.2 and 21.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 5.3 (Integrity impacts). CV...
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 5.7.33 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).