Oracle Training Oracle Support Development Oracle Apps

 
 Home
 E-mail Us
 Oracle Articles


 Oracle Training
 Oracle Tips

 Oracle Forum
 Class Catalog


 Remote DBA
 Oracle Tuning
 Emergency 911
 RAC Support
 Apps Support
 Analysis
 Design
 Implementation
 Oracle Support


 SQL Tuning
 Security

 Oracle UNIX
 Oracle Linux
 Monitoring
 Remote s
upport
 Remote plans
 Remote
services
 Application Server

 Applications
 Oracle Forms
 Oracle Portal
 App Upgrades
 SQL Server
 Oracle Concepts
 Software Support

 Remote S
upport  
 Development  

 Implementation


 Consulting Staff
 Consulting Prices
 Help Wanted!

 


 Oracle Posters
 Oracle Books

 Oracle Scripts
 Ion
 Excel-DB  

Don Burleson Blog 


 

 

 


 

 

 

 


MOSC Hacking likened to Google Hacking

June 1, 2005

In this eWeek article by Lisa Vaas, we see reports of new security vulnerabilities, this time mentioning the Oracle bug database and the Oracle MOSC portal:

Vaas references the super-popular book by Johnny Long "Google Hacking for Penetration Testers", and notes that the newly-exposed Oracle vulnerabilities are related:

MOSC hacking is similar to Google hacking, the use of Google as a hacking tool to uncover information on, for example, vulnerable servers, error messages that reveal too much information, and even passwords. . . .

MOSC hacking is a similar exploit, but it pertains to a private rather than a public domain since it is accessible only to Oracle customers who purchase a support contract and to authorized Oracle support staff, on a need-to-know basis.

While the article is unclear, it appears that MOSC users can issue commands to reveal sensitive information from bug reports and MOSC forum questions:

Kornbrust found that search strings that returned sensitive information included "hacker," "hacking," SQL Injection," "Cross Site Scripting," Buffer Overflow," "denial of service," "crash," "memory leak," "abort," and many more.

What makes the vulnerabilities particularly disturbing, security experts say, is that Oracle has built up such a rich repository in its MOSC forum.

The bad news for Oracle professional is the report that Oracle MOSC has allegedly cut-off access to forum reports of these new security exposures:

Oracle reportedly has blocked access to forum entries listed in RDS' research. Those include, for example, an October 2004 report from an Oracle user in which he or she explained the following bug:

When executing a scheduler job, the user was made SYS!—in other words, the user experienced inappropriately escalated user privileges. According to Kornbrust's research, this report was returned after searching on the term "security bug."

The user report was explicit in how the bug was inadvertently accessed.

This explosive usage of Google API to expose hacking vulnerabilities has led to a new freeware tool called SiteDigger (which requires a free license to use the Google API):

There has been other research into using Google to uncover Oracle exposures:


 

 
 
��
 
 
 
 

 
 
 

 
Oracle performance tuning software 
 
oracle dba poster
Oracle Linux poster
 
 

 

Burleson is the American Team

Note: This Oracle documentation was created as a support and Oracle training reference for use by our DBA performance tuning consulting professionals.  Feel free to ask questions on our Oracle forum.

Verify experience! Anyone considering using the services of an Oracle support expert should independently investigate their credentials and experience, and not rely on advertisements and self-proclaimed expertise. All legitimate Oracle experts publish their Oracle qualifications.

Errata?  Oracle technology is changing and we strive to update our BC Oracle support information.  If you find an error or have a suggestion for improving our content, we would appreciate your feedback.  Just  e-mail:  and include the URL for the page.


                    









Burleson Consulting

The Oracle of Database Support

Oracle Performance Tuning

Remote DBA Services


 

Copyright © 1996 -  2014

All rights reserved by Burleson

Oracle © is the registered trademark of Oracle Corporation.