Home Operation and Maintenance Safety How to exploit SAP ASE security vulnerability to invade database server

How to exploit SAP ASE security vulnerability to invade database server

Jun 02, 2023 pm 06:43 PM
database server sap ase

A series of new serious vulnerabilities exist in SAP's Sybase database software. Attackers without permissions can use these vulnerabilities to completely control the target database and, in some scenarios, even completely control the underlying operating system.

The six security vulnerabilities discovered by cybersecurity firm Trustware exist in Sybase Adaptive Server Enterprise (ASE), a relational database management software for transaction-based applications.

The cybersecurity company said the vulnerabilities specifically affect the operating system and the entire platform and were discovered during a security test of the product.

CVE-2020-6248 is the most serious vulnerability among them, with a CVSS score of 9.1. An attacker can use this vulnerability to execute malicious commands during database backup.

Trustware researchers noted in the report that "there are no security checks for overwriting critical configuration files during database backup operations, meaning that anyone who can run the DUMP command (such as the database owner) Can perform very dangerous tasks."

The second vulnerability (CVE-2020-6252) affects ASE Cockpit, a web-based management console used to monitor the status and availability of ASE servers. This vulnerability only affects the ASE 16 Windows version. Local attackers can use this vulnerability to obtain user account credentials, overwrite operating system files, and even execute malicious code with LocalSystem permissions.

Two other vulnerabilities (CVE-2020-6241 and CVE-2020-6253) allow an authenticated attacker to execute specially crafted database query statements via SQL injection to escalate privileges to users who do not have special privileges. This can be used to gain database administrator access.

In the exploitation scenario of CVE-2020-6253, an attacker can first control an ASE database dump file and modify the file with malicious data before loading the file into the target ASE server.

The fifth vulnerability (CVE-2020-6243) occurs when the server fails to perform necessary checks for an authenticated user when executing a stored procedure ("dummy_esp") ). This vulnerability allows Windows users to execute their own code and delete data on the ASE server.

Finally, CVE-2020-6250 is an information disclosure vulnerability affecting the ASE Linux/UNIX version. An authenticated attacker can use this vulnerability to read the system administrator password from the installation log.

Researchers pointed out that "these logs are only readable by SAP accounts, but combined with other vulnerabilities, attackers can gain access to the file system and completely invade SAP ASE."

In Trustwave After the company responsibly disclosed its findings on Sybase, SAP pushed out a patch last month that fixed the security vulnerabilities.

Trustwave said, "Organizations often store their most critical data in databases, and in turn, databases are often exposed to untrusted environments or publicly exposed."

"So It is critical to quickly fix and test these vulnerabilities because they not only threaten the data in the database, but may threaten the entire host on which the database is running."

The latest version of ASE has fixed these security vulnerabilities, and users are advised to upgrade as soon as possible to this version.

The above is the detailed content of How to exploit SAP ASE security vulnerability to invade database server. For more information, please follow other related articles on the PHP Chinese website!

Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

Video Face Swap

Video Face Swap

Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

iOS 18 adds a new 'Recovered' album function to retrieve lost or damaged photos iOS 18 adds a new 'Recovered' album function to retrieve lost or damaged photos Jul 18, 2024 am 05:48 AM

Apple's latest releases of iOS18, iPadOS18 and macOS Sequoia systems have added an important feature to the Photos application, designed to help users easily recover photos and videos lost or damaged due to various reasons. The new feature introduces an album called "Recovered" in the Tools section of the Photos app that will automatically appear when a user has pictures or videos on their device that are not part of their photo library. The emergence of the "Recovered" album provides a solution for photos and videos lost due to database corruption, the camera application not saving to the photo library correctly, or a third-party application managing the photo library. Users only need a few simple steps

How does Hibernate implement polymorphic mapping? How does Hibernate implement polymorphic mapping? Apr 17, 2024 pm 12:09 PM

Hibernate polymorphic mapping can map inherited classes to the database and provides the following mapping types: joined-subclass: Create a separate table for the subclass, including all columns of the parent class. table-per-class: Create a separate table for subclasses, containing only subclass-specific columns. union-subclass: similar to joined-subclass, but the parent class table unions all subclass columns.

Detailed tutorial on establishing a database connection using MySQLi in PHP Detailed tutorial on establishing a database connection using MySQLi in PHP Jun 04, 2024 pm 01:42 PM

How to use MySQLi to establish a database connection in PHP: Include MySQLi extension (require_once) Create connection function (functionconnect_to_db) Call connection function ($conn=connect_to_db()) Execute query ($result=$conn->query()) Close connection ( $conn->close())

How to handle database connection errors in PHP How to handle database connection errors in PHP Jun 05, 2024 pm 02:16 PM

To handle database connection errors in PHP, you can use the following steps: Use mysqli_connect_errno() to obtain the error code. Use mysqli_connect_error() to get the error message. By capturing and logging these error messages, database connection issues can be easily identified and resolved, ensuring the smooth running of your application.

An in-depth analysis of how HTML reads the database An in-depth analysis of how HTML reads the database Apr 09, 2024 pm 12:36 PM

HTML cannot read the database directly, but it can be achieved through JavaScript and AJAX. The steps include establishing a database connection, sending a query, processing the response, and updating the page. This article provides a practical example of using JavaScript, AJAX and PHP to read data from a MySQL database, showing how to dynamically display query results in an HTML page. This example uses XMLHttpRequest to establish a database connection, send a query and process the response, thereby filling data into page elements and realizing the function of HTML reading the database.

Equipped with AMD EPYC 4004 series processors, ASUS launches a variety of server and workstation products Equipped with AMD EPYC 4004 series processors, ASUS launches a variety of server and workstation products Jul 23, 2024 pm 09:34 PM

According to news from this website on July 23, ASUS has launched a variety of server and workstation-level products powered by AMD EPYC 4004 series processors. Note from this site: AMD launched the AM5 platform and Zen4 architecture EPYC 4004 series processors in May, offering up to 16-core 3DV-Cache specifications. ASUSProER100AB6 server ASUSProER100AB6 is a 1U rack server product equipped with EPYC Xiaolong 4004 series processor, suitable for the needs of IDC and small and medium-sized enterprises. ASUSExpertCenterProET500AB6 workstation ASUSExpertCenterProET500AB6 is a

How to use database callback functions in Golang? How to use database callback functions in Golang? Jun 03, 2024 pm 02:20 PM

Using the database callback function in Golang can achieve: executing custom code after the specified database operation is completed. Add custom behavior through separate functions without writing additional code. Callback functions are available for insert, update, delete, and query operations. You must use the sql.Exec, sql.QueryRow, or sql.Query function to use the callback function.

How to connect to remote database using Golang? How to connect to remote database using Golang? Jun 01, 2024 pm 08:31 PM

Through the Go standard library database/sql package, you can connect to remote databases such as MySQL, PostgreSQL or SQLite: create a connection string containing database connection information. Use the sql.Open() function to open a database connection. Perform database operations such as SQL queries and insert operations. Use defer to close the database connection to release resources.

See all articles