


How to exploit SAP ASE security vulnerability to invade database server
A series of new serious vulnerabilities exist in SAP's Sybase database software. Attackers without permissions can use these vulnerabilities to completely control the target database and, in some scenarios, even completely control the underlying operating system.
The six security vulnerabilities discovered by cybersecurity firm Trustware exist in Sybase Adaptive Server Enterprise (ASE), a relational database management software for transaction-based applications.
The cybersecurity company said the vulnerabilities specifically affect the operating system and the entire platform and were discovered during a security test of the product.
CVE-2020-6248 is the most serious vulnerability among them, with a CVSS score of 9.1. An attacker can use this vulnerability to execute malicious commands during database backup.
Trustware researchers noted in the report that "there are no security checks for overwriting critical configuration files during database backup operations, meaning that anyone who can run the DUMP command (such as the database owner) Can perform very dangerous tasks."
The second vulnerability (CVE-2020-6252) affects ASE Cockpit, a web-based management console used to monitor the status and availability of ASE servers. This vulnerability only affects the ASE 16 Windows version. Local attackers can use this vulnerability to obtain user account credentials, overwrite operating system files, and even execute malicious code with LocalSystem permissions.
Two other vulnerabilities (CVE-2020-6241 and CVE-2020-6253) allow an authenticated attacker to execute specially crafted database query statements via SQL injection to escalate privileges to users who do not have special privileges. This can be used to gain database administrator access.
In the exploitation scenario of CVE-2020-6253, an attacker can first control an ASE database dump file and modify the file with malicious data before loading the file into the target ASE server.
The fifth vulnerability (CVE-2020-6243) occurs when the server fails to perform necessary checks for an authenticated user when executing a stored procedure ("dummy_esp") ). This vulnerability allows Windows users to execute their own code and delete data on the ASE server.
Finally, CVE-2020-6250 is an information disclosure vulnerability affecting the ASE Linux/UNIX version. An authenticated attacker can use this vulnerability to read the system administrator password from the installation log.
Researchers pointed out that "these logs are only readable by SAP accounts, but combined with other vulnerabilities, attackers can gain access to the file system and completely invade SAP ASE."
In Trustwave After the company responsibly disclosed its findings on Sybase, SAP pushed out a patch last month that fixed the security vulnerabilities.
Trustwave said, "Organizations often store their most critical data in databases, and in turn, databases are often exposed to untrusted environments or publicly exposed."
"So It is critical to quickly fix and test these vulnerabilities because they not only threaten the data in the database, but may threaten the entire host on which the database is running."
The latest version of ASE has fixed these security vulnerabilities, and users are advised to upgrade as soon as possible to this version.
The above is the detailed content of How to exploit SAP ASE security vulnerability to invade database server. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics

Apple's latest releases of iOS18, iPadOS18 and macOS Sequoia systems have added an important feature to the Photos application, designed to help users easily recover photos and videos lost or damaged due to various reasons. The new feature introduces an album called "Recovered" in the Tools section of the Photos app that will automatically appear when a user has pictures or videos on their device that are not part of their photo library. The emergence of the "Recovered" album provides a solution for photos and videos lost due to database corruption, the camera application not saving to the photo library correctly, or a third-party application managing the photo library. Users only need a few simple steps

Hibernate polymorphic mapping can map inherited classes to the database and provides the following mapping types: joined-subclass: Create a separate table for the subclass, including all columns of the parent class. table-per-class: Create a separate table for subclasses, containing only subclass-specific columns. union-subclass: similar to joined-subclass, but the parent class table unions all subclass columns.

How to use MySQLi to establish a database connection in PHP: Include MySQLi extension (require_once) Create connection function (functionconnect_to_db) Call connection function ($conn=connect_to_db()) Execute query ($result=$conn->query()) Close connection ( $conn->close())

To handle database connection errors in PHP, you can use the following steps: Use mysqli_connect_errno() to obtain the error code. Use mysqli_connect_error() to get the error message. By capturing and logging these error messages, database connection issues can be easily identified and resolved, ensuring the smooth running of your application.

HTML cannot read the database directly, but it can be achieved through JavaScript and AJAX. The steps include establishing a database connection, sending a query, processing the response, and updating the page. This article provides a practical example of using JavaScript, AJAX and PHP to read data from a MySQL database, showing how to dynamically display query results in an HTML page. This example uses XMLHttpRequest to establish a database connection, send a query and process the response, thereby filling data into page elements and realizing the function of HTML reading the database.

According to news from this website on July 23, ASUS has launched a variety of server and workstation-level products powered by AMD EPYC 4004 series processors. Note from this site: AMD launched the AM5 platform and Zen4 architecture EPYC 4004 series processors in May, offering up to 16-core 3DV-Cache specifications. ASUSProER100AB6 server ASUSProER100AB6 is a 1U rack server product equipped with EPYC Xiaolong 4004 series processor, suitable for the needs of IDC and small and medium-sized enterprises. ASUSExpertCenterProET500AB6 workstation ASUSExpertCenterProET500AB6 is a

Using the database callback function in Golang can achieve: executing custom code after the specified database operation is completed. Add custom behavior through separate functions without writing additional code. Callback functions are available for insert, update, delete, and query operations. You must use the sql.Exec, sql.QueryRow, or sql.Query function to use the callback function.

Through the Go standard library database/sql package, you can connect to remote databases such as MySQL, PostgreSQL or SQLite: create a connection string containing database connection information. Use the sql.Open() function to open a database connection. Perform database operations such as SQL queries and insert operations. Use defer to close the database connection to release resources.
