Security Blogs
Upcoming Webinar: Oracle E-Business Suite Security for Auditors
Oracle E-Business Suite Security for Auditors
Thursday, December 17, 2020 - 2:00 pm to 3:00 pm EST
Auditors are trained to understand the financial aspects and the end user functionality of Oracle E-Business Suite. However, most auditors have not been trained in the security features and technical aspects of Oracle E-Business Suite. This education webinar will dive into the key security features within Oracle E-Business Suite. Key configuration settings, protecting sensitive data, concerns and risks with user privileges, and compliance issues related to SOX will be discussed and how to audit these areas.
TCPS Connection With an Oracle Instant Client
Posted by Pete On 27/11/20 At 03:56 PM
PL/SQL, AST, DIANA, Attributes and IDL
Posted by Pete On 06/04/20 At 08:57 PM
PL/SQL Machine Code Trace - event 10928
Posted by Pete On 02/04/20 At 01:33 PM
Be Careful of What You Include In SQL*Net Security Banners
Posted by Pete On 01/04/20 At 11:50 AM
Oracles Free TNS Firewall - VALIDNODE_CHECKING
Posted by Pete On 31/03/20 At 12:26 PM
Add A SQL*Net Security Banner And Audit Notice
Posted by Pete On 30/03/20 At 02:02 PM
ORA-28050 - Can I drop the SYSTEM User?
Posted by Pete On 27/03/20 At 06:11 PM
Setting Users Impossible Passwords BY VALUES and Schema Only Accounts
Posted by Pete On 26/03/20 At 02:38 PM
CoronaVirus - We are Still Open
Posted by Pete On 25/03/20 At 01:27 PM
XS$NULL - Can we login to it and does it really have no privileges?
Posted by Pete On 17/02/20 At 01:09 PM
Bug Bounty
Posted by Pete On 11/02/20 At 10:09 AM
PL/SQL That is not DEFINER or INVOKER rights - BUG?
Posted by Pete On 24/01/20 At 03:19 PM
PL/SQL Package with no DEFINER or INVOKER rights - Part 2
Posted by Pete On 28/01/20 At 03:11 PM
Upcoming Webinar: Is Your Sensitive Data Playing Hide and Seek with You?
Is Your Sensitive Data Playing Hide and Seek with You?
Thursday, December 12, 2019 - 2:00 pm EST
Your Oracle databases and ERP applications may contain sensitive personal data like Social Security numbers, credit card numbers, addresses, date of births, and salary information. Understanding in what tables and columns sensitive data resides is critical in protecting the data and ensure compliance with regulations like GDPR, PCI, and the new California Consumer Privacy Act (CCPA). However, sensitive data is like a weed and can spread quickly if not properly managed. The challenge is how to effectively and continuously find sensitive data, especially in extremely large databases and data warehouses. This educational webinar will discuss methodologies and tools to find sensitive such as by searching column names, crawling the database table by table, and performing data qualification to eliminate false positives. Other locations where sensitive data might reside such as trace files, dynamic views (e.g., V$SQL_BIND_DATA), and materialized views will be reviewed.
Installing Oracle 19c on Linux
Posted by Pete On 06/12/19 At 04:27 PM
CVE-2019-2638, CVE-2019-2633, Oracle Payday Vulnerabilities - AppDefend Protection
Two Oracle E-Business Suite security vulnerabilities (CVE-2019-2638, CVE-2019-2633) fixed in April 2019 Oracle Critical Patch Update (CPU) have been recently publicized. These vulnerabilities allow an attacker to execute arbitrary SQL statements in the Oracle E-Business Suite data that can result in complete compromise of the environment including fraudulent transactions, changing of bank accounts, and circumvention of application security controls. Integrigy’s AppDefend, the application firewall for Oracle E-Business Suite, is the only solution that provides virtual patching for and proactive defense against these vulnerabilities.
These two vulnerabilities are in the Oracle E-Business Suite (EBS) TCF Server, which provides services to the professional Forms interface for a limited set of Forms. TCF Server is implemented and enabled in all versions of Oracle E-Business Suite including 11i, 12.0, 12.1, and 12.2. It can not be disabled without a customization to Oracle EBS.
TCF Server is a servlet running as part of the standard Oracle EBS web application server and communicates using HTTP or HTTPS between the Forms Java client and the web application server. For R12, the servlet is available at the URL /OA_HTML/AppsTCFServer. It uses a proprietary application-level protocol to communicate between the Forms client and server.
The risk is that unlike most Oracle EBS SQL injection vulnerabilities that only allow for fragments of SQL statements to be appended to standard Oracle EBS SQL statements being executed, these security bugs allow execution of complete SQL statements as the Oracle EBS APPS database account. When evaluating the risk of these vulnerabilities in your environment, it is important to differentiate between external access to the Oracle EBS environment through the Internet when modules like iSupplier, iStore, and iRecruitment are being used and internal access from only your internal network. The risk from external access is critical and should be immediately addressed. The internal risk is still high and dependent on the security posture of your internal network. It is important to realize that non-Oracle EBS aware web application firewalls, database security tools, and other network security products will not provide any protection from successful exploitation of these vulnerabilities.
Integrigy AppDefend is the only solution that provides virtual patching for and proactive defense against these TCF Server vulnerabilities as well other Oracle EBS security vulnerabilities. Integrigy recognized the potential issues with TCF Server and even the first release of AppDefend for R12 in 2007 blocked external access to the TCF Server by default.
AppDefend provides multiple layers of protection against TCF Server vulnerabilities as follows -
- Blocks all access to TCF Server externally (since 2007).
- Enforces Oracle EBS access control for TCF Server allowing only authorized EBS users to access to the TCF Server (since 2018).
- Whitelists the functions accessible through TCF Server (since 2018).
- Blocks specific vulnerabilities in TCF Server (2018, 2019).
- Advanced SQL injection protection optimized specifically for Oracle EBS will detect and block most of the SQL statements used in TCF Server and other 0-day attacks. (since 2007).
If you do not have AppDefend, applying the latest Oracle Critical Patch Update for Oracle EBS will remediate these specific vulnerabilities and for external sites it is critical that the Oracle EBS URL Firewall is implemented as documented in Appendix E of My Oracle Support Note ID 380490.1. However, these solutions will not protect you prior to applying the security patches or against future TCF Server vulnerabilities and other Oracle EBS 0-day attacks.
Please let us know if you have any questions regarding the latest Oracle EBS security vulnerabilities at info@integrigy.com.
Oracle Security Training Manuals for Sale
Posted by Pete On 19/11/19 At 03:05 PM
ORA-01950 Error on a Sequence
Posted by Pete On 30/09/19 At 01:42 PM
ORA-01950 Error on a Sequence - Error on Primary Key Index
Posted by Pete On 01/10/19 At 01:12 PM
Pages
