查找漏洞(oracle)

Oracle:


-- Purpose: A PL/SQL script to search the DB for potentially vulnerable 
-- PL/SQL code 
-- Version: v 0.0.1 

-- Works against: Oracle 9i, 10g and 11g 
-- Author: Alexander Kornbrust of Red-Database-Security GmbH 
-- 
select distinct a.owner,a.name,b.authid,a.text SQLTEXT 
from all_source a,all_procedures b 
where ( 
lower(text) like '%execute%immediate%(%||%)%' 
or lower(text) like '%dbms_sql%' 
or lower(text) like '%grant%to%' 
or lower(text) like '%alter%user%identified%by%' 
or lower(text) like '%execute%immediate%''%||%' 
or lower(text) like '%dbms_utility.exec_ddl_statement%' 
or lower(text) like '%dbms_ddl.create_wrapped%' 
or lower(text) like '%dbms_hs_passthrough.execute_immediate%' 
or lower(text) like '%dbms_hs_passthrough.parse%' 
or lower(text) like '%owa_util.bind_variables%' 
or lower(text) like '%owa_util.listprint%' 
or lower(text) like '%owa_util.tableprint%' 
or lower(text) like '%dbms_sys_sql.%' 
or lower(text) like '%ltadm.execsql%' 
or lower(text) like '%dbms_prvtaqim.execute_stmt%' 
or lower(text) like '%dbms_streams_rpc.execute_stmt%' 
or lower(text) like '%dbms_aqadm_sys.execute_stmt%' 
or lower(text) like '%dbms_streams_adm_utl.execute_sql_string%' 
or lower(text) like '%initjvmaux.exec%' 
or lower(text) like '%dbms_repcat_sql_utl.do_sql%' 
or lower(text) like '%dbms_aqadm_syscalls.kwqa3_gl_executestmt%' 

and lower(a.text) not like '% wrapped%' 
and a.owner=b.owner 
and a.name=b.object_name 
and a.owner not in 
('OLAPSYS','ORACLE_OCM','CTXSYS','OUTLN','SYSTEM','EXFSYS', 
'MDSYS','SYS','SYSMAN','WKSYS','XDB','FLOWS_040000','FLOWS_030000', 
'FLOWS_030100', 'FLOWS_020000','FLOWS_020100','FLOWS020000', 
'FLOWS_010600

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值