Advisory: Privilege Escalation Via Internal SQL Injection In RESTORE DATABASE CommandTeam Shatter Exclusive

Posted April 11, 2012 by Alex Rothacker in MS SQL Server, Security Advisory, Team Shatter Exclusive with 0 comments

AppSecInc Team SHATTER Security Advisory

Risk Level:
Medium

Affected versions:
Microsoft SQL Server 2005, 2008, 2008 R2

Remote exploitable:
Yes

Credits:
This vulnerability was discovered and researched by Martin Rakhmanov of Application Security Inc.

Details:
RESTORE DATABASE command is prone to internal sql injection allowing malicious users to run SQL code with highest privileges.
To exploit this vulnerability an attacker must possess CREATE DATABASE privilege to be able to create and restore database.

Impact:
Users having CREATE DATABASE permission can become system administrators.

Vendor Status:
Vendor was contacted and a patch was released for Microsoft SQL Server 2008.

Workaround:
Revoke CREATE DATABASE privilege from untrusted users.

Fix:
Microsoft SQL Server 2005: no fix planned.
Microsoft SQL Server 2008: apply Service Pack 3.
Microsoft SQL Server 2008 R2: no fix planned.

Links:

https://www.teamshatter.com/?p=3373

Timeline:
Vendor Notification – 2011-05-10
Vendor Response – 2011-05-11
Fix – 2011-11-06
Public Disclosure – 2012-04-11

Leave a Reply

Name (required)

Mail (will not be published) (required)

Website

Please note: JavaScript is required to post comments.

Powered by