{"id":7620,"date":"2020-07-19T04:22:09","date_gmt":"2020-07-19T11:22:09","guid":{"rendered":"https:\/\/webdev.securin.xyz\/?p=7620"},"modified":"2023-07-10T14:48:56","modified_gmt":"2023-07-10T21:48:56","slug":"how-safe-are-database-applications","status":"publish","type":"post","link":"https:\/\/webdev.securin.xyz\/articles\/how-safe-are-database-applications\/","title":{"rendered":"How Safe are Databases?"},"content":{"rendered":"\t\t
Cyber threat actors have been working hard during these pandemic times. The lockdown that came at the wake of this virus attack was sudden and unplanned. Systems, infrastructure, and sensitive information that was hitherto viewed within the secure walls of one\u2019s office is now being accessed through insecure connections and unsafe laptops from one\u2019s home.<\/span><\/strong><\/p><\/blockquote>
The year 2020 will probably go down in history as the worst year for database breaches and we are only halfway through it.<\/p>
We recently released a report series called \u2018Cyber Risk in Working Remotely\u2019 where we examined popular database solutions for vulnerabilities.<\/p>
Key Findings<\/strong><\/h3>
- 79<\/strong>\u00a0CVEs are weaponized<\/span><\/span><\/li>
- 43<\/strong>\u00a0CVEs have RCE and Privilege Execution<\/span><\/span><\/li>
- Scanners such as Nessus, Nexpose, Qualys have missed\u00a05<\/strong>,\u00a09<\/strong>, and\u00a05<\/strong>\u00a0vulnerabilities, respectively.<\/span><\/span><\/li><\/ul><\/blockquote>
Weaponization and Critical vulnerabilities<\/strong><\/h3>
- We investigated a total of 1449 <\/strong><\/span>vulnerabilities in database technologies. Out of these, 79 <\/strong><\/span>are weaponized and 43 <\/span><\/strong>have RCE & PE capabilities.<\/li><\/ul>
<\/p>
- Oracle has the maximum number vulnerabilities (1286<\/strong><\/span>) that are yet to weaponized. It also ranks first among the applications with highest number of weaponized vulnerabilities (78<\/strong><\/span>) and 29 <\/strong><\/span>CVEs can be executed remotely (RCE) while 27 <\/strong><\/span>CVEs have privilege execution.<\/li>
- Mysql stands second with 40 <\/strong><\/span>weaponized vulnerabilities 76 <\/strong><\/span>CVEs that are yet to weaponized.<\/li><\/ul>
<\/p>
- Where criticality of vulnerabilities are concerned, Oracle unsurprisingly leads the charge with 123 <\/strong><\/span>critical and 109 <\/strong><\/span>high priority vulnerabilities. They are followed by IBM with 21 <\/strong><\/span>critical and 65 <\/strong><\/span>high priority vulnerabilities.<\/li><\/ul>
<\/p>
\u00a0<\/p>
Critical vulnerability that allowed the ransomware attack on MongoDB still exists today. This vulnerability was well exploited by Harak1r1 group in 2017 and data was auctioned for millions of dollars.<\/p>
- CVE-2019-9193<\/a> in Postgresql allows arbitrary code in the context of the database\u2019s operating system user and it can be used to run system commands on Windows, Linux and macOS.<\/span><\/strong><\/li>
- CVE-2014-1466<\/a> is a SQL injection vulnerability in CSP MySQL User Manager 2.3 that allows remote attackers to execute arbitrary SQL commands through the login field.<\/span><\/strong><\/li><\/ul><\/blockquote>
Alarmingly, none of these critical vulnerabilities are showing up in popular scan systems that we use to alert us of these threats.<\/p>
Count of vulnerabilities missed by popular scanners<\/span><\/strong><\/p>
\u00a0<\/td> Nessus<\/strong><\/td> Nexpose<\/strong><\/td> Qualys<\/strong><\/td><\/tr> IBM<\/strong><\/td> 0<\/td> 1<\/td> 0<\/td><\/tr> Mysql<\/strong><\/td> 4<\/td> 4<\/td> 4<\/td><\/tr> Postgresql<\/strong><\/td> 1<\/td> 1<\/td> 1<\/td><\/tr> Microsoft<\/strong><\/td> 0<\/td> 1<\/td> 0<\/td><\/tr> Elastic search<\/strong><\/td> 0<\/td> 1<\/td> 0<\/td><\/tr> Apache<\/strong><\/td> 0<\/td> 1<\/td> 0<\/td><\/tr> Total\u00a0<\/strong><\/td> 5<\/strong><\/td> 9<\/strong><\/td> 5<\/td><\/tr><\/tbody><\/table> There is a huge number of vulnerabilities that are yet to weaponized and unless they are fixed immediately database breaches, leaking of private information, auctioning financial data by threat actors will become a daily occurrence.<\/p>
Download the whitepaper\u00a0Cyber Risk in Database<\/a><\/strong><\/p>