DB2 must prohibit user installation of logic modules (stored procedures, functions, triggers, views, etc.) without explicit privileged status.
From IBM DB2 V10.5 LUW Security Technical Implementation Guide
Part of SRG-APP-000378-DB-000365
Associated with:
CCI-001812
SV-89263r1_rule
DB2 must prohibit user installation of logic modules (stored procedures, functions, triggers, views, etc.) without explicit privileged status.
Vulnerability discussion
Allowing regular users to install software, without explicit privileges, creates the risk that untested or potentially malicious software will be installed on the system. Explicit privileges (escalated or administrative privileges) provide the regular user with explicit capabilities and control that exceed the rights of a regular user.DBMS functionality and the nature and requirements of databases will vary; so while users are not permitted to install unapproved software, there may be instances where the organization allows the user to install approved software packages such as from an approved software repository. The requirements for production servers will be more restrictive than those used for development and research.The DBMS must enforce software installation by users based upon what types of software installations are permitted (e.g., updates and security patches to existing software) and what types of installations are prohibited (e.g., software whose pedigree with regard to being potentially malicious is unknown or suspect) by the organization). In the case of a database management system, this requirement covers stored procedures, functions, triggers, views, etc.
Check content
The user needs CREATEINAUTH privileges for the schema to create objects in an existing schema.
Run the following Query to find which user has privilege to create objects in schemas:
DB2> SELECT GRANTEE, SCHEMANAME, CREATEINAUTH, ALTERINAUTH
FROM SYSCAT.SCHEMAAUTH
If a non-authorized user has privilege, this is a finding.
Run the following query to which user has privilege to create new schema and other objects:
DB2> SELECT GRANTEE, CREATETABAUTH, EXTERNALROUTINEAUTH, DBADMAUTH, IMPLSCHEMAAUTH
FROM SYSCAT.DBAUTH
If a non-authorized user has privilege, this is a finding.
Fix text
Run the REVOKE command to revoke database authorities and schema privileges from user:
DB2> REVOKE CREATEIN ON SCHEMA FROM
DB2> REVOKE ON DATABASE FROM
Note: Select the following knowledgebase link for information regarding revoking database authorities:
http://www.ibm.com/support/knowledgecenter/SSEPGG_10.5.0/com.ibm.db2.luw.sql.ref.doc/doc/r0000981.html?cp=SSEPGG_10.5.0%2F2-12-7-181&lang=en
Select the following knowledgebase link for information regarding revoking schema privileges:
http://www.ibm.com/support/knowledgecenter/SSEPGG_10.5.0/com.ibm.db2.luw.sql.ref.doc/doc/r0000988.html?cp=SSEPGG_10.5.0%2F2-12-7-189&lang=en
Pro Tips
Lavender hyperlinks in small type off to the right (of CSS
class id
, if you view the page source) point to
globally unique URIs for each document and item. Copy the
link location and paste anywhere you need to talk
unambiguously about these things.
You can obtain data about documents and items in other
formats. Simply provide an HTTP header Accept:
text/turtle
or
Accept: application/rdf+xml
.
Powered by sagemincer