× The internal search function is temporarily non-functional. The current search engine is no longer viable and we are researching alternatives.
As a stop gap measure, we are using Google's custom search engine service.
If you know of an easy to use, open source, search engine ... please contact support@midrange.com.



Lim,

QCMDEXC is not a traditional command where you can decide whether to allow
limited users access via ALWLMTUSR, which specifies whether the command can
be entered from the command line on a menu by a user whose profile is set
for limited capabilities, referencing LMTCPB keyword on the Create User
Profile (CRTUSRPRF) and Change User Profile (CHGUSRPRF) commands.

So, at a minimum, you can have a mitigating activity in place whereby you
change the object auditing value of the QCMDEXC program to *USRPRF and the
user auditing value of specific users you want to monitor *ALL, and then
regularly report on who has been accessing the program.  The combination of
the object and user auditing settings will write records for only those user
profiles that have auditing "turned on."  

Also, you could utilize an exit program for the SQL types of activities that
fully records the SQL transactions strings and that allows you to secure
remote (non green-screen) access to specific objects or commands referenced
within the SQL string.  You certainly can write your own program with the
help of some of the very knowledgeable folks on this forum.  Finally, some
third party exit program solutions give you that granularity and some just
memorize an entire transaction string in total, so you would need to decide
what's best for your environment.

Best regards,

Steven W. Martinson, CISSP, CISM
iSeries Security Consultant
NetIQ Corporation
Mobile:  281.546.9836

____________________________________________________________________________
__________ 

message: 9
date: Tue, 16 Nov 2004 08:32:32 -0600
from: "Lim Hock-Chai" <Lim.Hock-Chai@xxxxxxxx>
subject: security hole in interactive sql call statement?

We have a menu option that allow programmer to get into interactive sql
(STRSQL) on our production box.  Our production files are secured to only
allow view only access for programmers.  This work well with the exception
of the call statement.  
 
Here is the problem: 
Programmer user profile is set to Limit Capabilities *YES.  However, in
STRSQL, he/she can actually do this to exec a command: CALL
qcmdexc('WRKACTJOB',000000009.00000) or call any program.  
 
Is this a security hole on AS400? 
 
Is there a way to lock down call statement in STRSQL?

Best regards,

Steven W. Martinson, CISSP, CISM
iSeries Security Consultant
NetIQ Corporation
Mobile:  281.546.9836


As an Amazon Associate we earn from qualifying purchases.

This thread ...


Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].

Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.