Pages

Thursday, 29 March 2012

Caveats of a CONTROL SERVER permission

Today morning I was working on one of the server to complete the regular documentation of security audit with details of logins with sysadmin rights and their access to various database. Later I have realized that, one login has access to all database but it is not captured by my auditing script. Here comes the culprit , the CONTROL SERVER rights.

By default CONTROL SERVER rights is equivalent to sysadmin permission except the fact that logins with CONTROL SERVER rights will honor the explicitly denied server level permission where the members of sysadmin server role bypass the explicitly denied server level permission. Also note that logins with control server permission will have implicit access to the databases like the sysadmin members and database owners. 

Logins with control server rights will not have mapping entry in the sys.database_principals but it will have access to all databases. The worst part is, logins with CONROL SERVER permission are not easy to find out unless you prepare explicit query. It is not listed in the UI of  SSMS or there is no system procedure like sp_helpsrvrolemember to list the logins with CONTROL SERVER  right.

Let us walk through a sample script. Create two logins using the below script

CREATE login SysadminLogin WITH password ='password123~'
GO
CREATE login controlserverlogin WITH password ='password123~'
GO
EXEC sp_addsrvrolemember 'SysadminLogin','sysadmin'
GO
GRANT control server TO controlserverlogin 
Now log in to the server using the controlserverlogin  and you can access all the databases and perform any actions. Let us see what will happen on explicitly denying the server level permission.

DENY VIEW ANY DATABASE TO controlserverlogin
GO
DENY VIEW ANY DATABASE TO sysadminlogin
GO

Now log in to the server using both the login. You can notice that, in the session that connected with the controlserverlogin will list only Master and Tempdb databases while the session connected with sysadminlogin will list all available databases.
The other potential issue with logins having control server right is , they can add them self  to the sysadmin server role or can create a new login with membership to the sysadmin server role. Fortunately it is not possible to do it in straight forward steps. Let us see how it will work .Connect to the server using the  controlserverlogin and  execute the below scripts


/* Fortunately  this will fail */ 
EXEC sp_addsrvrolemember 'controlserverlogin','sysadmin';
GO
/* Unfortunately  this will work even if sa account is disabled*/
EXECUTE AS LOGIN = 'sa';
GO
EXEC sp_addsrvrolemember 'controlserverlogin','sysadmin';
GO
REVERT;


Now the controlserverlogin has sysadmin role membership and you can see all available databases.


Below script  list the logins with sysadmin role membership and control server permission.


/* List login with membership to Sysadmin server role and Control Server right*/
SELECT p.[name] [Login], 'sysadmin Role Member' [Access] ,p.type_desc AS loginTypeFROM sys.server_principals p
  
JOIN sys.server_role_members RM
  
ON p.principal_id = rm.member_principal_id
  
JOIN sys.server_principals rp
  
ON rm.role_principal_id = rp.principal_id WHERE rp.NAME = 'sysadmin' UNION ALL SELECT p.[name], 'Control Server Right' ,p.type_desc AS loginTypeFROM sys.server_principals p
  
JOIN sys.server_permissions Sp
  
ON p.principal_id = sp.grantee_principal_id WHERE sp.class = 100
  
AND sp.[type] = 'CL'
  
AND state = 'G' GO

Below script will help to list the explicitly denied server level permission for logins which have control server permission.


/* List Explicitly denied permission for the login that has control server permission*/

SELECT CSL.*,sp.permission_name [Explicitly Denied Permission]  FROM sys.server_permissions  SP INNER JOIN (SELECT p.principal_id ,p.[name], p.type_desc AS loginTypeFROM sys.server_principals p
  
JOIN sys.server_permissions Sp
  
ON p.principal_id = sp.grantee_principal_id WHERE sp.class = 100
  
AND sp.[type] = 'CL'
  
AND state = 'G' ) CSL ON CSL.principal_id = sp.grantee_principal_id
  
WHERE state ='D'



If you liked this post, do like my page on FaceBook at http://www.facebook.com/practicalSqlDba




16 comments:

  1. you can get round this with the following:
    DENY IMPERSONATE ON LOGIN::sa TO [controlserverlogin]

    ReplyDelete
    Replies
    1. công kích của ba người đã cố hết sức, mà bây giờ còn có một con Ma thú bậc bảy, hắn căn bản là không thể chống lại.

      - Âu Dương Thời, ngươi thật là vô sỉ, thỉnh giúp đỡ.
      đồng tâm
      game mu
      cho thuê nhà trọ
      cho thuê phòng trọ
      nhac san cuc manh
      số điện thoại tư vấn pháp luật miễn phí
      văn phòng luật
      tổng đài tư vấn pháp luật
      dịch vụ thành lập công ty trọn gói
      http://we-cooking.com/
      chém gión Song Dương ánh mắt hung hăng chăm chú nhìn Âu Dương Thời mắng, nhìn một nhị tinh Đấu Tông đã bị giết, lòng của hắn cũng nhỏ máu, vốn hắn thân vẫn chỉ là nhất tinh Đấu Tông, tại Âu Dương Thắng công kích cũng cực kỳ nguy hiểm.

      - An Song Dương, đây cũng không phải là ta thỉnh giúp đỡ, mà là con rể ta, cũng là Linh Cảnh tông Khách Tọa trưởng lão, coi như là người của Linh Cảnh tông ta.

      Âu Dương Thời mỉm cười, hắn cũng không nói sai, theo đạo lý mà nói, Nhạc Thành thế nào cũng có quan hệ với Linh Cảnh tông.

      - Chết đi.

      Giữa không trung Tử Điện Mãng hét lớn một tiếng, thừa dịp ngũ tinh Đấu Tông bị Yêu Cơ cùng Thông Thiên Thử đánh lui, trong tay một mảnh cuồng bạo vô

      Delete
    2. You managed to hit the nail upon the top and also defined out the whole thing without having side effect , people could take a signal. Will likely be back to get more. Thanks
      Tangki Panel

      Tangki Fiberglass

      Jual Septic Tank

      Delete

  2. Thanks for posting this useful content, Good to know about new things here, Let me share this, . LINUX training in pune

    ReplyDelete
  3. Thanks for sharing amazing information !!!!!!
    Please keep up sharing.

    ReplyDelete
  4. This curiosity you describe is fantastic

    ReplyDelete
  5. Thank you for sharing valuable information. Nice post. I enjoyed reading this post...

    ReplyDelete
  6. This comment has been removed by the author.

    ReplyDelete




  7. Excellent Blog! I would like to thank for the efforts you have made in writing this post. I am hoping the same best work from you in the future as well.
    I wanted to thank you for this websites! Thanks for sharing. Great websites!


    pubg apk pubg mobile apk
    pubg lite
    pubg mobile lite
    pubg

    ReplyDelete
  8. افضل شركات توزع اسهم مجانيه في السوق السعودي أمر يشغل العديد من الأشخاص باعتبارها

    ReplyDelete
  9. Thank you for your thoughtful insights on this topic. Your input is valuable, and I look forward to incorporating your ideas into our discussion. best seo services in gwalior

    ReplyDelete
  10. Great article! Really enjoyed the insights you shared. Looking forward to more content like this! Luxury Property in gwalior

    ReplyDelete