How to Decrypt Oracle EBS User Passwords from the Database using SQL QUERY

Oracle stores passwords in encrypted format, and this SQL script demonstrates how you can decrypt user passwords using standard EBS API functions such as get_pwd.decrypt.

Important Note
: This script is for educational and internal system diagnostics only. Never use it in production environments without proper security authorization.

Use Case

This SQL is particularly useful for:

  • Testing internal password decryption functionality

  • Validating password migrations during EBS clone or refresh

  • Technical support or audit trails in development/test environments

SQL Query:

    SELECT usr.user_name,

       get_pwd.decrypt

          ((SELECT (SELECT get_pwd.decrypt

                              (fnd_web_sec.get_guest_username_pwd,

                               usertable.encrypted_foundation_password

                              )

                      FROM DUAL) AS apps_password

    --add another columns if needed

              FROM fnd_user usertable

             WHERE usertable.user_name =

                      (SELECT SUBSTR

                                  (fnd_web_sec.get_guest_username_pwd,

                                   1,

                                     INSTR

                                          (fnd_web_sec.get_guest_username_pwd,

                                           '/'

                                          )

                                   - 1

                                  )

                         FROM DUAL)),

           usr.encrypted_user_password

          ) PASSWORD

-- Add another tables if needed

FROM fnd_user usr

WHERE LOWER(usr.user_name) LIKE LOWER('GIVE_USERNAME_HERE');


How It Works

  • fnd_web_sec.get_guest_username_pwd retrieves the guest user’s credentials (e.g., GUEST/ORACLE).

  • The script extracts the GUEST user from that string.

  • Then, using get_pwd.decrypt, it decrypts the foundation password of the guest user.

  • Finally, it decrypts the password of the target user.

Security Disclaimer

  • This query must never be used on a live production instance without proper authorization. Passwords should remain encrypted for security compliance. This technique should be limited to sandbox or internal testing systems.

Comments

Popular posts from this blog

Query to find Responsibility and Request Group from Concurrent Program

How to Extract User Role Details with SQL in Oracle Fusion

3 Way PO Matching SQL Query in Oracle Fusion: Purchase Order, Receipt, and Invoice Reconciliation