Web-applications security

Download Report

Transcript Web-applications security

Security of Web
Applications
Jamshid Shokrollahi
E-Commerce Security
Overview
 Why Web application security?
 Some attacks on web applications
and corresponding countermeasures
Why Web application
security?





Reduce cost of recovery and fixes
Ensure customer trust
Encourage website adoption
Maintain competitive advantages
Manage legal risks
Some attacks on Web
Applications
 Known vulnerabilities and
misconfigurations
 Hidden fields
 Backdoor and debug options
 Cross-site scripting
 Cookie poisoning
 Buffer overflow
Known vulnerabilities and
misconfigurations
Security Bulletin MS00-078:
… in IIS 4.0 and 5.0, a particular type of malformed URL …
enables a malicious user ... to add, change or delete data, run
code already on the server, or upload new code to the server and
run it. …
 October 2000: Microsoft’s IIS
 A malformed URL lets the malicious user to navigate
in the logical drive of the web server.
 Runs under the security context of the
IUSR_machinename which is anonymous account for
the IIS and belongs to the everyone and guests
account.
Tampering Hidden fields
 Hidden fields in forms could contain
passwords or prices which must be
submitted back to the server.
 They can be viewed or modified by
clients and submitted back.
Tampering Hidden fields
The forms
should be
Web server
validated
Form to be filled by
containing
andorders
prices as hidden
fields
passwords
should not
be sent to
the clients.
Web user
Wrong order
Unit prices (hidden
fields) are reduced.
Database
server
Backdoor and debug
options
 Backdoor options are built into
applications during debugging.
 Programmers build shortcuts to avoid
logging in for every round of
debugging.
 Because of time limits debugging
versions are put on the web.
Threats caused by scripts
 CERT Advisory CA-1997-20
 Impact: Enables monitoring web activities
 Cause: Vulnerabilities in browsers (javascript)
 Solution: upgrade browser or disable javascript
 CERT Vulnerability Note VU#800893



Impact: Disclosing files
Cause: Vulnerability in the implementation of GetObject in
IE (VBscript)
Solution: download patch or disable active scripting in IE
especially when visiting untrusted sites.
Cross-site scripting
 Hope browsers are not patched
 Put malicious codes on innocent webpages
 Submit texts including:
<SCRIPT>malicious code</SCRIPT>
Others download the code
 Abuse of <FORM> tag
 Internet Explorer security "zones" can
be subverted by this technique
Cookie-based attacks
 Like hidden field attack when
parameters are saved in cookies.
 Packet-sniffing for to still identities
which are saved in cookies
 Using digital signatures and
cryptography
 Using CSS to send cookies to other
servers, even cryptography does not
help
Buffer overflow
 Some kind of denial of service attacks
 Malicious users can sometimes run
their own program
 Overwriting stack with the address of
their programs
Bibliography
 Gunter Ollmann, HTML Code Injection and Cross-site
scripting, http://www.technicalinfo.net/papers/CSS.html
 CERT Advisory CA-2000-02, Malicious HTML Tags
Embedded in Client Web Requests,
http://www.cert.org/advisories/CA-2000-02.html
 Wikipedia