Advanced Web Application Security
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
How to Secure Your Web Site Picked up SQL Injection and Cross-Site Scripting As Sample Cases of Failure Because These Two Are the Two Most Reported Vulnerabilities
How to Secure your Website rd 3 Edition Approaches to Improve Web Application and Web Site Security June 2008 IT SECURITY CENTER (ISEC) INFORMATION-TECHNOLOGY PROMOTION AGENCY, JAPAN This document is a translation of the original Japanese edition. Please be advises that most of the references referred in this book are offered in Japanese only. Both English and Japanese edition are available for download at: http://www.ipa.go.jp/security/english/third.html (English web page) http://www.ipa.go.jp/security/vuln/websecurity.html (Japanese web page) Translated by Hiroko Okashita (IPA), June 11 2008 Contents Contents ......................................................................................................................................... 1 Preface ........................................................................................................................................... 2 Organization of This Book ........................................................................................................... 3 Intended Reader ......................................................................................................................... 3 Fixing Vulnerabilities – Fundamental Solution and Mitigation Measure - .................................... 3 1. Web Application Security Implementation ............................................................................... 5 1.1 SQL Injection .................................................................................................................... 6 1.2 -
HTTP Header Analysis
HTTP Header Analysis Author:Roland Zegers Master System and Network Engineering University of Amsterdam [email protected] August 31, 2015 Abstract Many companies are busy finding new solutions for detecting the growing amount of malware that is propagated over the Internet. A lot of anti-malware developers use the unique signature of the payload as a detection mechanism. Others look at the communication channels. Research has been done to see what information HTTP headers can provide. Different aspects of headers have been investigated in order to track malware: header sizes, type errors or the presence or absence of certain headers. This information is then used to create a fingerprint or signature. The goal of this research was to look at order of HTTP request headers to see if it is possible to determine if malware is present. Although the header order of malware is very irregular, it does not stand out when compared to HTTP headers from regular traffic. Websites have their own header order as well as programs that communicate over HTTP like Windows updates and anti-virus solutions. Some websites request special services or offer specific content. This leads to the insertion of extra headers, like security-, SOAP- or experimental headers, which create inconsistency in the order of the headers. As a result of this, it is unfeasible to use header order to reliably identify systems or malware. 1 Contents 1 Introduction 3 1.1 Rationale . .3 1.2 Related research . .3 2 Research Questions 4 2.1 Problem definition . .4 2.2 Research Questions . .4 3 Request headers 4 3.1 HTTP header structure . -
Introduction
HTTP Request Smuggling in 2020 – New Variants, New Defenses and New Challenges Amit Klein SafeBreach Labs Introduction HTTP Request Smuggling (AKA HTTP Desyncing) is an attack technique that exploits different interpretations of a stream of non-standard HTTP requests among various HTTP devices between the client (attacker) and the server (including the server itself). Specifically, the attacker manipulates the way various HTTP devices split the stream into individual HTTP requests. By doing this, the attacker can “smuggle” a malicious HTTP request through an HTTP device to the server abusing the discrepancy in the interpretation of the stream of requests and desyncing between the server’s view of the HTTP request (and response) stream and the intermediary HTTP device’s view of these streams. In this way, for example, the malicious HTTP request can be "smuggled" as a part of the previous HTTP request. HTTP Request Smuggling was invented in 2005, and recently, additional research cropped up. This research field is still not fully explored, especially when considering open source defense systems such as mod_security’s community rule-set (CRS). These HTTP Request Smuggling defenses are rudimentary and not always effective. My Contribution My contribution is three-fold. I explore new attacks and defense mechanisms, and I provide some “challenges”. 1. New attacks: I provide some new HTTP Request Smuggling variants and show how they work against various proxy-server (or proxy-proxy) combinations. I also found a bypass for mod_security CRS (assuming HTTP Request Smuggling is possible without it). An attack demonstration script implementing my payloads is available in SafeBreach Labs’ GitHub repository (https://github.com/SafeBreach-Labs/HRS). -
Domain Name Systems-Based Electronic Mail Security
DRAFT NIST CYBERSECURITY PRACTICE GUIDE DOMAIN NAME SYSTEMS-BASED ELECTRONIC MAIL SECURITY Scott Rose William C. Barker Santos Jha Chinedum Irrechukwu Karen Waltermire NIST SPECIAL PUBLICATION 1800-6 (INCLUDING PARTS A, B, C) ADDITIONAL CONTENT: https://nccoe.nist.gov/projects/building_blocks/ DRAFT NIST Special Publication 1800-6 NIST Cybersecurity Practice Guide DOMAIN NAME SYSTEMS- BASED ELECTRONIC MAIL SECURITY 1800-6A Scott Rose Executive Summary Information Technology Laboratory National Institute of Standards and Technology 1800-6B Approach, Architecture, and William C. Barker Security Characteristics Dakota Consulting For CIOs, CSOs, and Security Managers Silver Spring, MD 1800-6C Santos Jha How-To Guides Chinedum Irrechukwu For Security Engineers The MITRE Corporation McLean, VA Karen Waltermire National Cybersecurity Center of Excellence National Institute of Standards and Technology November 2016 U.S. Department of Commerce Penny Pritzker, Secretary National Institute of Standards and Technology Willie May, Under Secretary of Commerce for Standards and Technology and Director DRAFT DISCLAIMER Certain commercial entities, equipment, products, or materials may be identified in this document in order to describe an experimental procedure or concept adequately. Such identification is not intended to imply recommendation or endorsement by NIST or NCCoE, nor is it intended to imply that the entities, equipment, products, or materials are necessarily the best available for the purpose. National Institute of Standards and Technology Special Publication 1800-6 Natl Inst. Stand. Technol. Spec. Publ. 1800-6, 221 pages (November 2016) CODEN: NSPUE2 Organizations are encouraged to review all draft publications during public comment periods and provide feedback. All publications from NIST’s National Cybersecurity Center of Excellence are available at http://nccoe.nist.gov. -
Simple Security Policy for the Web by Terri Kimiko Oda a Thesis Submitted
Simple Security Policy for the Web by Terri Kimiko Oda A thesis submitted to the Faculty of Graduate and Postdoctoral Affairs in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Computer Science Carleton University Ottawa, Ontario © 2011 Terri Kimiko Oda Library and Archives Bibliotheque et Canada Archives Canada Published Heritage Direction du Branch Patrimoine de I'edition 395 Wellington Street 395, rue Wellington Ottawa ON K1A0N4 Ottawa ON K1A 0N4 Canada Canada Your file Votre reference ISBN: 978-0-494-87758-6 Our file Notre reference ISBN: 978-0-494-87758-6 NOTICE: AVIS: The author has granted a non L'auteur a accorde une licence non exclusive exclusive license allowing Library and permettant a la Bibliotheque et Archives Archives Canada to reproduce, Canada de reproduire, publier, archiver, publish, archive, preserve, conserve, sauvegarder, conserver, transmettre au public communicate to the public by par telecommunication ou par I'lnternet, preter, telecommunication or on the Internet, distribuer et vendre des theses partout dans le loan, distrbute and sell theses monde, a des fins commerciales ou autres, sur worldwide, for commercial or non support microforme, papier, electronique et/ou commercial purposes, in microform, autres formats. paper, electronic and/or any other formats. The author retains copyright L'auteur conserve la propriete du droit d'auteur ownership and moral rights in this et des droits moraux qui protege cette these. Ni thesis. Neither the thesis nor la these ni des extraits substantiels de celle-ci substantial extracts from it may be ne doivent etre imprimes ou autrement printed or otherwise reproduced reproduits sans son autorisation. -
Citrix Netscaler 1000V Application Security Guide, Release 10.1
Citrix NetScaler 1000V Application Security Guide Citrix NetScaler 10.1 October 3, 2013 Cisco Systems, Inc. www.cisco.com Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco website at www.cisco.com/go/offices. THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The following information is for FCC compliance of Class A devices: This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to part 15 of the FCC rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment. This equipment generates, uses, and can radiate radio-frequency energy and, if not installed and used in accordance with the instruction manual, may cause harmful interference to radio communications. Operation of this equipment in a residential area is likely to cause harmful interference, in which case users will be required to correct the interference at their own expense. The following information is for FCC compliance of Class B devices: This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to part 15 of the FCC rules. -
Ch 13: Attacking Users: Other Techniques (Part 2) Other Client-Side Injection Attacks HTTP Header Injection
CNIT 129S: Securing Web Applications Ch 13: Attacking Users: Other Techniques (Part 2) Other Client-Side Injection Attacks HTTP Header Injection • User-controlled data in an HTTP header • Most commonly the Location and Set-Cookie headers Injecting Another Header Exploiting Header Injection • See if %0d and %0a return decoded as carriage- return and line-feed • If only one works, you may still be able to exploit it • If they are blocked or sanitized, try these bypasses Injecting Cookies • Cookies may persist across browser sessions Delivering Other Attacks • HTTP header injection allows an attacker to control the entire body of a response • Can deliver almost any attack • Virtual website defacement • Script injection • Redirection HTTP Response Splitting • Inject a second complete page into the headers • Must inject carriage returns and line feeds • Fixed in modern servers (link Ch 13d) Poisoning the Cache on a Proxy Server Preventing Header Injection • Don't insert user-controllable input into headers • If you must, use • Input validation (context-dependent) • Output validation: block all ASCII characters below 0x20 Cookie Injection • Attacker sets or modifies a cookie in the victim user's browser • This may be possible if: • App has functionality that takes a name and value from parameters and sets those within a cookie, such as "Save user preferences" • HTTP header injection vulnerability Cookie Injection • Setting a malicious cookie via XSS • XSS in related domains can be leveraged to set a cookie on the targeted domain, from any of -
Alibaba Cloud Alibaba Cloud CDN
Alibaba Cloud Alibaba Cloud CDN Domain Management Issue: 20190815 Alibaba Cloud CDN Domain Management / Legal disclaimer Legal disclaimer Alibaba Cloud reminds you to carefully read and fully understand the terms and conditions of this legal disclaimer before you read or use this document. If you have read or used this document, it shall be deemed as your total acceptance of this legal disclaimer. 1. You shall download and obtain this document from the Alibaba Cloud website or other Alibaba Cloud-authorized channels, and use this document for your own legal business activities only. The content of this document is considered confidential information of Alibaba Cloud. You shall strictly abide by the confidentiality obligations. No part of this document shall be disclosed or provided to any third party for use without the prior written consent of Alibaba Cloud. 2. No part of this document shall be excerpted, translated, reproduced, transmitted, or disseminated by any organization, company, or individual in any form or by any means without the prior written consent of Alibaba Cloud. 3. The content of this document may be changed due to product version upgrades , adjustments, or other reasons. Alibaba Cloud reserves the right to modify the content of this document without notice and the updated versions of this document will be occasionally released through Alibaba Cloud-authorized channels. You shall pay attention to the version changes of this document as they occur and download and obtain the most up-to-date version of this document from Alibaba Cloud-authorized channels. 4. This document serves only as a reference guide for your use of Alibaba Cloud products and services. -
Finding Security Vulnerabilities in Java Applications with Static Analysis
Finding Security Vulnerabilities in Java Applications with Static Analysis V. Benjamin Livshits and Monica S. Lam Computer Science Department Stanford University {livshits, lam}@cs.stanford.edu Abstract curity breach and an average episode results in close to $4 million in losses [10]. A recent penetration test- This paper proposes a static analysis technique for ing study performed by the Imperva Application De- detecting many recently discovered application vulner- fense Center included more than 250 Web applications abilities such as SQL injections, cross-site scripting, and from e-commerce, online banking, enterprise collabo- HTTP splitting attacks. These vulnerabilities stem from ration, and supply chain management sites [54]. Their unchecked input, which is widely recognized as the most vulnerability assessment concluded that at least 92% of common source of security vulnerabilities in Web appli- Web applications are vulnerable to some form of hacker cations. We propose a static analysis approach based on attacks. Security compliance of application vendors is a scalable and precise points-to analysis. In our system, especially important in light of recent U.S. industry reg- user-provided specifications of vulnerabilities are auto- ulations such as the Sarbanes-Oxley act pertaining to in- matically translated into static analyzers. Our approach formation security [4, 19]. finds all vulnerabilities matching a specification in the statically analyzed code. Results of our static analysis A great deal of attention has been given to network- are presented to the user for assessment in an auditing level attacks such as port scanning, even though, about interface integrated within Eclipse, a popular Java devel- 75% of all attacks against Web servers target Web-based opment environment. -
Header Enrichment Or ISP Enrichment? Emerging Privacy Threats in Mobile Networks
Header Enrichment or ISP Enrichment? Emerging Privacy Threats in Mobile Networks Narseo Vallina-Rodriguez∗, Srikanth Sundaresan∗, Christian Kreibich∗†,Vern Paxson∗‡ ∗ICSI, †Lastline, ‡UC Berkeley {narseo,srikanth}@icsi.berkeley.edu, {christian,vern}@icir.org ABSTRACT with getting good attribution data. — C. Hillier, VP HTTP header enrichment allows mobile operators to anno- of Verizon’s Precision Market Insights division [11] tate HTTP connections via the use of a wide range of re- This quote illustrates two important challenges mobile op- quest headers. Operators employ proxies to introduce such erators face today: how to ease network management and headers for operational purposes, and—as recently widely how to increase revenue by monetizing subscriber metadata publicized—also to assist advertising programs in identi- and traffic. fying the subscriber responsible for the originating traffic, HTTP header enrichment allows operators to kill two with significant consequences for the user’s privacy. In this birds with one stone [6]: first, operators can append infor- paper, we use data collected by the Netalyzr network trou- mation into HTTP traffic to enable attribution (of network re- bleshooting service over 16 months to identify and charac- sources to specific users users), performance enhancement, terize HTTP header enrichment in modern mobile networks. analytics, and content access control and customization [4, p. We present a timeline of HTTP header usage for 299 mobile 62]; second, operators can monetize their network and user service providers from 112 countries, observing three main base through advertising programs by taking advantage of categories: (1) unique user and device identifiers (e.g., IMEI their position to inject unique tracking identifiers into every and IMSI), (2) headers related to advertising programs, and HTTP request, popularly known as “super-cookies” [8]. -
Cache-Poisoned Denial-Of-Service Attack
Your Cache Has Fallen: Cache-Poisoned Denial-of-Service Attack Hoai Viet Nguyen, Luigi Lo Iacono Hannes Federrath Data & Application Security Group Security in Distributed Systems Group Cologne University of Applied Sciences, Germany University of Hamburg, Germany {viet.nguyen,luigi.lo_iacono}@th-koeln.de [email protected] ABSTRACT 1 INTRODUCTION Web caching enables the reuse of HTTP responses with the aim Contemporary distributed software systems require to scale at large to reduce the number of requests that reach the origin server, the in order to efficiently handle the sheer magnitude of requests stem- volume of network traffic resulting from resource requests, and ming, e.g., from human users all over the globe or sensors scattered the user-perceived latency of resource access. For these reasons, around in an environment. A common architectural approach to a cache is a key component in modern distributed systems as it cope with this requirement is to design the system in layers com- enables applications to scale at large. In addition to optimizing posed of distinct intermediaries. Application-level messages travel performance metrics, caches promote additional protection against through such intermediate systems on their path between a client Denial of Service (DoS) attacks. and a server. Common intermediaries include caches, firewalls, load In this paper we introduce and analyze a new class of web cache balancers, document routers and filters. poisoning attacks. By provoking an error on the origin server that The caching of frequently used resources reduces network traffic is not detected by the intermediate caching system, the cache gets and optimizes application performance and is one major pillar of poisoned with the server-generated error page and instrumented success of the web. -
1 Vulnerability Analysis of Web-Based Applications
1 Vulnerability Analysis of Web-based Applications Summary. In the last few years, the popularity of web-based applications has grown tremendously. A number of factors have led an increasing number of orga- nizations and individuals to rely on web-based applications to provide access to a variety of services. Today, web-based applications are routinely used in security- critical environments, such as medical, financial, and military systems. Web-based systems are a composition of infrastructure components, such as web servers and databases, and of application-specific code, such as HTML-embedded scripts and server-side CGI programs. While the infrastructure components are usu- ally developed by experienced programmers with solid security skills, the application- specific code is often developed under strict time constraints by programmers with little security training. As a result, vulnerable web-based applications are deployed and made available to the whole Internet, creating easily-exploitable entry points for the compromise of entire networks. To ameliorate these security problems, it is necessary to develop tools and tech- niques to improve the security of web-based applications. The most effective ap- proach would be to provide secure mechanisms that can be used by well-trained developers. Unfortunately, this is not always possible, and a second line of defense is represented by auditing the application code for possible security problems. This activity, often referred to as web vulnerability analysis, allows one to identify security problems in web-based applications at early stages of development and deployment. Recently, a number of methodologies and tools have been proposed to support the assessment of the security of web-based applications.