Automated Detection of Complexvulnerabilities with Static

Total Page:16

File Type:pdf, Size:1020Kb

Automated Detection of Complexvulnerabilities with Static Automated DetectionAutomatisierte of Complex Sicherheitsanalyse Vulnerabilities with Static Code Analysisvon Webapplikationen Automated Detection of Complex Vulnerabilities with Static Code Analysis Johannes Dahse, Dortmund, 10 Nov 2016 Automated DetectionAutomatisierte of Complex Sicherheitsanalyse Vulnerabilities with Static Code Analysisvon Webapplikationen 1. Introduction 2. Static Code Analysis 3. First-order Bug Detection 4. Second-order Bug Detection 5. Gadget Chain Detection 1. Introduction Automated DetectionAutomatisierte of Complex Sicherheitsanalyse Vulnerabilities 2. Static Code Analysis 3. First-order Bugs with Static Code Analysisvon Webapplikationen 4. Second-order Bugs 5. Gadget Chains 1.1 About ● Dr. Johannes Dahse ● CEO of RIPS Technologies ● Study/Ph.D. IT-Security, Ruhr-University Bochum ● Security Consultant ● CTF participant ● @FluxReiners, websec.wordpress.com ● Developer of RIPS www.ripstech.com 3 1. Introduction Automated DetectionAutomatisierte of Complex Sicherheitsanalyse Vulnerabilities 2. Static Code Analysis 3. First-order Bugs with Static Code Analysisvon Webapplikationen 4. Second-order Bugs 5. Gadget Chains 1.2 Research Timeline ● 2007 – 2009: PHP Scanner based on Regex used for CTF competitions ● 2009 – 2011: RIPS 1st Generation based on Tokenizer open sourced during MOPS (2nd place) ● 2012: RIPS 2nd Generation based on AST and CFG subject of master thesis ● 2013 – 2015: RIPS 3rd Generation subject of doctor thesis ● 2016: RIPS (Standalone / Cloud) 4 1. Introduction Automated DetectionAutomatisierte of Complex Sicherheitsanalyse Vulnerabilities 2. Static Code Analysis 3. First-order Bugs with Static Code Analysisvon Webapplikationen 4. Second-order Bugs 5. Gadget Chains 1.3 The Role of PHP in Security ● 82.2 % of the websites run PHP as server-side language ● Dynamic language, built-in features, oddities / pitfalls ● 25 % of all reported CVE vulnerabilities are related to PHP ● Sucuri Website Hacked Report: 97 % of hacked websites run PHP CMS Source: W3Techs Source: MITRE CVE 8000 PHP 7000 ASP 6000 Java 5000 CFM Other 4000 Ruby PHP 3000 Perl 2000 Python 1000 JS 0 0 10 20 30 40 50 60 70 80 90 00 01 02 03 04 05 06 07 08 09 10 11 12 13 14 5 1. Introduction Automated DetectionAutomatisierte of Complex Sicherheitsanalyse Vulnerabilities 2. Static Code Analysis 3. First-order Bugs with Static Code Analysisvon Webapplikationen 4. Second-order Bugs 5. Gadget Chains 1.4 Security Vulnerability Demo 6 1. Introduction Automated DetectionAutomatisierte of Complex Sicherheitsanalyse Vulnerabilities 2. Static Code Analysis 3. First-order Bugs with Static Code Analysisvon Webapplikationen 4. Second-order Bugs 5. Gadget Chains 1.5 Goal ● Automated security analysis of PHP code - Analyze dynamic language - Support variety of language features - Detect common vulnerability types - Detect complex vulnerabilities - Scale to large applications - Non-annotation based 7 1. Introduction Automated DetectionAutomatisierte of Complex Sicherheitsanalyse Vulnerabilities 2. Static Code Analysis 3. First-order Bugs with Static Code Analysisvon Webapplikationen 4. Second-order Bugs 5. Gadget Chains 2. Static Code Analysis 8 1. Introduction Automated DetectionAutomatisierte of Complex Sicherheitsanalyse Vulnerabilities 2. Static Code Analysis 3. First-order Bugs with Static Code Analysisvon Webapplikationen 4. Second-order Bugs 5. Gadget Chains 2.1 Overview ● Transform code into abstract syntax tree (AST) ● Split AST into basic blocks ● Analyze data flow within each basic block ● Summarize data flow in block and function summaries ● Connect basic blocks to a control flow graph (CFG) ● Perform backwards-directed taint analysis for each sensitive sink Code AST Basic Blocks CFG Report 9 1. Introduction Automated DetectionAutomatisierte of Complex Sicherheitsanalyse Vulnerabilities 2. Static Code Analysis 3. First-order Bugs with Static Code Analysisvon Webapplikationen 4. Second-order Bugs 5. Gadget Chains 3. First-order Bug Detection 10 1. Introduction Automated DetectionAutomatisierte of Complex Sicherheitsanalyse Vulnerabilities 2. Static Code Analysis 3. First-order Bugs with Static Code Analysisvon Webapplikationen 4. Second-order Bugs 5. Gadget Chains 3.1 Traditional Vulnerability Types ✗ Authorization Bypass ✔ File Inclusion ✔ Open Redirect ✗ Cross-Site Request Forgery ✔ File Write ✔ PHP Object Injection ✔ Cross-Site Scripting ✔ File System Manipulation ✔ PHP Object Instantiation ✔ Code Execution ✔ File Upload ✔ Reflection/Autoload Injection ✔ Command Execution ✔ HTTP Response Splitting ✔ Server-Side JavaScript Injection ✔ Connection String Injection ✔ Information Leakage ✔ Server-Side Request Forgery ✔ Denial of Service ✔ LDAP Injection ✔ Session Fixation ✔ Directory Listing ✔ Library Injection ✔ SQL Injection ✔ Environment Manipulation ✔ Log Forge ✔ Variable Manipulation ✔ Execution After Redirect ✔ Mass Assignment ✔ Weak Cryptography ✔ File Create ✔ Memcached Injection ✔ XML/XXE Injection ✔ File Delete ✔ MongoDB Injection ✔ XPath Injection ✔ File Disclosure ✔ NoSQL Injection ✔ Xquery Injection 11 1. Introduction Automated DetectionAutomatisierte of Complex Sicherheitsanalyse Vulnerabilities 2. Static Code Analysis 3. First-order Bugs with Static Code Analysisvon Webapplikationen 4. Second-order Bugs 5. Gadget Chains 3.2 Taint Analysis user input sensitive sink $_GET print() XSS $_POST mysql_query() SQL Injection $_COOKIE include() File Inclusion + = $_REQUEST eval() Code Execution $_FILES system() Command Execution $_SERVER ... ... ... 12 1. Introduction Automated DetectionAutomatisierte of Complex Sicherheitsanalyse Vulnerabilities 2. Static Code Analysis 3. First-order Bugs with Static Code Analysisvon Webapplikationen 4. Second-order Bugs 5. Gadget Chains 3.2 Taint Analysis (Refined) user input sanitization sensitive sink $_GET htmlentities() print() XSS $_POST addslashes() mysql_query() SQL Injection $_COOKIE basename() include() File Inclusion + + = $_REQUEST (int) eval() Code Exec $_FILES escapeshellarg() system() Cmd Exec $_SERVER ... ... ... ... 13 1. Introduction Automated DetectionAutomatisierte of Complex Sicherheitsanalyse Vulnerabilities 2. Static Code Analysis 3. First-order Bugs with Static Code Analysisvon Webapplikationen 4. Second-order Bugs 5. Gadget Chains 3.3 Security Mechanisms source 1 $url = htmlentities($_GET['id']); “ → &quot; 2 echo '<a href=““>' . $url . '</a>'; < → &lt; 3 echo “<a href='$url'>click</a>“; sanitization 4 echo '<a href=“' . $url . '“>click</a>'; sensitive sink 14 1. Introduction Automated DetectionAutomatisierte of Complex Sicherheitsanalyse Vulnerabilities 2. Static Code Analysis 3. First-order Bugs with Static Code Analysisvon Webapplikationen 4. Second-order Bugs 5. Gadget Chains 3.3 Security Mechanisms source 1 $url = htmlentities($_GET['id']); “ → &quot; 2 echo '<a href=““>' . $url . '</a>'; < → &lt; 3 echo “<a href='$url'>click</a>“; 'onclick='alert(1) sanitization 4 echo '<a href=“' . $url . '“>click</a>'; javascript:alert(1) sensitive sink 15 1. Introduction Automated DetectionAutomatisierte of Complex Sicherheitsanalyse Vulnerabilities 2. Static Code Analysis 3. First-order Bugs with Static Code Analysisvon Webapplikationen 4. Second-order Bugs 5. Gadget Chains 3.4 Taint Analysis (Context-Sensitive) user input sanitization markup sensitive sink $_GET htmlentities() HTML print() XSS $_POST addslashes() SQL mysql_query() SQL Injection $_COOKIE basename() File Path include() File Inclusion + + + = $_REQUEST (int) PHP eval() Code Exec $_FILES escapeshellarg() OS Command system() Cmd Exec $_SERVER ... ... ... ... ... 16 1. Introduction Automated DetectionAutomatisierte of Complex Sicherheitsanalyse Vulnerabilities 2. Static Code Analysis 3. First-order Bugs with Static Code Analysisvon Webapplikationen 4. Second-order Bugs 5. Gadget Chains 3.5 Context-Sensitive Taint Analysis 1 $id = $_POST['id']; $id = $_POST['id']; 2 if(...) { 3 $id = (int)$id; 4 } $id = (int)$id; $id = htmlentities($id); 5 else { 6 $id = htmlentities($id); 7 } 8 echo "<div id='$id'>"; echo "<div id='$id'>"; Code AST Basic CFG Report Blocks 17 1. Introduction Automated DetectionAutomatisierte of Complex Sicherheitsanalyse Vulnerabilities 2. Static Code Analysis 3. First-order Bugs with Static Code Analysisvon Webapplikationen 4. Second-order Bugs 5. Gadget Chains 3.5 Context-Sensitive Taint Analysis $id = $_POST['id']; $id = (int)$id; $id = htmlentities($id); Markup Context $id: HTML attribute single-quoted (SQ) echo "<div id='$id'>"; Code AST Basic CFG Report Blocks 18 1. Introduction Automated DetectionAutomatisierte of Complex Sicherheitsanalyse Vulnerabilities 2. Static Code Analysis 3. First-order Bugs with Static Code Analysisvon Webapplikationen 4. Second-order Bugs 5. Gadget Chains 3.5 Context-Sensitive Taint Analysis $id = $_POST['id']; Sanitized: Integer only $id = (int)$id; $id = htmlentities($id); $id Markup Context $id: HTML attribute single-quoted (SQ) echo "<div id='$id'>"; Code AST Basic CFG Report Blocks 19 1. Introduction Automated DetectionAutomatisierte of Complex Sicherheitsanalyse Vulnerabilities 2. Static Code Analysis 3. First-order Bugs with Static Code Analysisvon Webapplikationen 4. Second-order Bugs 5. Gadget Chains 3.5 Context-Sensitive Taint Analysis Vulnerable! User input (no " < >) $_POST $id = $_POST['id']; $id id XSS <> XSS DQ" $id = htmlentities($id); Element Attribute $id = (int)$id; Markup Context $id: HTML attribute single-quoted (SQ) echo "<div id='$id'>"; Code AST Basic CFG Report Blocks 20 1. Introduction Automated DetectionAutomatisierte of Complex Sicherheitsanalyse
Recommended publications
  • Mitigating SQL Injection Attacks on Legacy Web Applications
    You shall not pass: Mitigating SQL Injection Attacks on Legacy Web Applications Rasoul Jahanshahi Adam Doupé Manuel Egele [email protected] [email protected] [email protected] Boston University Arizona State University Boston University ABSTRACT four most popular web apps (i.e., Wordpress, Joomla, Drupal, and SQL injection (SQLi) attacks pose a significant threat to the security Magento) increased by 267% compared to the prior year. of web applications. Existing approaches do not support object- There has been a great deal of research into identifying SQLi oriented programming that renders these approaches unable to vulnerabilities and defending against SQLi attacks on web apps. protect the real-world web apps such as Wordpress, Joomla, or Proposed approaches used various techniques such as static anal- Drupal against SQLi attacks. ysis [10, 11, 20, 22, 35], dynamic analysis [3, 6, 15, 21, 24, 25, 37], We propose a novel hybrid static-dynamic analysis for PHP or a mix of static-dynamic analysis [5, 17, 28]. While static analy- web applications that limits each PHP function for accessing the sis approaches can be promising, static analysis cannot determine database. Our tool, SQLBlock, reduces the attack surface of the whether input sanitization is performed correctly or not [34]. If the vulnerable PHP functions in a web application to a set of query sanitization function does not properly sanitize user-input, SQLi descriptors that demonstrate the benign functionality of the PHP attacks can still happen. Moreover, to the best of our knowledge, function. prior static analysis approaches for finding SQLi vulnerabilities in We implement SQLBlock as a plugin for MySQL and PHP.
    [Show full text]
  • Snuffleupagus Documentation
    Snuffleupagus Documentation Release stable Sebastien Blot & Julien Voisin Aug 29, 2021 Contents 1 Documentation 3 1.1 Features..................................................3 1.2 Installation................................................ 11 1.3 Configuration............................................... 14 1.4 Download................................................. 22 1.5 Changelog................................................ 23 1.6 FAQ.................................................... 29 1.7 Propaganda................................................ 33 1.8 Cookies.................................................. 35 2 Greetings 39 i ii Snuffleupagus Documentation, Release stable Snuffleupagus is a PHP7+ and PHP8+ module designed to drastically raise the cost of attacks against websites. This is achieved by killing entire bug classes and providing a powerful virtual-patching system, allowing the administrator to fix specific vulnerabilities without having to touch the PHP code. Contents 1 Snuffleupagus Documentation, Release stable 2 Contents CHAPTER 1 Documentation 1.1 Features Snuffleupagus has a lot of features that can be divided in two main categories: bug-classes killers and virtual-patching. The first category provides primitives to kill various bug families (like arbitrary code execution via unserialize for example) or raise the cost of exploitation. The second category is a highly configurable system to patch functions in php itself. 1.1.1 Bug classes killed or mitigated system injections The system function executes an external
    [Show full text]
  • Arxiv:2102.03131V1 [Cs.CR] 5 Feb 2021 Extensions Are Available Within Systems Like Wordpress Or Called Joomla
    Over 100 Bugs in a Row: Security Analysis of the Top-Rated Joomla Extensions Marcus Niemietz, Mario Korth, Christian Mainka, Juraj Somorovsky fi[email protected] Hackmanit GmbH Abstract like WordPress and Joomla. There exists a family of tools Nearly every second website is using a Content Manage- which, inter alia, allow researchers and penetration testers to ment System (CMS) such as WordPress, Drupal, and Joomla. scan CMS software (e.g., WPScan [4], JoomScan [10]) for These systems help to create and modify digital data, typically well-known issues. Although community-based projects like within a collaborative environment. One common feature is to Joomla make use of tools like static source code scanners, it enrich their functionality by using extensions. Popular exten- seems to be a non-trivial task to detect well-known vulnerabil- sions allow developers to easily include payment gateways, ities such as XSS and SQLi, as shown by security researches backup tools, and social media components. multiple times [29]. To provide an example, Joomla intro- Due to the extended functionality, it is not surprising that duced the usage of the code analysis tool RIPS in June 2018 such an expansion of complexity implies a bigger attack sur- [7, 16]. Although RIPS is explicitly designed to detect web face. In contrast to CMS core systems, extensions are usu- vulnerabilities like XSS, Joomla has officially announced 30 ally not considered during public security audits. However, security vulnerabilities within the first half year of 2019, and a Cross-Site Scripting (XSS) or SQL injection (SQLi) at- 12 of them were XSS issues [17].
    [Show full text]
  • Snuffleupagus
    » SnuFfLEupAGus A ghostly elephant, in your php stack, killing bug classes, defeating attacks, and virtual-patching what is remaining. 1 / 106 » Bonjour 2 / 106 » I'm sorry 3 / 106 » Good evening We're glad to be here We're working at the same (French¹) company In the security team. It's called NBS System And it's a hosting company, you know, for websites. ¹ Hence our lovely accent. 4 / 106 » What are we trying to solve? We're hosting a lot of various php applications, using CMS written by super- duper creative people, and we'd like to prevent our customers from being pwned. 5 / 106 » What we were doing so far We have a lot of os-level hardening (grsecurity ♥) We have some custom IDS We have a (cool) WAF called naxsi But not everything is patchable with those, and we can not² touch the PHP code. ¹ And to be honest, we don't want to. 6 / 106 » Some words about php Its syntax draws upon C, Java, and Perl, and is easy to learn. The main goal of the language is to allow web developers to write dynamically generated web pages quickly, but you can do much more with PHP. — the php documentation 7 / 106 » Still words about php Well, there were other factors in play there. htmlspecialchars was a very early function. Back when PHP had less than 100 functions and the function hashing mechanism was strlen(). In order to get a nice hash distribution of function names across the various function name lengths names were picked specifically to make them fit into a specific length bucket.
    [Show full text]
  • A Static Vulnerability Analysis Tool for PHP
    PHPWander: A Static Vulnerability Analysis Tool for PHP Pavel Jurásek Thesis submitted for the degree of Master in Informatics: Programming and Networks 60 credits Department of Informatics Faculty of mathematics and natural sciences UNIVERSITY OF OSLO Spring 2018 PHPWander: A Static Vulnerability Analysis Tool for PHP Pavel Jurásek © 2018 Pavel Jurásek PHPWander: A Static Vulnerability Analysis Tool for PHP http://www.duo.uio.no/ Printed: Reprosentralen, University of Oslo PHPWander: A Static Vulnerability Analysis Tool for PHP Pavel Jurásek 16th May 2018 ii Contents 1 Introduction 1 I Background 3 2 Security vulnerabilities 5 2.1 Injections . .5 2.2 Cross-site scripting (XSS) . .6 2.3 Command injection . .7 2.4 Code injection . .7 2.5 Path traversal . .8 2.6 Other vulnerabilities . .8 3 PHP Language 9 3.1 History and description . .9 3.2 Typing . .9 3.3 Predefined variables . 10 3.4 Object-oriented aspects in PHP . 10 3.5 Class autoloading . 11 4 Static analysis 13 4.1 Data flow analysis . 13 4.2 Taint analysis . 14 4.2.1 Tainting method . 14 4.2.2 Control flow graphs . 14 4.3 Data flow sensitivities . 15 4.3.1 Flow sensitivity . 15 4.3.2 Context sensitivity . 16 4.4 SSA form . 16 4.5 Static analysis tools for PHP . 17 4.5.1 Code improvement tools . 17 4.5.2 Security checking tools . 18 II Development 19 5 Development phase 21 5.1 Architecture . 21 iii 5.2 Design decisions . 21 5.2.1 Configuration . 21 5.2.2 Software foundations . 23 5.2.3 Implementation details .
    [Show full text]
  • TAP: a Static Analysis Model for PHP Vulnerabilities Based on Token and Deep Learning Technology
    RESEARCH ARTICLE TAP: A static analysis model for PHP vulnerabilities based on token and deep learning technology 1 1 1 2 Yong Fang , Shengjun Han , Cheng HuangID *, Runpu Wu 1 College of Cybersecurity, Sichuan University, Chengdu 610065, China, 2 China Information Technology Security Evaluation Center, Beijing 100085, China * [email protected] a1111111111 a1111111111 a1111111111 Abstract a1111111111 a1111111111 With the widespread usage of Web applications, the security issues of source code are increasing. The exposed vulnerabilities seriously endanger the interests of service providers and customers. There are some models for solving this problem. However, most of them rely on complex graphs generated from source code or regex patterns based on expert OPEN ACCESS experience. In this paper, TAP, which is based on token mechanism and deep learning tech- Citation: Fang Y, Han S, Huang C, Wu R (2019) nology, was proposed as an analysis model to discover the vulnerabilities of PHP: Hypertext TAP: A static analysis model for PHP vulnerabilities Preprocessor (PHP) Web programs conveniently and easily. Based on the token mecha- based on token and deep learning technology. nism of PHP language, a custom tokenizer was designed, and it unifies tokens, supports PLoS ONE 14(11): e0225196. https://doi.org/ 10.1371/journal.pone.0225196 some features of PHP and optimizes the parsing. Besides, the tokenizer also implements parameter iteration to achieve data flow analysis. On the Software Assurance Reference Editor: Hua Wang, Victoria University, AUSTRALIA Dataset(SARD) and SQLI-LABS dataset, we trained the deep learning model of TAP by Received: May 24, 2019 combining the word2vec model with Long Short-Term Memory (LSTM) network algorithm.
    [Show full text]
  • A Practical Experience on the Impact of Plugins in Web Security
    A Practical Experience on the Impact of Plugins in Web Security José Fonseca Marco Vieira CISUC, University of Coimbra / CISUC, University of Coimbra Polytechnic Institute of Guarda, Portugal Coimbra, Portugal [email protected] [email protected] Abstract—In an attempt to support customization, many web trolled development processes and poor quality assurance applications allow the integration of third-party server-side activities applied during the development of such plugins, plugins that offer diverse functionality, but also open an addi- which are not able to prevent security vulnerabilities from tional door for security vulnerabilities. In this paper we study being shipped into the field. the use of static code analysis tools to detect vulnerabilities in Penetration testing and static analysis are examples of the plugins of the web application. The goal is twofold: 1) to well-known techniques frequently used by web developers to study the effectiveness of static analysis on the detection of web identify security vulnerabilities in their code. Penetration application plugin vulnerabilities, and 2) to understand the testing consists in stressing the application from the point of potential impact of those plugins in the security of the core web view of an attacker (“black-box” approach) using specific application. We use two static code analyzers to evaluate a malicious inputs. On the other hand, static analysis is a large number of plugins for a widely used Content Manage- ment System. Results show that many plugins that are current- “white-box” approach based on the analysis of the source ly deployed worldwide have dangerous Cross Site Scripting code of the application (without executing it) looking for and SQL Injection vulnerabilities that can be easily exploited, potential vulnerabilities.
    [Show full text]
  • Weekly Zero Day Vulnerability Coverage Bulletin
    Weekly Zero-Day Vulnerability Coverage Bulletin (15th July – 21st July) Summary: Total 6 Zero-Day Vulnerabilities were discovered in 3 Categories in this week 2 1 3 Cross Site Scripting SQL Injection Command Injection Zero-Day Vulnerabilities Protected through Core Rules 6 Zero-Day Vulnerabilities Protected through Custom Rules 0* Zero-Day Vulnerabilities for which protection cannot be determined 0** Zero-Day Vulnerabilities found by Haiku Scanner 6 * To enable custom rules please contact [email protected] ** Since attack vectors are not known, Indusface cannot determine if these vulnerabilities are protected Vulnerability Trend: Weekly Vulnerability Trend displays the total no. of vulnerabilities discovered to the protection given for a quarter. Of Zero-Day Vulnerabilities Of Zero-Day Vulnerabilities Of Zero-Day Vulnerabilities 49% were protected by Core 7% were protected by Custom 44% were reported by Haiku Rules in last quarter Rules in last quarter Scanner in last quarter From the graph, we infer that maximum Cross Site Scripting and SQL Injection vulnerabilities were discovered in May compared to other months and categories so far. Zero Directory Traversal vulnerabilities are found in June. Note: Our Sig-Dev team constantly monitors the security landscape and leading security websites to identify any new vulnerabilities identified/published and monitors/updates rules to ensure around the clock protection for customer sites. www.indusface.com Details: S. No. Vulnerability Public ID Vulnerability Vulnerability Description AppTrana Haiku Type Name Coverage Scanner Coverage 1. Cross Site NA Magento 2.3.1: A successful attack enables Protected by Detected by Scripting Unauthenticate an unauthenticated Default Rules. scanner as d Stored XSS to Cross Site RCE adversary to persistently Scripting inject a JavaScript payload attack.
    [Show full text]
  • How We Found 5 0Days in Wordpress
    How we found 5 0days in WordPress Simon Scannell, RIPS Technologies ​ www.ripstech.com 18.11.2019 1. Introduction 2 2. Methodology 3 2.1 Traditional Code Audit Approaches 3 2.2 Drawbacks of Traditional Approaches 3 2.3 Case Study 4 2.3.1 Limited Local File Inclusion 5 2.3.2 Breaking the Limitation 5 2.4 Finding an Efficient Methodology 7 2.4.1 Step #1 - Component Identification 7 2.4.2 Step #2 - Feature Breakdown 8 2.4.3 Step #3 - Feature Vulnerabilities 9 2.4.4 Step #4 - Vulnerability Chains 10 3. Vulnerability Analysis 12 3.1 CVE-2018-12895: Authenticated File Deletion 12 3.1.1 Abstracting the Media File Functionality 12 3.1.2 Background - Understanding Post Meta Entries 13 3.1.3 Insufficient Validation in Post Meta Component 14 3.1.4 Impact and Limitations 15 3.2 CVE-2019-8943: Authenticated Path Traversal and LFI 16 3.2.1 Abstracting the Image Cropping Functionality 16 3.2.2 Path Traversal in Image Editing 17 3.2.3 Impact and Limitations 19 3.3 CVE-2019-9787: Unauthenticated CSRF to XSS 20 3.3.1 Abstracting the Comment Functionality 20 3.3.2 Sanitization Bypass in SEO Optimization 21 3.3.3 Limitations and Bug Chaining 22 3.3.4 CSRF Vulnerability in Comments 22 3.3.5 Impact and Limitations 24 4. Exploitation Chain 25 4.1 Step #1 - Plugin Vulnerabilities 25 4.2 Step #2 - Attacking WordPress Core via CSRF 25 4.3 Step #3 - Exploiting Authenticated Vulnerabilities 26 4.4 Bonus: Wormable Stored XSS on WordPress.org 27 4.5 Putting it all together 28 Summary 30 References 31 ©2019 RIPS Technologies | Whitepaper​ ​| ​www.ripstech.com 1 1.
    [Show full text]
  • Experience Report: an Empirical Study of PHP Security Mechanism Usage
    Experience Report: An Empirical Study of PHP Security Mechanism Usage Johannes Dahse and Thorsten Holz Horst Görtz Institute for IT-Security (HGI) Ruhr-University Bochum, Germany {firstname.lastname}@rub.de ABSTRACT 1. INTRODUCTION The World Wide Web mainly consists of web applications Empirical studies of security vulnerabilities found in the written in weakly typed scripting languages, with PHP being last years [3, 7, 28, 31] indicate that web-related vulnera- the most popular language in practice. Empirical evidence bilities such as cross-site scripting (XSS) and SQL injection based on the analysis of vulnerabilities suggests that security (SQLi) are among the most common software flaws. In fact, is often added as an ad-hoc solution, rather than planning such vulnerabilities are more frequently detected in the re- a web application with security in mind during the design cent years than memory corruption vulnerabilities. This ob- phase. Although some best-practice guidelines emerged, no servation suggests that security is only added as an ad-hoc comprehensive security standards are available for develop- solution in web applications, rather than planning such ap- ers. Thus, developers often apply their own favorite security plications with security in mind during the design phase. mechanisms for data sanitization or validation to prohibit Although some best-practice guidelines on secure web pro- malicious input to a web application. gramming emerged (e.g., recommendations by OWASP [17]), In the context of our development of a new static code no comprehensive security standards are available for devel- analysis tool for vulnerability detection, we studied com- opers. This leads to the observation that each developer monly used input sanitization or validation mechanisms in applies his own favorite security mechanisms for data sani- 25 popular PHP applications.
    [Show full text]
  • Static Detection of Complex Vulnerabilities in Modern PHP Applications
    Static Detection of Complex Vulnerabilities in Modern PHP Applications Dissertation zur Erlangung des Grades eines Doktor-Ingenieurs der Fakultät für Elektrotechnik und Informationstechnik an der Ruhr-Universität Bochum vorgelegt von Johannes Dahse aus Jena Bochum, 02.02.2016 Gutachter: Prof. Dr. Thorsten Holz (Ruhr-Universität Bochum) Zweitgutachter: Prof. Dr. Andrei Sabelfeld (Chalmers University of Technology) Tag der mündlichen Prüfung: 11. März 2016 Abstract Modern websites evolved to interactive applications which process confidential user data, such as credit card numbers, passwords, and private messages, on a daily basis. This sensitive data requires reliable protection from cyber criminals who exploit vulnerabilities in the applications’ source code. Particularly web applications developed in PHP, the most popular server-side scripting language on the Web, are prone to security vulnerabilities. Although the developers’ awareness is rising for the traditional types of vulnerabilities, such as cross-site scripting and SQL injection, they still persist due to faulty security mechanisms or intricate language features. Besides, more complex vulnerability types, such as second-order vulnerabilities or PHP object injections, are comparatively unknown and actively exploited by attackers. Manual detection of complex vulnerabilities in modern PHP applications with hundreds of thousands lines of code is expensive, time-consuming, and requires deep security knowl- edge. With the help of static code analysis, security vulnerabilities can be detected in an automated fashion and subsequently remediated. However, previous work in this area focused only on the detection of a few traditional vulnerability types and dismissed more complex occurrences or types of vulnerabilities. Additionally, these approaches do not scale to large code bases or do not support major language features.
    [Show full text]
  • Snuffleupagus
    » SnuFfLEupAGus Killing bug classes, virtual-patching the rest! 1 / 64 » Who are we? We're working at the same (French¹) company In the security team. It's called NBS System And it's a hosting company, you know, for websites. ¹ Hence our lovely accent. 2 / 64 » What are we trying to solve? We're hosting a lot of various █████████████ php applications using CMS ████████ ████████ ██████████████████ ████████████ ████████████, and we'd like to prevent our customers from being pwned. 3 / 64 » What we were doing so far We have a lot of os-level hardening We have some custom IDS We have a (cool) WAF called naxsi But not everything is patchable with those, and we can not touch the PHP code. 4 / 64 » Some words about php Its syntax draws upon C, Java, and Perl, and is easy to learn. The main goal of the language is to allow web developers to write dynamically generated web pages quickly, but you can do much more with PHP. — the php documentation 5 / 64 » Still words about php Well, there were other factors in play there. htmlspecialchars was a very early function. Back when PHP had less than 100 functions and the function hashing mechanism was strlen(). In order to get a nice hash distribution of function names across the various function name lengths names were picked specifically to make them fit into a specific length bucket. — Rasmus Lerdorf, creator of PHP 6 / 64 » Words about php, again I don’t know how to stop it, there was never any intent to write a programming language […] I have absolutely no idea how to write a programming language, I just kept adding the next logical step on the way.
    [Show full text]