Are You at Risk of an Injection Attack? These Types of Attacks Are Common, Primarily Because They Affect Ubiquitous SQL Databases

Total Page:16

File Type:pdf, Size:1020Kb

Are You at Risk of an Injection Attack? These Types of Attacks Are Common, Primarily Because They Affect Ubiquitous SQL Databases Are you at risk of an injection attack? These types of attacks are common, primarily because they affect ubiquitous SQL databases. If a user — internal or external — supplies information through a form, you may be at risk. Insufficient input validation may allow users to insert or inject their own parameters in your SQL call and gain access to some or all of your data. Injection flaws occur primarily when an application uses untrusted data when constructing an SQL call or when an application relies on older, vulnerable frameworks. An attacker can simply modify the ‗id‘ parameter in their browser to return all records. More savvy attackers can even, under the right circumstances, make changes to data. In addition to impacting SQL databases, injection flaws can also be found in queries from LDAP, XPath or NoSQL as well as OS commands, SMTP headers, XML parsers and the like. Injection flaws are most common in legacy code, but they are tough to find and eradicate during testing. You really need to examine the code manually to check for injection flaws. Injection attacks can be devastating to your business, both from a technical aspect and from the business side. Once an injection attack takes place, you can no longer trust your data. It may be corrupted or denial of access may occur. In rare cases, injection attacks can take down your entire DBMS or issue commands to your operating system. You lose the ability to guarantee confidentiality to your authorized users or customers, because sensitive information may have been made available to attackers. And if you‘re holding authorization information in your SQL database, an attacker may be able to change this to limit access. From a manager‘s perspective, how does losing the data or having it stolen impact your day-to-day operations? Depending on the sensitivity of the data, such a worst-case breach could be devastating to your company‘s ability to continue operations. It could also be terrible publicity for your company and cost you customers should the breach be made public. Eliminating any opportunities for an attacker to take advantage of injection flaws should be a top consideration for your business because of the high impact a savvy attack could have on critical business data. Injection flaws are common with applications written in PHP or ASP, because these tend to have older functional interfaces. They are much less common with J2EE and ASP.NET applications, which don‘t generally allow SQL injections. While you can‘t assume that applications written in the latter will be fine, you should be more concerned about your legacy apps in PHP and ASP. The first thing to do when investigating the vulnerability of your application to an injection attack is to make sure that any interpreter in use separates the query from any untrusted data. In SQL, you can simply avoid dynamic queries, or you can use bind variables in stored procedures and prepared statements so users are unable to insert text. You can use a code analysis tool to find out if an interpreter is in place and to see the way data flows through the application. Some penetration testers can create scenarios such as would be used by an attacker, and this can tell you if you‘re at risk. But in most cases, you‘ll have to check the code for yourself — that‘s the quickest and most accurate method for determining if the interpreter is present. Scanners can‘t always tell whether an attack could be successfully carried out. In order to keep an attacker from accessing your data, you need to ensure that untrusted data stays separated from commands and queries. That means that an attacker isn‘t able to call records by modifying the ‗id‘ parameter; the query will return nothing. The easiest way to do this? Don‘t use the interpreter at all. A safe API can avoid using the interpreter by creating a parameterized interface that only uses PreparedStatements instead of Statements. These stored procedures are compiled before the user adds any input, so it‘s not possible to modify the SQL statement. Even some stored procedures are vulnerable, so avoid dynamic queries and use parameterized queries. All your SQL statements should recognize user inputs as variables and validate them before passing data back to the user. In other words, statements should be precompiled before actual inputs are substituted for variables. In some cases, there‘s no API with a parameterized interface that is suitable for use. It is possible to escape special characters, but you must use specific escape syntax for whichever interpreter you are running. Check your code library for an escape routine that will work. This is the only way to make special characters safe if they need to be used in your application. While you can ―white list‖ approved characters for use, that may not be a perfect solution if your users need to be able to input many different special characters. You should also avoid disclosing any error information to the user. An uncaught SQL error may contain information like procedure names or table names and, in the hands of a knowledgeable attacker, can be used to access data. Injection flaws are relatively common and should be removed from legacy code. The good news is that most injection flaws are rather hard to exploit — they have to be set up in just the right way for an attacker to take advantage of them. However, if a vulnerability is exploited, it can be very damaging to your business. As part of an overall security review, it may be a good idea to re-examine your databases that allow user queries to ensure that queries or commands and unsecured data are completely separated. Weaknesses arise when form processing code constructs SQL queries on the fly. The naive approach is to construct a prototype statement and fill it out with data from the form fields. A couple of examples: Let‘s suppose that some web application requests a user name and a password to access a private area. The application will pick these values and it will collect a query to send to the database. The query might look like this: 1 select id 2 from users_table 3 where username='$username' and password='$password'; Where $username and $password are replaced by the values the user has entered on the screen. In this case, we allowed the user to write some texts that will be sent to the database without any verification. Given the case of a malicious user, he could write in the password field and in this case, the resulting query will be as follows: 1 select id 2 from users_table 3 where username='admin' and password=''or '1'='1'; This query will produce the same result as if the admin user had introduced their password correctly. So that the web application will allow access to the administration area to a user who doesn‘t know the proper password. Let‘s see another example: SELECT ADDRESS FROM CUSTOMERS WHERE LAST_NAME = ‘#1′ Excessively trusting code will accept whatever the user types into a ―Last Name‖ field and replace ―#1″ with it. This works fine as long as the user types a normal last name. But let‘s say this appears in the form field: Smith';DELETE FROM CUSTOMERS WHERE LAST_NAME = ‘Smith Note the quotation marks. After the SELECT statement, the next statement will delete all rows with the last name of Smith from the CUSTOMERS table. A more elaborate statement could change records or do anything else. Some injection attacks can even obtain information. Reading or modifying the database requires knowing or guessing something about its tables. Less sophisticated attackers can attempt a denial-of-service attack by blindly modifying the SQL to make it invalid. That approach might crash an application on the server or put the database into an invalid state. The backslash (\) character is as dangerous as the quote. A backslash followed by a single quote tells SQL to treat it as a literal quote character, not a string delimiter. Using it at the end of a string leaves the string unterminated, and whatever comes next will be part of the string. A backslash-based SQL injection is harder to construct that one using quote characters, but not impossible. The comment introducer, ―–‖ (two hyphens), will make the database engine ignore the rest of the line. The character sequence ―/*‖ will make it ignore everything until a matching ―*/‖ comment delimiter. These don‘t work within quoted strings, and not all SQL implementations support them, but they provide a venue for injection if the attacker can get outside a quoted string. The attacker can find more options by constructing post data directly rather than going through a Web form. The code needs to validate all post data fields, not just the ones that come from form fields. To get the best chances of success, an attacker needs to learn something about the database. For open-source code, this information may already be available. In other cases, the error-based approach can yield information. The attacker performs a trial injection and hopes to get back an error page. The error report will often consist of a stack dump and a display of the failed SQL statement. This lets the attacker see what injected text can perform harm. A variation on this is a page that displays the SQL output, even if it‘s an error message. The page will look normal, except where the error message appears instead of expected data. This approach also lets the attacker inject arbitrary SELECT statements and see the output on the page.
Recommended publications
  • Arxiv:2106.03271V1 [Cs.SE] 6 Jun 2021
    Noname manuscript No. (will be inserted by the editor) Fixing Vulnerabilities Potentially Hinders Maintainability Sofia Reis · Rui Abreu · Luis Cruz Received: date / Accepted: date Abstract Security is a requirement of utmost importance to produce high- quality software. However, there is still a considerable amount of vulnerabil- ities being discovered and fixed almost weekly. We hypothesize that develop- ers affect the maintainability of their codebases when patching vulnerabili- ties. This paper evaluates the impact of patches to improve security on the maintainability of open-source software. Maintainability is measured based on the Better Code Hub’s model of 10 guidelines on a dataset, including 1300 security-related commits. Results show evidence of a trade-off between secu- rity and maintainability for 41:90% of the cases, i.e., developers may hinder software maintainability. Our analysis shows that 38:29% of patches increased software complexity and 37:87% of patches increased the percentage of LOCs per unit. The implications of our study are that changes to codebases while patching vulnerabilities need to be performed with extra care; tools for patch risk assessment should be integrate into the CI/CD pipeline; computer science curricula needs to be updated; and, more secure programming languages are necessary. Keywords Software Security Software Maintenance Open-Source Software · · Sofia Reis INESC ID and IST, University of Lisbon, Lisbon, Portugal E-mail: sofi[email protected] Rui Abreu INESC ID and FEUP, University of Porto, Porto, Portugal E-mail: [email protected] arXiv:2106.03271v2 [cs.SE] 12 Sep 2021 Luis Cruz Delft University of Technology, Delft, The Netherlands E-mail: [email protected] 2 Sofia Reis et al.
    [Show full text]
  • EBOOK-Injection-Guide.Pdf
    1 INDEX What is Injection .......................................................................................................................... 5 Tainted Data Flow .................................................................................................................... 5 Injection Prevention Rules ...................................................................................................... 6 Injection Types ............................................................................................................................. 7 SQL Injection (CWE-89) ......................................................................................................... 10 LDAP Injection (CWE-90) ....................................................................................................... 13 XML Injection (CWE-91) ......................................................................................................... 15 XPath Injection (CWE-643) .................................................................................................... 16 XML External Entity Reference (XXE) (CWE-611) ................................................................ 18 Expression Language (EL) Injection (CWE-917) .................................................................. 20 OS Command Injection (CWE-78) ......................................................................................... 21 2 According to the OWASP Top 10 Application Security Risks (2017) . ... (https://www.owasp.org/index.php/Top_10-2017_Top_10),
    [Show full text]
  • Rest-Secure-Ebook.Pdf
    This document is about REST security issues and presents the main security problems that need attention, the attack threats and attack surface for REST, and how to handle some common security issues. We will center our discussion around Java-based REST frameworks, but many concepts are also valid for other implementation languages, like PHP, .Net, JavaScript, Python, Ruby … REST (REpresentational State Transfer) is an architectural style to build services on top of the Web. REST simplifies interaction with a web-based system via simplified URLs, instead of complex HTTP requests. A REST-enabled application is made of resources (“nouns“), each responding to different “verbs” (for example, HTTP methods like GET, POST, PUT, DELETE…) over well-defined URLs (typically HTTP/HTTPS URLs) which map entities in the system to endpoints. Each REST request/response to a resource uses one or more resource representation, typically negotiated between client and server (for example, using Accept and Content-Type HTTP headers). Most common representation formats include JSON, XML or raw text, with many other alternatives like YAML, Atom and HTML which are also used. Here are the main characteristics of a REST architecture style: Client-Server: a pull-based interaction style: consuming components pull representations. Stateless: each request from client to server must contain all the information necessary to understand the request, and cannot take advantage of any stored context on the server. Cache aware: to improve network efficiency, responses must be capable of being labeled as cacheable or non-cacheable. Uniform interface: all resources are accessed with a generic interface (e.g., HTTP GET, POST, PUT, DELETE).
    [Show full text]
  • FAQS-1.3.Pdf
    1. Kiuwan Basics ........................................................................................................................ 3 1.1. Where can I find useful Kiuwan resources? .................................................................. 3 1.2. What is a Kiuwan application? ...................................................................................... 3 1.3. What does Kiuwan consider a defect? .......................................................................... 3 1.4. What metrics are measured by Kiuwan? ...................................................................... 3 1.5. What programming languages are supported by Kiuwan?........................................... 4 1.6. What Quality and Security Standards are supported by kiuwan? ................................ 5 1.7. What is the Kiuwan support for SQL? ........................................................................... 5 1.8. Does Kiuwan support mobile technologies? ................................................................. 5 1.9. Does Kiuwan support Sharepoint? ................................................................................ 5 1.10. Does Kiuwan support PHP Symfony ? ....................................................................... 5 1.11. How to analyze ABAP code? ...................................................................................... 5 1.12. How to analyze OracleForms code? .......................................................................... 6 1.13. What is a Quality Model? Should I
    [Show full text]
  • Kiuwan Code Security (SAST). Sicherheitsprobleme Im Devops-Prozess Aufdecken Und Rechtzeitig Beseitigen
    Die Software-Modernisierer Kiuwan Code Security (SAST). Sicherheitsprobleme im DevOps-Prozess aufdecken und rechtzeitig beseitigen. Entlarven Sie Code-Schwachstellen Ihre Vorteile Automatische .Codescans entlarven .Sicherheits- EASIRUN PRODUCT PARTNER schwachstellen .in weni- • Verhindern Sie Probleme und gen. Minuten. Als er- Schwachstellen so früh wie möglich im schwingliche..SaaS- oder On-Premise-Lösung für DevOps-Prozess. Teams und Unternehmen jeder Größe analysiert • Analysieren Sie Ihren Code konsistent in Kiuwan Code Security (SAST) die Compliance des der gesamten Organisation mit zentral Codes nach den strengsten Sicherheitsstandards verwalteten Modellen. wie OWASP und CWE, deckt alle wichtigen Sprachen ab und lässt sich in führende DevOps-Tools • Führen Sie jedes Mal, wenn Sie Ihren integrieren. Code speichern, automatische Analysen in der IDE aus. DevOps in DevSecOps transformieren • Stellen Sie sicher, dass der gesamte Code lokal analysiert wird, bevor er an Die Einführung von DevOps ist ein Meilenstein für die das Code-Repository übergeben wird. agile Softwareentwicklung. Der DevOps-Ansatz für den Softwareentwicklungs-Lebenszyklus (SDLC) ist die • Beheben Sie Probleme und Antwort auf die Geschwindigkeit und den Erweiterbar- Schwachstellen billiger und schneller. keit, die für den Erfolg in der heutigen Umgebung er- • Erstellen Sie von Anfang an bessere forderlich sind. Software. Aber was ist mit der Sicherheit? Schließlich bestand die „alte Schule“ darin, zu warten, bis die Anwendung • Geeignet für jede Entwicklungsmethodik, fertig war und sie für Ad-hoc-Prüfungen an die Sicher- einschließlich Agile und DevOps. heitsexperten weiterzugeben. Mit den flexiblen Inte- grationsmöglichkeiten kann die Prüfung der Code- EasiRunEuropa GmbH Kiuwan Code Security Datenblatt| 1von6 Die Software-Modernisierer sicherheit ein fester Bestandteil jeder Phase des SDLC Ergebnisse der Scans sind innerhalb von Sekunden, sein.
    [Show full text]
  • Magic Quadrant for Application Security Testing
    16/09/2019 Gartner Reprint Licensed for Distribution Magic Quadrant for Application Security Testing Published 18 April 2019 - ID G00346593 - 58 min read By Analysts Ayal Tirosh, Mark Horvath, Dionisio Zumerle DevSecOps, modern web application design and high-profile breaches are expanding the scope of the AST market. Security and risk management leaders will need to meet tighter deadlines and test more complex applications by accelerating efforts to integrate and automate AST in the software life cycle. Strategic Planning Assumption By 2022, 10% of coding vulnerabilities identified by static application security testing (SAST) will be remediated automatically with code suggestions applied from automated solutions, up from less than 1% today. Market Definition/Description Gartner defines the application security testing (AST) market as the sellers of products and services designed to analyze and test applications for security vulnerabilities. Gartner identifies three main styles of AST: ■ SAST technology analyzes an application’s source, bytecode or binary code for security vulnerabilities, typically at the programming and/or testing software life cycle (SLC) phases. ■ Dynamic AST (DAST) technology analyzes applications in their dynamic, running state during testing or operational phases. It simulates attacks against an application (typically web- enabled applications and services), analyzes the application’s reactions and, thus, determines whether it is vulnerable. ■ Interactive AST (IAST) technology combines elements of SAST and DAST simultaneously. It is typically implemented as an agent within the test runtime environment (for example, instrumenting the Java Virtual Machine [JVM] or .NET CLR) that observes operation or attacks and identifies vulnerabilities. AST can be delivered as a tool or as a subscription service.
    [Show full text]
  • Controlo De Acesso Baseado Em Funç ˜Oes E Geraç ˜Ao Autom´Atica De
    UNIVERSIDADE DE LISBOA FACULDADE DE CIENCIASˆ DEPARTAMENTO DE INFORMATICA´ Gestao˜ de Acesso a Dados no Back-End: Controlo de Acesso Baseado em Func¸oes˜ e Gerac¸ao˜ Automatica´ de Relatorios´ Rui Filipe Vilac¸a Oliveira Peixoto Mestrado em Engenharia Informatica´ Especializac¸ao˜ em Engenharia de Software Versao˜ Publica´ Trabalho de Projeto orientado por: Prof. Doutora Andreia Filipa Torcato Mordido 2020 Agradecimentos Primeiramente, gostaria de agradecer a toda a minha fam´ılia, em particular: a` minha namorada, que me apoia incansavel´ e incondicionalmente; aos meus pais, que, apesar das adversidades da vida, sempre me encorajaram e ajudaram a seguir os meus sonhos; aos meus irmaos˜ pelo companheirismo e boa disposic¸ao˜ em todos os momentos; a` minha madrinha por estar sempre presente e dispon´ıvel para tudo. Um especial agradecimento tambem´ aos pais, avos´ e restante fam´ılia da minha namorada, que desde o primeiro dia me acolheram e apoiaram em todos os n´ıveis. Agradec¸o a` Faculdade de Cienciasˆ da Universidade de Lisboa e a todos os meus profes- sores, pelo rigor de ensino e todos os anos de constante aprendizagem ao longo deste percurso academico.´ Um obrigado especial a` minha orientadora, que se mostrou sem- pre interessada e sol´ıcita, desempenhando um papel deveras importante no sucesso deste projeto. Gostaria ainda de agradecer a todos os meus amigos mais proximos,´ incluindo o grupo de amigos do Secundario,´ que mesmo longe se mantem´ solido´ e unido, e aos meus colegas de licenciatura e mestrado, nomeadamente Andre,´ Paulo, Inesˆ e Micael, pelo apoio e todos os trabalhos que desenvolvemos juntos.
    [Show full text]
  • Funcionalidad De Kiuwan
    Date: 02/16/2015 Review: Feb 2015 Version Changes Feb 2015 It updates contents to Kiuwan February 2015’s release. We thank Lourdes Ortiz Saqudo, from Universidad de Huelva, for reviewing the document and detecting some errors. II CHANGES LOG ..................................................................................................................... II CONTRIBUTIONS AND ACKNOWLEDGMENTS .......................................................... II CONTENT ............................................................................................................................. III INDEX OF FIGURES ........................................................................................................... VI 1 INTRODUCTION ............................................................................................................ 1 2 KIUWAN ........................................................................................................................... 1 2.1 FUNCTIONALITIES ........................................................................................................................................... 2 2.2 TARGET USERS ............................................................................................................................................... 3 2.3 HIGHLIGHTS .................................................................................................................................................. 3 2.4 ADVANTAGES ...............................................................................................................................................
    [Show full text]
  • Insights (Sca)
    PRODUCT DATASHEET INSIGHTS (SCA) Almost every developer relies to some degree on open source software, and it’s tough to beat the flexibility of open use and distribution licensing. However, it’s also critical that all developers understand how to control open source components. There are a number of dependency, security, and license compatibility issues involved with open source solutions that require some consideration before launching an application. It is of huge importance to generate a complete and accurate inventory of all open source and third-party components used during builds or in applications. Your open source components are as much a part of your application as the code you’ve built yourself. The role, functions, features, behavior, and licensing of every open source component need to be fully understood in order to properly manage your application deployment and comply with software licensing regulations. Eliminate time consuming and error prone process of manually compiling the inventory - including their dependencies – in an effort to determine if you’re impacted by a new security vulnerability alert or to check for license issues.Draft an official policy that will cover all of the developers under your roof. KIUWAN INSIGHTS STANDS OUT No configuration needed Fully customizable – visually & conceptually Request a free demo or quote and discover how Kiuwan Insights can help you rationalize your application components SOME DETECTED VULNERABILITIES • Application Misconfiguration • Interprocess Communication • Credential/Session
    [Show full text]
  • A Comparative Case Study on Tools for Internal Software Quality Measures
    A Comparative Case Study on Tools for Internal Software Quality Measures Bachelor of Science Thesis in Software Engineering and Management MAYRA NILSSON Department of Computer Science and Engineering UNIVERSITY OF GOTHENBURG CHALMERS UNIVERSITY OF TECHNOLOGY Gothenburg, Sweden 2018 The Author grants to University of Gothenburg and Chalmers University of Technology the non-exclusive right to publish the Work electronically and in a non-commercial purpose make it accessible on the Internet. The Author warrants that he/she is the author to the Work, and warrants that the Work does not contain text, pictures or other material that violates copyright law. The Author shall, when transferring the rights of the Work to a third party (for example a publisher or a company), acknowledge the third party about this agreement. If the Author has signed a copyright agreement with a third party regarding the Work, the Author warrants hereby that he/she has obtained any necessary permission from this third party to let University of Gothenburg and Chalmers University of Technology store the Work electronically and make it accessible on the Internet. {A Comparative Case Study on Tools for Internal Software Quality Measures} {MAYRA G. NILSSON } © {MAYRA G. NILSSON}, June 2018. Supervisor: {LUCAS GREN}{VARD ANTINYAN} Examiner: {JENIFFER HORKOFF} University of Gothenburg Chalmers University of Technology Department of Computer Science and Engineering SE-412 96 Göteborg Sweden Telephone + 46 (0)31-772 1000 [Cover: Generated image based on keywords used in this
    [Show full text]
  • Conversational Code Analysis: the Future of Secure Coding Fitzroy D
    i i “conversational˙analysis˙chapter” — 2021/5/14 — 0:17 — page 1 — #1 i i This chapter was accepted on May 12, 2021 for publication in the book Coding Theory - Recent Advances, New Perspectives and Applications, IntechOpen, London Chapter 1 Conversational Code Analysis: The Future of Secure Coding Fitzroy D. Nembhard and Marco M. Carvalho Abstract The area of software development and secure coding can benefit signifi- cantly from advancements in virtual assistants. Research has shown that many coders neglect security in favor of meeting deadlines. This shortcoming leaves systems vulnerable to attackers. While a plethora of tools are available for programmers to scan their code for vulnerabilities, finding the right tool can be challenging. It is therefore imperative to adopt measures to get programmers to utilize code analysis tools that will help them produce more secure code. This chapter looks at the limitations of existing approaches to secure coding and proposes a methodology that allows programmers to scan and fix vulnerabili- ties in program code by communicating with virtual assistants on their smart devices. With the ubiquitous move towards virtual assistants, it is important to design systems that are more reliant on voice than on standard point-and-click and keyboard-driven approaches. Consequently, we propose MyCodeAnalyzer, a Google Assistant app and code analysis framework, which was designed to interactively scan program code for vulnerabilities and flaws using voice commands during development. We describe the proposed methodology, implement a prototype, test it on a vulnerable project and present our results. Keywords: secure coding, virtual assistant, code analysis, static analysis 1.
    [Show full text]
  • Assessing Software Vulnerabilities Using Naturally Occurring Defects
    FACULDADE DE ENGENHARIA DA UNIVERSIDADE DO PORTO Assessing Software Vulnerabilities using Naturally Occurring Defects Sofia Oliveira Reis DISSERTATION Mestrado Integrado em Engenharia Informática e Computação Supervisor: Rui Maranhão - Faculdade de Engenharia da Universidade do Porto July 19, 2017 Assessing Software Vulnerabilities using Naturally Occurring Defects Sofia Oliveira Reis Mestrado Integrado em Engenharia Informática e Computação Approved in oral examination by the committee: Chair: João Pascoal Faria - Faculdade de Engenharia da Universidade do Porto External Examiner: José Campos - Universidade do Minho Supervisor: Rui Maranhão - Faculdade de Engenharia da Universidade do Porto July 19, 2017 Abstract Currently, to satisfy the high number of system requirements, complex software is created which makes its development cost-intensive and more susceptible to security vulnerabilities. In software security testing, empirical studies typically use artificial faulty programs because of the challenges involved in the extraction or reproduction of real security vulnerabilities. Thus, researchers tend to use hand-seeded faults or mutations to overcome these issues which might not be suitable for software testing techniques since the two approaches can create samples that inadvertently differ from the real vulnerabilities. Secbench is a database of security vulnerabilities mined from Github which hosts millions of open-source projects carrying a considerable number of security vulnerabilities. The majority of software development costs
    [Show full text]