Arxiv:2102.03131V1 [Cs.CR] 5 Feb 2021 Extensions Are Available Within Systems Like Wordpress Or Called Joomla

Total Page:16

File Type:pdf, Size:1020Kb

Arxiv:2102.03131V1 [Cs.CR] 5 Feb 2021 Extensions Are Available Within Systems Like Wordpress Or Called Joomla Over 100 Bugs in a Row: Security Analysis of the Top-Rated Joomla Extensions Marcus Niemietz, Mario Korth, Christian Mainka, Juraj Somorovsky fi[email protected] Hackmanit GmbH Abstract like WordPress and Joomla. There exists a family of tools Nearly every second website is using a Content Manage- which, inter alia, allow researchers and penetration testers to ment System (CMS) such as WordPress, Drupal, and Joomla. scan CMS software (e.g., WPScan [4], JoomScan [10]) for These systems help to create and modify digital data, typically well-known issues. Although community-based projects like within a collaborative environment. One common feature is to Joomla make use of tools like static source code scanners, it enrich their functionality by using extensions. Popular exten- seems to be a non-trivial task to detect well-known vulnerabil- sions allow developers to easily include payment gateways, ities such as XSS and SQLi, as shown by security researches backup tools, and social media components. multiple times [29]. To provide an example, Joomla intro- Due to the extended functionality, it is not surprising that duced the usage of the code analysis tool RIPS in June 2018 such an expansion of complexity implies a bigger attack sur- [7, 16]. Although RIPS is explicitly designed to detect web face. In contrast to CMS core systems, extensions are usu- vulnerabilities like XSS, Joomla has officially announced 30 ally not considered during public security audits. However, security vulnerabilities within the first half year of 2019, and a Cross-Site Scripting (XSS) or SQL injection (SQLi) at- 12 of them were XSS issues [17]. tack within an activated extension has the same effect on On the Importance of CMS Extensions. Nearly every the security of a CMS as the same issue within the core it- CMS includes multiple extensions which add new function- self. Therefore, vulnerabilities within extensions are a very ality to the core systems. However, the CMS extensions also attractive tool for malicious parties. enlarges the attack surface. As an important aspect, the core We study the security of CMS extensions using the exam- of the CMS and the extension share the same privileges. Due ple Joomla; one of the most popular systems. We discovered to the missing isolation, a vulnerability in a popular extension that nearly every second installation of such a system also might have the same impact as a vulnerability within the CMS includes Joomla’s official top-10 rated extensions as a per se itself. requirement. Moreover, we have detected that every single Despite their security importance, CMS extensions are, in extension of the official top-10 rated extensions is vulnerable contrast to the CMS core systems, usually not covered by to XSS and 30% of them against SQLi. We show that our public security audits. To highlight this gap, we analyzed the findings are not only relevant to Joomla; two of the analyzed security of extensions from one of the most popular systems arXiv:2102.03131v1 [cs.CR] 5 Feb 2021 extensions are available within systems like WordPress or called Joomla. Drupal, and introduce the same vulnerabilities. Finally, we Our Approach. Due to the high number of nearly 8,500 pinpoint mitigation strategies that can be realized within ex- Joomla extensions, we restricted our focus to the top-10 rated tensions to achieve the same security level as the core CMS. and freely available extensions within Joomla’s official ex- tension directory. Moreover, we concentrated on the two top- 1 Introduction rated Open Web Application Security Project (OWASP) in- jection risks namely XSS and SQLi. Our aim is to answer the More than half of the Alexa top-1 million websites are using following research questions: a CMS [31]. Among these systems, WordPress, Joomla, and 1. How many Joomla installations have deployed the top- Drupal are the most popular brands with a combined CMS 10 rated extensions among the Alexa top-1 million web- market share of over 69%. It is therefore an important task to sites? analyze their security. These CMSs are frequently audited by third parties due 2. Are Joomla extensions vulnerable to the well-known to their importance, especially widely deployed software attacks XSS and SQLi? If so, what is the root cause of 1 such security issues and what can we learn from them? Reflected Cross-Site Scripting. The first step of a reflective XSS attack is usually to send attack vectors defined by the 3. Can we assume that at least one top-rated and maybe attacker to the server via an HTTP GET or POST request. vulnerable extension is always activated within Joomla After analyzing the server response message, the attacker installations? If so, does a vulnerability within an exten- checks whether the attacker’s code was (partially) displayed sion have the same importance as a vulnerability within and therefore reflected. If this is not the case, the attacker can the CMS core? try another testing code; otherwise, the attacker will abort the If extensions are a tool which is always available and acti- attack on the given resource. vated within a CMS, this would imply that we should always The successfully executed testing code can show characters consider extensions with the same priority as the CMS core. that are necessary for the attack, for example if < or " are not Otherwise, an extension might be the weakest link of a com- filtered by the server. In the case of an HTTP GET request, plex chain if it is vulnerable against attacks. the attacker can then prepare a link pointing to the vulnerable Empirical Study. We detected that all analyzed extensions web application with a malicious JavaScript code embedded are vulnerable to XSS and 30% of them are vulnerable to in the query string. In the event of an HTTP POST request, a SQLi. We responsibly reported and disclosed 103 vulnerabili- prepared HTML form can be used, which is auto-submitted ties across multiple CMS’s whereas 86 vulnerabilities were as soon as the attack page is loaded. within Joomla extensions. By investigating extensions which Stored Cross-Site Scripting. As another server-side vulnera- share the same code and, therefore, the same vulnerabilities bility, stored XSS occurs when the attack vector can be stored for multiple CMSs, we identified 11 vulnerabilities within persistently in the vulnerable web application (e.g., malicious WordPress extensions and 6 vulnerabilities within Drupal code inside a log file or database). Each time a victim visits extensions. the part of the web application where the vector is saved, it is Contributions. Overall, we make the following contribu- executed. tions: DOM-based XSS. Contrary to reflected and stored XSS, the • We detected that all of the top-10 rated Joomla exten- cause for DOMXSS lies in the browser of the user itself; for sions are vulnerable to XSS and 30% of them are vulner- example, client-side JavaScript code provided by the server. able to SQLi. This JavaScript code takes some input of the client and at some point uses it at a sink such as innerHTML. This can • We show that 40.9% of the Joomla installations within result in the injection of arbitrary HTML or JavaScript code the Alexa top-1 million websites include at least one of and therefore XSS. our tested top-rated extensions and are, thus, vulnerable to the discovered attacks. 2.2 SQL Injection • We developed an open-source tool for detecting XSS vulnerabilities in web applications which use metadata An SQLi occurs when improperly sanitized user input is used within media files. in the construction of SQL queries. The problem arises usu- ally when the whole query which was constructed by the • We identify possible root causes of the detected vulnera- application is submitted to the SQL server instead of the bilities and demonstrate generalizability by evaluating query with placeholders for the parameters (e.g., prepared that extensions which are available for multiple CMSs statements [13]). Therefore, the SQL server cannot distin- also have the same security vulnerabilities. guish between the input of a trusted and a malicious user; for Artifact Availability. In the interest of open science, we example, selecting another database although just an integer have published our tool Metadata-Attacker as open-source was expected. Hence it simply parses the query and executes online. it, which in the end can lead to an SQLi if an attacker was able to insert arbitrary statements. 2 Foundations 2.3 Joomla 2.1 Cross-Site Scripting Our tested CMS called Joomla uses a strict Model-View- We consider all three XSS variants that are mentioned Controller (MVC) architecture. Joomla’s extensions can be ei- as OWASP top-10 injection threats as relevant: re- ther a module, component, plugin, template, or language [18]. flected XSS, stored XSS, and reflective DOM-based XSS Beyond the applications base directory, there are common (DOMXSS) [20].1 folder paths for every Joomla installation and its extensions. Additionally, unless explicitly changed or replaced, each 1We left out persistent DOMXSS [26], because one of its requirements is to have another XSS to write into the persistent client-side storage. This is Joomla installation contains a robots.txt and web.config. covered by seeking for reflective XSS and DOMXSS. txt file which contain identifying strings. Some native com- 2 ponents are delivered with identifying eXtensible Markup an XSS attack vector. To detect DOMXSS vulnerabilities, Language (XML) files. Hence it is possible to identify a we are using the methodology provided by di Paola [8]. By Joomla installation by requesting some of those identifying reusing the provided regular expressions as search patterns, files. we looked for sources (e.g., document.location) and sinks (e.g., document.write) within the Document Object Model (DOM) that could introduce DOMXSS vulnerabilities.
Recommended publications
  • Mitigating SQL Injection Attacks on Legacy Web Applications
    You shall not pass: Mitigating SQL Injection Attacks on Legacy Web Applications Rasoul Jahanshahi Adam Doupé Manuel Egele [email protected] [email protected] [email protected] Boston University Arizona State University Boston University ABSTRACT four most popular web apps (i.e., Wordpress, Joomla, Drupal, and SQL injection (SQLi) attacks pose a significant threat to the security Magento) increased by 267% compared to the prior year. of web applications. Existing approaches do not support object- There has been a great deal of research into identifying SQLi oriented programming that renders these approaches unable to vulnerabilities and defending against SQLi attacks on web apps. protect the real-world web apps such as Wordpress, Joomla, or Proposed approaches used various techniques such as static anal- Drupal against SQLi attacks. ysis [10, 11, 20, 22, 35], dynamic analysis [3, 6, 15, 21, 24, 25, 37], We propose a novel hybrid static-dynamic analysis for PHP or a mix of static-dynamic analysis [5, 17, 28]. While static analy- web applications that limits each PHP function for accessing the sis approaches can be promising, static analysis cannot determine database. Our tool, SQLBlock, reduces the attack surface of the whether input sanitization is performed correctly or not [34]. If the vulnerable PHP functions in a web application to a set of query sanitization function does not properly sanitize user-input, SQLi descriptors that demonstrate the benign functionality of the PHP attacks can still happen. Moreover, to the best of our knowledge, function. prior static analysis approaches for finding SQLi vulnerabilities in We implement SQLBlock as a plugin for MySQL and PHP.
    [Show full text]
  • Snuffleupagus Documentation
    Snuffleupagus Documentation Release stable Sebastien Blot & Julien Voisin Aug 29, 2021 Contents 1 Documentation 3 1.1 Features..................................................3 1.2 Installation................................................ 11 1.3 Configuration............................................... 14 1.4 Download................................................. 22 1.5 Changelog................................................ 23 1.6 FAQ.................................................... 29 1.7 Propaganda................................................ 33 1.8 Cookies.................................................. 35 2 Greetings 39 i ii Snuffleupagus Documentation, Release stable Snuffleupagus is a PHP7+ and PHP8+ module designed to drastically raise the cost of attacks against websites. This is achieved by killing entire bug classes and providing a powerful virtual-patching system, allowing the administrator to fix specific vulnerabilities without having to touch the PHP code. Contents 1 Snuffleupagus Documentation, Release stable 2 Contents CHAPTER 1 Documentation 1.1 Features Snuffleupagus has a lot of features that can be divided in two main categories: bug-classes killers and virtual-patching. The first category provides primitives to kill various bug families (like arbitrary code execution via unserialize for example) or raise the cost of exploitation. The second category is a highly configurable system to patch functions in php itself. 1.1.1 Bug classes killed or mitigated system injections The system function executes an external
    [Show full text]
  • Snuffleupagus
    » SnuFfLEupAGus A ghostly elephant, in your php stack, killing bug classes, defeating attacks, and virtual-patching what is remaining. 1 / 106 » Bonjour 2 / 106 » I'm sorry 3 / 106 » Good evening We're glad to be here We're working at the same (French¹) company In the security team. It's called NBS System And it's a hosting company, you know, for websites. ¹ Hence our lovely accent. 4 / 106 » What are we trying to solve? We're hosting a lot of various php applications, using CMS written by super- duper creative people, and we'd like to prevent our customers from being pwned. 5 / 106 » What we were doing so far We have a lot of os-level hardening (grsecurity ♥) We have some custom IDS We have a (cool) WAF called naxsi But not everything is patchable with those, and we can not² touch the PHP code. ¹ And to be honest, we don't want to. 6 / 106 » Some words about php Its syntax draws upon C, Java, and Perl, and is easy to learn. The main goal of the language is to allow web developers to write dynamically generated web pages quickly, but you can do much more with PHP. — the php documentation 7 / 106 » Still words about php Well, there were other factors in play there. htmlspecialchars was a very early function. Back when PHP had less than 100 functions and the function hashing mechanism was strlen(). In order to get a nice hash distribution of function names across the various function name lengths names were picked specifically to make them fit into a specific length bucket.
    [Show full text]
  • A Static Vulnerability Analysis Tool for PHP
    PHPWander: A Static Vulnerability Analysis Tool for PHP Pavel Jurásek Thesis submitted for the degree of Master in Informatics: Programming and Networks 60 credits Department of Informatics Faculty of mathematics and natural sciences UNIVERSITY OF OSLO Spring 2018 PHPWander: A Static Vulnerability Analysis Tool for PHP Pavel Jurásek © 2018 Pavel Jurásek PHPWander: A Static Vulnerability Analysis Tool for PHP http://www.duo.uio.no/ Printed: Reprosentralen, University of Oslo PHPWander: A Static Vulnerability Analysis Tool for PHP Pavel Jurásek 16th May 2018 ii Contents 1 Introduction 1 I Background 3 2 Security vulnerabilities 5 2.1 Injections . .5 2.2 Cross-site scripting (XSS) . .6 2.3 Command injection . .7 2.4 Code injection . .7 2.5 Path traversal . .8 2.6 Other vulnerabilities . .8 3 PHP Language 9 3.1 History and description . .9 3.2 Typing . .9 3.3 Predefined variables . 10 3.4 Object-oriented aspects in PHP . 10 3.5 Class autoloading . 11 4 Static analysis 13 4.1 Data flow analysis . 13 4.2 Taint analysis . 14 4.2.1 Tainting method . 14 4.2.2 Control flow graphs . 14 4.3 Data flow sensitivities . 15 4.3.1 Flow sensitivity . 15 4.3.2 Context sensitivity . 16 4.4 SSA form . 16 4.5 Static analysis tools for PHP . 17 4.5.1 Code improvement tools . 17 4.5.2 Security checking tools . 18 II Development 19 5 Development phase 21 5.1 Architecture . 21 iii 5.2 Design decisions . 21 5.2.1 Configuration . 21 5.2.2 Software foundations . 23 5.2.3 Implementation details .
    [Show full text]
  • TAP: a Static Analysis Model for PHP Vulnerabilities Based on Token and Deep Learning Technology
    RESEARCH ARTICLE TAP: A static analysis model for PHP vulnerabilities based on token and deep learning technology 1 1 1 2 Yong Fang , Shengjun Han , Cheng HuangID *, Runpu Wu 1 College of Cybersecurity, Sichuan University, Chengdu 610065, China, 2 China Information Technology Security Evaluation Center, Beijing 100085, China * [email protected] a1111111111 a1111111111 a1111111111 Abstract a1111111111 a1111111111 With the widespread usage of Web applications, the security issues of source code are increasing. The exposed vulnerabilities seriously endanger the interests of service providers and customers. There are some models for solving this problem. However, most of them rely on complex graphs generated from source code or regex patterns based on expert OPEN ACCESS experience. In this paper, TAP, which is based on token mechanism and deep learning tech- Citation: Fang Y, Han S, Huang C, Wu R (2019) nology, was proposed as an analysis model to discover the vulnerabilities of PHP: Hypertext TAP: A static analysis model for PHP vulnerabilities Preprocessor (PHP) Web programs conveniently and easily. Based on the token mecha- based on token and deep learning technology. nism of PHP language, a custom tokenizer was designed, and it unifies tokens, supports PLoS ONE 14(11): e0225196. https://doi.org/ 10.1371/journal.pone.0225196 some features of PHP and optimizes the parsing. Besides, the tokenizer also implements parameter iteration to achieve data flow analysis. On the Software Assurance Reference Editor: Hua Wang, Victoria University, AUSTRALIA Dataset(SARD) and SQLI-LABS dataset, we trained the deep learning model of TAP by Received: May 24, 2019 combining the word2vec model with Long Short-Term Memory (LSTM) network algorithm.
    [Show full text]
  • Automated Detection of Complexvulnerabilities with Static
    Automated DetectionAutomatisierte of Complex Sicherheitsanalyse Vulnerabilities with Static Code Analysisvon Webapplikationen Automated Detection of Complex Vulnerabilities with Static Code Analysis Johannes Dahse, Dortmund, 10 Nov 2016 Automated DetectionAutomatisierte of Complex Sicherheitsanalyse Vulnerabilities with Static Code Analysisvon Webapplikationen 1. Introduction 2. Static Code Analysis 3. First-order Bug Detection 4. Second-order Bug Detection 5. Gadget Chain Detection 1. Introduction Automated DetectionAutomatisierte of Complex Sicherheitsanalyse Vulnerabilities 2. Static Code Analysis 3. First-order Bugs with Static Code Analysisvon Webapplikationen 4. Second-order Bugs 5. Gadget Chains 1.1 About ● Dr. Johannes Dahse ● CEO of RIPS Technologies ● Study/Ph.D. IT-Security, Ruhr-University Bochum ● Security Consultant ● CTF participant ● @FluxReiners, websec.wordpress.com ● Developer of RIPS www.ripstech.com 3 1. Introduction Automated DetectionAutomatisierte of Complex Sicherheitsanalyse Vulnerabilities 2. Static Code Analysis 3. First-order Bugs with Static Code Analysisvon Webapplikationen 4. Second-order Bugs 5. Gadget Chains 1.2 Research Timeline ● 2007 – 2009: PHP Scanner based on Regex used for CTF competitions ● 2009 – 2011: RIPS 1st Generation based on Tokenizer open sourced during MOPS (2nd place) ● 2012: RIPS 2nd Generation based on AST and CFG subject of master thesis ● 2013 – 2015: RIPS 3rd Generation subject of doctor thesis ● 2016: RIPS (Standalone / Cloud) 4 1. Introduction Automated DetectionAutomatisierte
    [Show full text]
  • A Practical Experience on the Impact of Plugins in Web Security
    A Practical Experience on the Impact of Plugins in Web Security José Fonseca Marco Vieira CISUC, University of Coimbra / CISUC, University of Coimbra Polytechnic Institute of Guarda, Portugal Coimbra, Portugal [email protected] [email protected] Abstract—In an attempt to support customization, many web trolled development processes and poor quality assurance applications allow the integration of third-party server-side activities applied during the development of such plugins, plugins that offer diverse functionality, but also open an addi- which are not able to prevent security vulnerabilities from tional door for security vulnerabilities. In this paper we study being shipped into the field. the use of static code analysis tools to detect vulnerabilities in Penetration testing and static analysis are examples of the plugins of the web application. The goal is twofold: 1) to well-known techniques frequently used by web developers to study the effectiveness of static analysis on the detection of web identify security vulnerabilities in their code. Penetration application plugin vulnerabilities, and 2) to understand the testing consists in stressing the application from the point of potential impact of those plugins in the security of the core web view of an attacker (“black-box” approach) using specific application. We use two static code analyzers to evaluate a malicious inputs. On the other hand, static analysis is a large number of plugins for a widely used Content Manage- ment System. Results show that many plugins that are current- “white-box” approach based on the analysis of the source ly deployed worldwide have dangerous Cross Site Scripting code of the application (without executing it) looking for and SQL Injection vulnerabilities that can be easily exploited, potential vulnerabilities.
    [Show full text]
  • Weekly Zero Day Vulnerability Coverage Bulletin
    Weekly Zero-Day Vulnerability Coverage Bulletin (15th July – 21st July) Summary: Total 6 Zero-Day Vulnerabilities were discovered in 3 Categories in this week 2 1 3 Cross Site Scripting SQL Injection Command Injection Zero-Day Vulnerabilities Protected through Core Rules 6 Zero-Day Vulnerabilities Protected through Custom Rules 0* Zero-Day Vulnerabilities for which protection cannot be determined 0** Zero-Day Vulnerabilities found by Haiku Scanner 6 * To enable custom rules please contact [email protected] ** Since attack vectors are not known, Indusface cannot determine if these vulnerabilities are protected Vulnerability Trend: Weekly Vulnerability Trend displays the total no. of vulnerabilities discovered to the protection given for a quarter. Of Zero-Day Vulnerabilities Of Zero-Day Vulnerabilities Of Zero-Day Vulnerabilities 49% were protected by Core 7% were protected by Custom 44% were reported by Haiku Rules in last quarter Rules in last quarter Scanner in last quarter From the graph, we infer that maximum Cross Site Scripting and SQL Injection vulnerabilities were discovered in May compared to other months and categories so far. Zero Directory Traversal vulnerabilities are found in June. Note: Our Sig-Dev team constantly monitors the security landscape and leading security websites to identify any new vulnerabilities identified/published and monitors/updates rules to ensure around the clock protection for customer sites. www.indusface.com Details: S. No. Vulnerability Public ID Vulnerability Vulnerability Description AppTrana Haiku Type Name Coverage Scanner Coverage 1. Cross Site NA Magento 2.3.1: A successful attack enables Protected by Detected by Scripting Unauthenticate an unauthenticated Default Rules. scanner as d Stored XSS to Cross Site RCE adversary to persistently Scripting inject a JavaScript payload attack.
    [Show full text]
  • How We Found 5 0Days in Wordpress
    How we found 5 0days in WordPress Simon Scannell, RIPS Technologies ​ www.ripstech.com 18.11.2019 1. Introduction 2 2. Methodology 3 2.1 Traditional Code Audit Approaches 3 2.2 Drawbacks of Traditional Approaches 3 2.3 Case Study 4 2.3.1 Limited Local File Inclusion 5 2.3.2 Breaking the Limitation 5 2.4 Finding an Efficient Methodology 7 2.4.1 Step #1 - Component Identification 7 2.4.2 Step #2 - Feature Breakdown 8 2.4.3 Step #3 - Feature Vulnerabilities 9 2.4.4 Step #4 - Vulnerability Chains 10 3. Vulnerability Analysis 12 3.1 CVE-2018-12895: Authenticated File Deletion 12 3.1.1 Abstracting the Media File Functionality 12 3.1.2 Background - Understanding Post Meta Entries 13 3.1.3 Insufficient Validation in Post Meta Component 14 3.1.4 Impact and Limitations 15 3.2 CVE-2019-8943: Authenticated Path Traversal and LFI 16 3.2.1 Abstracting the Image Cropping Functionality 16 3.2.2 Path Traversal in Image Editing 17 3.2.3 Impact and Limitations 19 3.3 CVE-2019-9787: Unauthenticated CSRF to XSS 20 3.3.1 Abstracting the Comment Functionality 20 3.3.2 Sanitization Bypass in SEO Optimization 21 3.3.3 Limitations and Bug Chaining 22 3.3.4 CSRF Vulnerability in Comments 22 3.3.5 Impact and Limitations 24 4. Exploitation Chain 25 4.1 Step #1 - Plugin Vulnerabilities 25 4.2 Step #2 - Attacking WordPress Core via CSRF 25 4.3 Step #3 - Exploiting Authenticated Vulnerabilities 26 4.4 Bonus: Wormable Stored XSS on WordPress.org 27 4.5 Putting it all together 28 Summary 30 References 31 ©2019 RIPS Technologies | Whitepaper​ ​| ​www.ripstech.com 1 1.
    [Show full text]
  • Experience Report: an Empirical Study of PHP Security Mechanism Usage
    Experience Report: An Empirical Study of PHP Security Mechanism Usage Johannes Dahse and Thorsten Holz Horst Görtz Institute for IT-Security (HGI) Ruhr-University Bochum, Germany {firstname.lastname}@rub.de ABSTRACT 1. INTRODUCTION The World Wide Web mainly consists of web applications Empirical studies of security vulnerabilities found in the written in weakly typed scripting languages, with PHP being last years [3, 7, 28, 31] indicate that web-related vulnera- the most popular language in practice. Empirical evidence bilities such as cross-site scripting (XSS) and SQL injection based on the analysis of vulnerabilities suggests that security (SQLi) are among the most common software flaws. In fact, is often added as an ad-hoc solution, rather than planning such vulnerabilities are more frequently detected in the re- a web application with security in mind during the design cent years than memory corruption vulnerabilities. This ob- phase. Although some best-practice guidelines emerged, no servation suggests that security is only added as an ad-hoc comprehensive security standards are available for develop- solution in web applications, rather than planning such ap- ers. Thus, developers often apply their own favorite security plications with security in mind during the design phase. mechanisms for data sanitization or validation to prohibit Although some best-practice guidelines on secure web pro- malicious input to a web application. gramming emerged (e.g., recommendations by OWASP [17]), In the context of our development of a new static code no comprehensive security standards are available for devel- analysis tool for vulnerability detection, we studied com- opers. This leads to the observation that each developer monly used input sanitization or validation mechanisms in applies his own favorite security mechanisms for data sani- 25 popular PHP applications.
    [Show full text]
  • Static Detection of Complex Vulnerabilities in Modern PHP Applications
    Static Detection of Complex Vulnerabilities in Modern PHP Applications Dissertation zur Erlangung des Grades eines Doktor-Ingenieurs der Fakultät für Elektrotechnik und Informationstechnik an der Ruhr-Universität Bochum vorgelegt von Johannes Dahse aus Jena Bochum, 02.02.2016 Gutachter: Prof. Dr. Thorsten Holz (Ruhr-Universität Bochum) Zweitgutachter: Prof. Dr. Andrei Sabelfeld (Chalmers University of Technology) Tag der mündlichen Prüfung: 11. März 2016 Abstract Modern websites evolved to interactive applications which process confidential user data, such as credit card numbers, passwords, and private messages, on a daily basis. This sensitive data requires reliable protection from cyber criminals who exploit vulnerabilities in the applications’ source code. Particularly web applications developed in PHP, the most popular server-side scripting language on the Web, are prone to security vulnerabilities. Although the developers’ awareness is rising for the traditional types of vulnerabilities, such as cross-site scripting and SQL injection, they still persist due to faulty security mechanisms or intricate language features. Besides, more complex vulnerability types, such as second-order vulnerabilities or PHP object injections, are comparatively unknown and actively exploited by attackers. Manual detection of complex vulnerabilities in modern PHP applications with hundreds of thousands lines of code is expensive, time-consuming, and requires deep security knowl- edge. With the help of static code analysis, security vulnerabilities can be detected in an automated fashion and subsequently remediated. However, previous work in this area focused only on the detection of a few traditional vulnerability types and dismissed more complex occurrences or types of vulnerabilities. Additionally, these approaches do not scale to large code bases or do not support major language features.
    [Show full text]
  • Snuffleupagus
    » SnuFfLEupAGus Killing bug classes, virtual-patching the rest! 1 / 64 » Who are we? We're working at the same (French¹) company In the security team. It's called NBS System And it's a hosting company, you know, for websites. ¹ Hence our lovely accent. 2 / 64 » What are we trying to solve? We're hosting a lot of various █████████████ php applications using CMS ████████ ████████ ██████████████████ ████████████ ████████████, and we'd like to prevent our customers from being pwned. 3 / 64 » What we were doing so far We have a lot of os-level hardening We have some custom IDS We have a (cool) WAF called naxsi But not everything is patchable with those, and we can not touch the PHP code. 4 / 64 » Some words about php Its syntax draws upon C, Java, and Perl, and is easy to learn. The main goal of the language is to allow web developers to write dynamically generated web pages quickly, but you can do much more with PHP. — the php documentation 5 / 64 » Still words about php Well, there were other factors in play there. htmlspecialchars was a very early function. Back when PHP had less than 100 functions and the function hashing mechanism was strlen(). In order to get a nice hash distribution of function names across the various function name lengths names were picked specifically to make them fit into a specific length bucket. — Rasmus Lerdorf, creator of PHP 6 / 64 » Words about php, again I don’t know how to stop it, there was never any intent to write a programming language […] I have absolutely no idea how to write a programming language, I just kept adding the next logical step on the way.
    [Show full text]