The Web Application Hacker’s Handbook Discovering and Exploiting Security Flaws



Download 5,76 Mb.
Pdf ko'rish
bet641/875
Sana01.01.2022
Hajmi5,76 Mb.
#293004
1   ...   637   638   639   640   641   642   643   644   ...   875
Bog'liq
3794 1008 4334

370

Chapter 11 



Attacking Application Logic

70779c11.qxd:WileyRed  9/14/07  3:14 PM  Page 370



■■

During security-focused code reviews, think laterally about two key

areas: (a) the ways in which unexpected user behavior and input will be

handled by the application, and (b) the potential side effects of any

dependencies and interoperation between different code components

and different application functions.

In relation to the specific examples of logic flaws we have described, a num-

ber of individual lessons can be learned: 

■■

Be constantly aware that users control every aspect of every request



(see Chapter 1). They may access multistage functions in any sequence.

They may submit parameters that the application did not ask for. They

may omit certain parameters altogether, not just interfere with the para-

meters’ values.

■■

Drive all decisions regarding a user’s identity and status from her ses-



sion (see Chapter 8). Do not make any assumptions about the user’s

privileges on the basis of any other feature of the request, including the

fact that it occurs at all.

■■

When implementing functions that update session data on the basis of



input received from the user, or actions performed by the user, reflect

carefully on any impact that the updated data may have on other func-

tionality within the application. Be aware that unexpected side effects

may occur in entirely unrelated functionality written by a different pro-

grammer or even a different development team.

■■

If a search function is liable to index sensitive data that some users are



not authorized to access, ensure that the function does not provide any

means for those users to infer information based on search results. If

appropriate, maintain several search indexes based on different levels

of user privilege, or perform dynamic searches of information reposito-

ries with the privileges of the requesting user.

■■

Be extremely wary of implementing any functionality that enables any



user to delete items from an audit trail. Also, consider the possible

impact of a high-privileged user creating another user of the same priv-

ilege in heavily audited applications and dual-authorization models.

■■

When carrying out checks based on numeric business limits and thresh-



olds, perform strict canonicalization and data validation on all user

input before processing it. If negative numbers are not expected, explic-

itly reject requests that contain them.

■■

When implementing discounts based on order volumes, ensure that



orders are finalized before actually applying the discount.


Download 5,76 Mb.

Do'stlaringiz bilan baham:
1   ...   637   638   639   640   641   642   643   644   ...   875




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish