The Web Application Hacker’s Handbook Discovering and Exploiting Security Flaws



Download 5,76 Mb.
Pdf ko'rish
bet413/875
Sana01.01.2022
Hajmi5,76 Mb.
#293004
1   ...   409   410   411   412   413   414   415   416   ...   875
Bog'liq
3794 1008 4334

228

Chapter 8 



Attacking Access Controls

70779c08v6.5.qxd  9/14/07  3:18 PM  Page 228



flawed assumptions about the kinds of requests that users will make and

against which the application needs to defend itself:

■■

Do not rely on users’ ignorance of application URLs or the identifiers



used to specify application resources, such as account numbers and

document IDs. Explicitly assume that users know every application

URL and identifier, and ensure that the application’s access controls

alone are sufficient to prevent unauthorized access.

■■

Do not trust any user-submitted parameters to signify access rights



(such as 

admin=true

).

■■

Do not assume that users will access application pages in the intended



sequence. Do not assume that because users cannot access the Edit

Users page, they will not be able to reach the Edit User X page that is

linked from it.

■■

Do not trust the user not to tamper with any data that is transmitted via



the client. If some user-submitted data has been validated and is then

transmitted via the client, do not rely upon the retransmitted value

without revalidation.

The following represents a best-practice approach to implementing effective

access controls within web applications:

■■

Explicitly evaluate and document the access control requirements for



every unit of application functionality. This needs to include both who

can legitimately use the function and what resources individual users

may access via the function.

■■

Drive all access control decisions from the user’s session.



■■

Use a central application component to check access controls.

■■

Process every single client request via this component, to validate that



the user making the request is permitted to access the functionality and

resources being requested.

■■

Use programmatic techniques to ensure that there are no exceptions to



the previous point. An effective approach is to mandate that every

application page must implement an interface that is queried by the

central access control mechanism. By forcing developers to explicitly

code access control logic into every page, there can be no excuse for

omissions.

■■

For particularly sensitive functionality, such as administrative pages,



you can further restrict access by IP address, to ensure that only users

from a specific network range are able to access the functionality,

regardless of their login status.


Download 5,76 Mb.

Do'stlaringiz bilan baham:
1   ...   409   410   411   412   413   414   415   416   ...   875




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish