The Web Application Hacker’s Handbook Discovering and Exploiting Security Flaws


authorized. If a low-privileged user proceeds directly to a later stage, she may



Download 5,76 Mb.
Pdf ko'rish
bet614/875
Sana01.01.2022
Hajmi5,76 Mb.
#293004
1   ...   610   611   612   613   614   615   616   617   ...   875
Bog'liq
3794 1008 4334

authorized. If a low-privileged user proceeds directly to a later stage, she may

be able to access it without any restrictions. See Chapter 8 for more details 

on finding and exploiting vulnerabilities of this kind.

Example 3: Rolling Your Own Insurance

The authors encountered this logic flaw in a web application deployed by a

financial services company.

The Functionality

The application enabled users to obtain quotations for insurance, and if desired,

complete and submit an insurance application online. The process was spread

across a dozen stages, as follows:

■■

At the first stage, the applicant submits some basic information, and



specifies either a preferred monthly premium or the value the applicant

wishes insurance for. The application offers a quotation, computing

whichever value the applicant did not specify.

■■

Across several stages, the applicant supplies various other personal



details, including health, occupation, and pastimes.

■■

Finally, the application is transmitted to an underwriter working for the



insurance company. Using the same web application, the underwriter

reviews the details and decides whether to accept the application as is,

or modify the initial quotation to reflect any additional risks.

Through each of the stages described, the application employed a shared

component to process each parameter of user data submitted to it. This com-

ponent parsed out all of the data in each 

POST

request into name/value pairs,



and updated its state information with each item of data received.

The Assumption

The component which processed user-supplied data assumed that each

request would contain only the parameters that had been requested from the


Download 5,76 Mb.

Do'stlaringiz bilan baham:
1   ...   610   611   612   613   614   615   616   617   ...   875




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish