The Web Application Hacker’s Handbook Discovering and Exploiting Security Flaws


Chapter 11  ■ Attacking Application Logic  357



Download 5,76 Mb.
Pdf ko'rish
bet619/875
Sana01.01.2022
Hajmi5,76 Mb.
#293004
1   ...   615   616   617   618   619   620   621   622   ...   875
Bog'liq
3794 1008 4334

Chapter 11 



Attacking Application Logic  357

70779c11.qxd:WileyRed  9/14/07  3:14 PM  Page 357



The Attack

The same code component that was incorporated into the registration func-

tionality was also used elsewhere within the application, including within the

core functionality, which gave authenticated users access to account details,

statements, funds transfers, and other information. When a registered user

successfully authenticated herself to the application, this same object was

instantiated and saved in her session to store key information about her iden-

tity. The majority of the functionality within the application referenced the

information within this object in order to carry out its actions — for example,

the account details presented to the user on her main page were generated on

the basis of the unique customer number contained within this object.

The way in the code component was already being employed within the

application meant that the developers’ assumption was flawed, and the man-

ner in which they reused it did indeed open up a significant vulnerability. 

Although the vulnerability was serious, it was in fact relatively subtle to

detect and exploit. Access to the main application functionality was protected

by access controls at several layers, and a user needed to have a fully authen-

ticated session to pass these controls. To exploit the logic flaw, therefore, an

attacker needed to perform the following steps:

■■

Log in to the application using his own valid account credentials.



■■

Using the resulting authenticated session, access the registration func-

tionality and submit a different customer’s personal information. This

causes the application to overwrite the original 

CCustomer

object in the

attacker’s session with a new object relating to the targeted customer.

■■

Return to the main application functionality and access the other cus-



tomer’s account.

A vulnerability of this kind is not straightforward to detect when probing

the application from a black-box perspective. However, it is also hard to iden-

tify when reviewing or writing the actual source code. Without a clear under-

standing of the application as a whole and the use made of different

components in different areas, the flawed assumption made by developers

may not be evident. Of course, clearly commented source code and design

documentation would reduce the likelihood of such a defect being introduced

or remaining undetected.


Download 5,76 Mb.

Do'stlaringiz bilan baham:
1   ...   615   616   617   618   619   620   621   622   ...   875




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish