The Web Application Hacker’s Handbook Discovering and Exploiting Security Flaws



Download 5,76 Mb.
Pdf ko'rish
bet635/875
Sana01.01.2022
Hajmi5,76 Mb.
#293004
1   ...   631   632   633   634   635   636   637   638   ...   875
Bog'liq
3794 1008 4334

The Assumption

Despite the usual warnings from security advisers that verbose debug mes-

sages of this kind could potentially be misused by an attacker, the developers

reasoned that they were not opening up any security vulnerability. All of the

information contained within the debugging message could be readily

obtained by the user, by inspecting the requests and responses processed by

her browser. The messages did not include any details about the actual failure,

such as stack traces, and so could not conceivably assist in formulating an

attack against the application.

The Attack

Despite their reasoning about the contents of the debug messages, the devel-

opers’ assumption was flawed because of mistakes they made in implement-

ing the creation of debugging messages.

When an error occurred, a component of the application gathered all of the

required information and stored it. The user was issued with an HTTP redirect

to a URL that displayed this stored information. The problem was that the

application’s storage of debug information, and user access to the error mes-

sage, was not session-based. Rather, the debugging information was stored in

a static container, and the error message URL always displayed the informa-

tion which was last placed into this container. Developers had assumed that

users following the redirect would, therefore, see only the debug information

relating to their error.

In fact, in this situation, ordinary users would occasionally be presented

with the debugging information relating to a different user’s error, because the

two errors had occurred almost simultaneously. But aside from questions

about thread safety (see the next example), this was not simply a race condi-

tion. An attacker who discovered the way in which the error mechanism func-

tioned could simply poll the message URL repeatedly, and log the results each

time they changed. Over a period of few hours, this log would contain sensi-

tive data about numerous application users:

■■

A set of usernames that could be used in a password-guessing attack.



■■

A set of session tokens that could be used to hijack sessions. 

■■

A set of user-supplied input, which may contain passwords and other



sensitive items.


Download 5,76 Mb.

Do'stlaringiz bilan baham:
1   ...   631   632   633   634   635   636   637   638   ...   875




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish