The Web Application Hacker’s Handbook Discovering and Exploiting Security Flaws



Download 5,76 Mb.
Pdf ko'rish
bet778/875
Sana01.01.2022
Hajmi5,76 Mb.
#293004
1   ...   774   775   776   777   778   779   780   781   ...   875
Bog'liq
3794 1008 4334

Attacking ActiveX Controls

We described in Chapter 5 how applications can use various thick-client tech-

nologies to distribute some of the application’s processing to the client side.

ActiveX controls are of particular interest to an attacker who is targeting other

users. When an application installs a control in order to invoke it from its own

pages, the control must be registered as “safe for scripting.” Once this has

occurred, any other web site accessed by the user can make use of that control. 

Browsers do not accept just any ActiveX control that a web site requests

them to install. By default, when a web site seeks to install a control, the

browser presents a security warning and asks the user for permission. The

user can decide whether or not they trust the web site issuing the control, and

allow it to be installed accordingly. However, if they do so, and the control con-

tains any vulnerabilities, these can be exploited by any malicious web site vis-

ited by the user.

There are two main categories of vulnerability commonly found within

ActiveX controls that are of interest to an attacker:

■■

Because ActiveX controls are typically written in native languages such



as C/C++, they are at risk from classic software vulnerabilities such as

buffer overflows, integer bugs, and format string flaws (see Chapter 15

for more details). In recent years, a huge number of these vulnerabilities

have been identified within the ActiveX controls issued by popular web

applications, such as online gaming sites. These vulnerabilities can nor-

mally be exploited to cause arbitrary code execution on the computer of

the victim user.

■■

Many ActiveX controls contain methods that are inherently dangerous



and vulnerable to misuse. For example:

■■

LaunchExe(BSTR ExeName)



■■

SaveFile(BSTR FileName, BSTR Url)

70779c12.qxd:WileyRed  9/14/07  3:14 PM  Page 454



■■

LoadLibrary(BSTR LibraryPath)

■■

ExecuteCommand(BSTR Command)



Methods like these are usually implemented by developers in order to build

some flexibility into their control, enabling them to extend its functionality in

future without needing to deploy a fresh control altogether. However, once the

control is installed, it can of course be “extended” in the same way by any

malicious web site in order to carry out undesirable actions against the user.


Download 5,76 Mb.

Do'stlaringiz bilan baham:
1   ...   774   775   776   777   778   779   780   781   ...   875




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish