The Weakest Link: Mitigating Web Application Vulnerabilities. webscurity White Paper. webscurity Inc. Minneapolis, Minnesota USA

Similar documents
SAP Security. BIZEC APP/11 Version 2.0 BIZEC TEC/11 Version 2.0

Kishin Fatnani. Founder & Director K-Secure. Workshop : Application Security: Latest Trends by Cert-In, 30 th Jan, 2009

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 3 Protecting Systems

OWASP TOP Release. Andy Willingham June 12, 2018 OWASP Cincinnati

Data Communication. Chapter # 5: Networking Threats. By: William Stalling

Web Application Firewall Subscription on Cyberoam UTM appliances

Aguascalientes Local Chapter. Kickoff

Solutions Business Manager Web Application Security Assessment

Copyright

Computer Forensics: Investigating Network Intrusions and Cyber Crime, 2nd Edition. Chapter 3 Investigating Web Attacks

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

epldt Web Builder Security March 2017

Provide you with a quick introduction to web application security Increase you awareness and knowledge of security in general Show you that any

Security Solutions. Overview. Business Needs

SDR Guide to Complete the SDR

Web insecurity Security strategies General security Listing of server-side risks Language specific security. Web Security.

90% 191 Security Best Practices. Blades. 52 Regulatory Requirements. Compliance Report PCI DSS 2.0. related to this regulation

Kaspersky Enterprise Cybersecurity. Kaspersky Security Assessment Services. #truecybersecurity

Top 10 Database Security Threats and How to Stop Them. Rob Rachwald Director of Security Strategy

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation

Specialized Security Services, Inc. REDUCE RISK WITH CONFIDENCE. s3security.com

e-commerce Study Guide Test 2. Security Chapter 10

F5 Application Security. Radovan Gibala Field Systems Engineer

The security of Mozilla Firefox s Extensions. Kristjan Krips

Ethical Hacking and Countermeasures: Web Applications, Second Edition. Chapter 3 Web Application Vulnerabilities

Integrated Access Management Solutions. Access Televentures

IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats.

Application Layer Security

OWASP Top 10 Risks. Many thanks to Dave Wichers & OWASP

OWASP Top 10 The Ten Most Critical Web Application Security Risks

Completing your AWS Cloud SECURING YOUR AMAZON WEB SERVICES ENVIRONMENT

Application Layer Attacks. Application Layer Attacks. Application Layer. Application Layer. Internet Protocols. Application Layer.

10 FOCUS AREAS FOR BREACH PREVENTION

C1: Define Security Requirements

OWASP TOP OWASP TOP

Cyber Security Audit & Roadmap Business Process and

INNOV-09 How to Keep Hackers Out of your Web Application

SOLUTION BRIEF. Enabling and Securing Digital Business in API Economy. Protect APIs Serving Business Critical Applications

19.1. Security must consider external environment of the system, and protect it from:

INF3700 Informasjonsteknologi og samfunn. Application Security. Audun Jøsang University of Oslo Spring 2015

Secure coding practices

ANATOMY OF AN ATTACK!

Remote Desktop Security for the SMB

Evaluating the Security Risks of Static vs. Dynamic Websites

SYMANTEC ENTERPRISE SECURITY. Symantec Internet Security Threat Report September 2005 Power and Energy Industry Data Sheet

How were the Credit Card Numbers Published on the Web? February 19, 2004

90% of data breaches are caused by software vulnerabilities.

NET 311 INFORMATION SECURITY

WHITE PAPER Cloud FastPath: A Highly Secure Data Transfer Solution

THE BUSINESS CASE FOR OUTSIDE-IN DATA CENTER SECURITY

What are PCI DSS? PCI DSS = Payment Card Industry Data Security Standards

Web Application & Web Server Vulnerabilities Assessment Pankaj Sharma

CYBERSECURITY PENETRATION TESTING - INTRODUCTION

GUI based and very easy to use, no security expertise required. Reporting in both HTML and RTF formats - Click here to view the sample report.

SECURITY TRENDS & VULNERABILITIES REVIEW WEB APPLICATIONS

CSCD 303 Essential Computer Security Fall 2017

GE Fanuc Intelligent Platforms

CSCD 303 Essential Computer Security Fall 2018

Defying Logic. Theory, Design, and Implementation of Complex Systems for Testing Application Logic. Rafal Los, Prajakta Jagdale

Security Aspects Control Rationale Best Practices Self-Assessment (Click all that applicable) 1. Security Policy and Security Management

5 IT security hot topics How safe are you?

W e b A p p l i c a t i o n S e c u r i t y : T h e D e v i l i s i n t h e D e t a i l s

Computer Security Policy

CompTIA Security+ Malware. Threats and Vulnerabilities Vulnerability Management

Web Applications Security. Radovan Gibala F5 Networks

Security Testing White Paper

COMPUTER NETWORK SECURITY

Secure Web Application: Preventing Application Injections

Application and Data Security with F5 BIG-IP ASM and Oracle Database Firewall

PROTECTION SERVICE FOR BUSINESS. Datasheet

OWASP Top 10. Copyright 2017 Ergon Informatik AG 2/13

The Evolving Threat of Internet Worms

A (sample) computerized system for publishing the daily currency exchange rates

Overview. Handling Security Incidents. Attack Terms and Concepts. Types of Attacks

PND at a glance: The World s Premier Online Practical Network Defense course. Self-paced, online, flexible access

VULNERABILITIES IN 2017 CODE ANALYSIS WEB APPLICATION AUTOMATED

3.5 SECURITY. How can you reduce the risk of getting a virus?

PHP-security Software lifecycle General Security Webserver security PHP security. Security Summary. Server-Side Web Languages

Excerpts of Web Application Security focusing on Data Validation. adapted for F.I.S.T. 2004, Frankfurt

WEB APPLICATION VULNERABILITIES

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 5 Host, Application, and Data Security

Web Application Penetration Testing

(CNS-301) Citrix NetScaler 11 Advance Implementation

John Coggeshall Copyright 2006, Zend Technologies Inc.

Cross-Site Request Forgery: The Sleeping Giant. Jeremiah Grossman Founder and CTO, WhiteHat Security

TIBCO Cloud Integration Security Overview

Web Security. Outline

WHITE PAPER. Vericlave The Kemuri Water Company Hack

Web 2.0 and AJAX Security. OWASP Montgomery. August 21 st, 2007

DreamFactory Security Guide

THE STATE OF MEDIA SECURITY HOW MEDIA COMPANIES ARE SECURING THEIR ONLINE PROPERTIES

Data Security and Privacy : Compliance to Stewardship. Jignesh Patel Solution Consultant,Oracle

CN!Express CX-6000 Single User Version PCI Compliance Status Version June 2005

Using the Cisco ACE Application Control Engine Application Switches with the Cisco ACE XML Gateway

COPYRIGHTED MATERIAL. Contents. Part I: The Basics in Depth 1. Chapter 1: Windows Attacks 3. Chapter 2: Conventional and Unconventional Defenses 51

WELCOME. APEX Security Primer. About Enkitec. About the Presenter. ! Oracle Platinum Partner! Established in 2004

Imperva Incapsula Website Security

Privileged Account Security: A Balanced Approach to Securing Unix Environments

Potential Mitigation Strategies for the Common Vulnerabilities of Control Systems Identified by the NERC Control Systems Security Working Group

NSTB Assessments Summary Report: Common Industrial Control System Cyber Security Weaknesses

Transcription:

The Weakest Link: Mitigating Web Application Vulnerabilities webscurity White Paper webscurity Inc. Minneapolis, Minnesota USA March 19, 2008

Contents Executive Summary...3 Introduction...4 Target Audience...4 Background...4 Common Web Application Attacks...5 Defacement...5 Worms...5 Buffer Overruns...5 URL Parameter Tampering...5 Banner-grabbing...6 Hidden Field Manipulation...6 Cookie Tampering...6 SQL Injection...6 Stealth Commanding...7 Cross-site Scripting...7 Forceful Browsing...7 Inadvertently Helping the Attacker...8 What You Can Do...9 Conclusions/Recommendations... 10 Contacts... 11 Appendix 1: References... 12 Open Web Application Security Project... 12 Web Application Security Consortium... 12 March 19, 2008 Page 2 webscurity inc.

Section 1 Executive Summary Insecure Web applications provide an attacker a way through even the most robust perimeter defenses. This paper describes Web application vulnerabilities, their respective impact on overall security, and techniques to mitigate them. The door is open to customers and attackers alike For a long time, the prevailing wisdom has been that firewalls = security. But as networks have become more and more secure, attackers are seeking out easier targets. They are increasingly discovering that manipulating applications can be much more productive. After all, they can get in through the same door in the perimeter defenses deliberately left open for legitimate users such as customers, suppliers, and trading partners. Since 2001, webscurity has helped organizations of all sizes address Web application security. Industries from financial services to healthcare - food services to distribution - have benefited from our experience and understanding of Web application security. March 19, 2008 Page 3 webscurity inc.

Section 2 Introduction Target Audience Background One of the most important elements of a secure e-commerce environment is the applications. Web applications written and deployed without security as a prime consideration can inadvertently: Expose sensitive or confidential information Facilitate website defacement Provide access to private networks Perpetrate Denial of Service (DoS) attacks Facilitate unhindered access to back-end databases Application attacks cannot be prevented by network firewalls, intrusion-detection, or even encryption. These attacks work by exploiting the Web server and the applications it runs, meaning the attackers enter through the same open door in the perimeter defenses that customers use to access the website. Malicious activity cannot be distinguished from normal, everyday Web traffic. This paper is targeted toward security specialists, system administrators, developers, and other individuals interested in learning the importance of Web application security. The stateless nature of HTTP doesn t help Many of the most serious and difficult to detect - Web application attacks take advantage of the stateless nature of the Hypertext Transfer Protocol (HTTP) and the special programming required to develop useful applications for the Web. There are two types of attacks: Indiscriminate - the attacker has no interest in who your organization is or what it does, but simply the fact that you have a Web server Targeted (discriminate) - the attacker has selected a Web site for very specific reasons which might include financial gain, publicity, business disruption, etc. Worms are examples of indiscriminate attacks, while the various forms of parameter manipulation (such as cookie tampering discussed below) are typically targeted attacks. March 19, 2008 Page 4 webscurity inc.

Section 3 Common Web Application Attacks Defacement Web site defacement can largely be prevented through detailed server hardening by an experienced system administrator. However, operating systems, Web servers (HTTP servers like Apache, IIS, etc.), and other server software packages are typically shipped in an insecure configuration. It is up to a seasoned administrator to ensure all components are configured securely. It is widely reported that the vast majority (perhaps as high as 90%) of all attacks exploit improperly configured systems. Worms Possibly the most common type of indiscriminate attack, worms like Code Red, Nimda, and Slapper spread at an incredible pace. Often, they can infect hundreds of thousands of servers in a matter of minutes. Worms exploit vulnerabilities in widely-used server software. While fixes for the vulnerabilities are generally released quickly, it is little consolation to the hundreds of thousands of organizations that suffer countless damages due to downtime, lost productivity, and general business disruption. Buffer Overruns URL Parameter Tampering One of the most common attacks exploits a common programming mistake known as buffer overruns (also referred to as buffer overflows ). Virtually every mainstream software product commercial or open-source has had a buffer overrun issue of one sort or another. While some buffer overrun conditions can be relatively harmless, others can be as serious as allowing the attacker administrator access to the server and/or network. Web applications that use the URL query string to pass information from page-to-page (a widely-used way of maintaining state) are susceptible to parameter tampering. This attack is literally as simple as altering the query string parameter values in the browser s address bar! March 19, 2008 Page 5 webscurity inc.

For example, consider the following URL: http://www.website.com/show_account.asp?loggedin=true&acct=123456789 What happens if the acct parameter s value is changed to 223456789 and sent back to the server (as shown below)? http://www.website.com/show_account.asp?loggedin=true&acct=223456789 Banner-grabbing Hidden Field Manipulation Cookie Tampering SQL Injection The first step in any attack is selecting the appropriate toolbox. Two pieces of information that determine the attacker s toolbox choice are: Operating system Web server type A simple process known as banner-grabbing provides the attacker with both these pieces of information. Using a telnet utility, the attacker can quickly determine what operating system a given server is running, as well as the type of Web server (Apache, IIS, etc.) it is using. Knowing this, the attacker can construct attacks appropriate for the environment. Closely related to URL parameter tampering (see above), hidden field manipulation involves altering parameter values, except these are hidden from the user. Hidden fields are an HTML input type (<input type= hidden >) that are NOT rendered by the browser and shown to the user they are hidden. However, because most browsers provide a View/Source option, it is easy for anyone to see and alter hidden field values. The acct parameter from the example above could have been implemented as a hidden field. This would have made it less obvious and slightly increased the difficulty of altering its value, but it doesn t offer much protection against even a novice attacker! Like URL query string parameters and hidden fields, cookies are a popular way to maintain state information. While they are slightly more difficult to locate and alter, their relative level of obscurity compared to the other two methods is not sufficient to prevent malicious activity. Freely available tools help automate the process of cookie tampering. Data-entry fields can unknowingly provide a convenient way for an attacker to access an SQL-compliant back-end database and execute March 19, 2008 Page 6 webscurity inc.

Stealth Commanding Cross-site Scripting Forceful Browsing their own SQL statements. Any user input (including hidden fields, URL query string parameters and cookie values) used by the Web application to construct SQL statements (usually part of the where clause) could result in the unintended execution of SQL statements injected by an attacker. SQL injection can be used to bypass authentication, gain unrestricted access to data, and in extreme cases, allow an attacker to execute destructive SQL statements like DROP TABLE users;! Similar to SQL injection, stealth commanding allows an attacker to execute operating system commands on the server without proper authorization. Any user input (including hidden fields, URL query string parameters, and cookie values) used by the Web application to construct operating system calls (shell scripts, commands, etc.) could allow an attacker to execute commands of their choice. Because most Web servers (Apache, IIS, etc.) run as a privileged group/user, the commands executed by the Web application (on behalf of the attacker) are also privileged. This is only one example of how stealth commanding can be accomplished. Cross-site scripting is the act of injecting malicious HTML tags or clientside scripting code into HTML form fields. The contents of these fields are saved to a database where they are later retrieved and automatically executed by an innocent user. Essentially, it is a way to affect another user s experience. Forceful browsing is the act of directly accessing pages (URL s) without consideration for its context within an application. Bypassing intended application flow can lead to unauthorized access to resources which could mean a press release getting out before expected to circumventing authentication altogether. March 19, 2008 Page 7 webscurity inc.

Section 4 Inadvertently Helping the Attacker Information that would be insignificant to a normal user is deadly in the hands of skilled attacker. Something as simple as disclosing the Web server platform (see banner grabbing discussion above) helps an attacker form the basis of their attack. Error messages are a great source of intelligence for attackers An attacker can also gather valuable information from error messages reported by the application. The common practice of reporting detailed error messages can aid the support process in controlled environments. However, when your audience is literally anyone in the world with an Internet connection, a different approach is needed. For example, database error messages from a failed query frequently contain details of the environment better left undisclosed, such as the database platform, vendor, and version. They may also include details of the database s table structure and layout. Don t give them any hints Letting a would-be attacker know they have entered an incorrect user id or password, specifically, gives them an unnecessary advantage. Generic messages such as Log in failed are much safer. March 19, 2008 Page 8 webscurity inc.

Section 5 What You Can Do Proper server hardening and upto-date patches Developer training, coding standards, code reviews Give away as little as possible Web application firewall Indiscriminate attacks can often be prevented through extensive server hardening and keeping patches up-to-date. However, even the latest patches only provide protection against known attacks. These measures are important, but unfortunately, are reactive rather than proactive. Build security into the development cycle by training programmers to write secure Web applications and conducting 3 rd -party source code assessments. Clear standards and regular internal assessments will also help ensure secure applications. Disabling Web server identification and avoiding detailed error messages will slow down an attacker tremendously. Install a Web application firewall to ensure all traffic that reaches the Web server and its applications will be exactly what is expected. March 19, 2008 Page 9 webscurity inc.

Section 6 Conclusions/Recommendations The degree to which insecure Web applications can undermine perimeter defenses cannot be over-emphasized. The most robust security measures will not protect back-end systems if holes exist in the applications. Focused attention to the environment behind the firewall is recommended to ensure on-going security. In addition to proper server hardening, secure coding practices, and frequent assessments, a Web application firewall is the perfect compliment to existing perimeter defenses. March 19, 2008 Page 10 webscurity inc.

Section 7 Contacts For more information, please contact info@webscurity.com. webscurity Inc. 9298 Central Ave NE Suite 402 Minneapolis, Minnesota USA 55434 Toll Free 866.SCURITY (728.7489) International/Twin Cities Metro - 1.763.786.2009 Fax 1.763.786.3680 info@webscurity.com www.webscurity.com March 19, 2008 Page 11 webscurity inc.

Appendix 1: References Open Web Application Security Project The Open Web Application Security Project (OWASP) is dedicated to finding and fighting the causes of insecure software. Everything here is free and open source. The OWASP Foundation is a 501c3 not-for-profit charitable organization that ensures the ongoing availability and support for our work. Participation in OWASP is free and open to all. http://www.owasp.org Web Application Security Consortium The Web Application Security Consortium (WASC) is an international group of experts, industry practitioners, and organizational representatives who produce open source and widely agreed upon bestpractice security standards for the World Wide Web. http://www.webappsec.org March 19, 2008 Page 12 webscurity inc.