This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
CRV2 FrameworkSpecIssuesASPNetManagedCode
Code Review Manage Code
.NET Managed code is less vulnerable to common vulnerabilities found in unmanaged code such as Buffer Overflows and memory corruption however there could be issues in the code that can affect performance and security. The following is a summary of the recommended practices to look for during the code review. Also, it is worth mentioning some tools that can make the work easier on this part and they can help you understand and pin point flaws in your code
Code Access Security
This supports the execution of semi-trusted code, preventing several forms of security threats. The following is a summary of possible vulnerabilities due to improper use of Code Access security:
Vulnerability | Implications |
---|---|
Improper use of link demands or asserts | The code is susceptible to luring attacks. |
Code allows untrusted callers | Malicious code can use the code to perform sensitive operations and access resources. |
(MSDN, 2013)
Declarative security
Use declarative security instead of imperative whenever possible. Example of declarative syntax(MSDN[2], 2013):
[MyPermission(SecurityAction.Demand, Unrestricted = true)] public class MyClass { public MyClass() { //The constructor is protected by the security call. } public void MyMethod() { //This method is protected by the security call. } public void YourMethod() { //This method is protected by the security call. }
}
Unmanaged code
Even though C# is a strong type language, it is possible to use unmanaged code calls by using the ‘unsafe’ code. “Check that any class that uses an unmanaged resource, such as a database connection across method calls, implements the IDisposable interface. If the semantics of the object are such that a Close method is more logical than a Dispose method, provide a Close method in addition to Dispose”.
Exception handling
Manage code should use exception handling for security purposes among other reasons. Make sure that you follow these recommendations:
- Avoid exception handling in loops, use try/catch block if it is necessary.
- Identify code that swallows exceptions
- Use exceptions handling for unexpected conditions and not just to control the flow in the application
Tools
FxCop
FxCop is an analysis tool that analyses binary assemblies, not source code. The tool has a predefined set of rules and it is possible to configure and extend them. Some of the available rules regarding security are(CodePlex, 2010):
EnableEventValidationShouldBeTrue Verifies if the EnableEventValidation directive is disabled on a certain page
ValidateRequestShouldBeEnabled Verifies if the ValidateRequest directive is disabled on a certain page.
ViewStateEncryptionModeShouldBeAlways Verifies if the ViewStateEncryptionMode directive is not set to Never on a certain page.
EnableViewStateMacShouldBeTrue Verifies if the EnableViewStateMac directive is not set to false on a certain page.
EnableViewStateShouldBeTrue Verifies if the EnableViewState directive is not set to false on a certain page.
ViewStateUserKeyShouldBeUsed Verifies if the Page.ViewStateUserKey is being used in the application to prevent CSRF.
DebugCompilationMustBeDisabled Verifies that debug compilation is turned off. This eliminates potential performance and security issues related to debug code enabled and additional extensive error messages being returned.
CustomErrorPageShouldBeSpecified Verifies that the CustomErrors section is configured to have a default URL for redirecting uses in case of error.
FormAuthenticationShouldNotContainFormAuthenticationCredentials Verifies that no credentials are specified under the form authentication configuration.
EnableCrossAppRedirectsShouldBeTrue Verifies that system.web.authentication.forms enableCrossAppRedirects is set to true. The settings indicate if the user should be redirected to another application url after the authentication process. If the setting is false, the authentication process will not allow redirection to another application or host. This helps prevent an attacker to force the user to be redirected to another site during the authentication process. This attack is commonly called Open redirect and is used mostly during phishing attacks.
FormAuthenticationProtectionShouldBeAll Verifies that the protection attribute on the system.web.authentication.forms protection is set to All which specifies that the application use both data validation and encryption to \ help protect the authentication cookie.
FormAuthenticationRequireSSLShouldBeTrue Verifies that the requireSSL attribute on the system.web.authentication.forms configuration element is set to True which forces the authentication cookie to specify the secure attribute. This directs the browser to only provide the cookie over SSL.
FormAuthenticationSlidingExpirationShouldBeFalse Verifies that system.web.authentication.forms slidingExpiration is set to false when the site is being served over HTTP. This will force the authentication cookie to have a fixed timeout value instead of being refreshed by each request. Since the cookie will traverse over clear text network and could potentially be intercepted, having a fixed timeout value on the cookie will limit the amount of time the cookie can be replayed. If the cookie is being sent only over HTTPS, it is less likely to be intercepted and having the slidingExpiration setting to True will cause the timeout to be refreshed after each request which gives a better user experience.
HttpCookiesHttpOnlyCookiesShouldBeTrue Verifies that the system.web.httpCookies httpOnlyCookies configuration setting is set to True which forces all cookies to be sent with the HttpOnly attribute.
HttpCookiesRequireSSLShouldBeTrue Verifies that the system.web.httpCookies requireSSL configuration is set to True which forces all cookies to be sent with the secure attribute. This indicates the browser to only provide the cookie over SSL.
TraceShouldBeDisabled Verifies that the system.web.trace enabled setting is set to false which disables tracing. It is recommended to disable tracing on production servers to make sure that an attacker cannot gain information from the trace about your application. Trace information can help an attacker probe and compromise your application.
AnonymousAccessIsEnabled Looks in the web.config file to see if the authorization section allows anonymous access.
RoleManagerCookieProtectionShouldBeAll Verifies that the system.web.rolemanager cookieProtection is set to All which enforces the cookie to be both encrypted and validated by the server.
RoleManagerCookieRequireSSLShouldBeTrue Verifies that the system.web.rolemanager cookieRequireSSL attribute is set to True which forces the role manager cookie to specify the secure attribute. This directs the browser to only provide the cookie over SSL.
RoleManagerCookieSlidingExpirationShouldBeTrue Verifies that the system.web.rolemanager cookieSlidingExpiration is set to false when the site is being served over HTTP. This will force the authentication cookie to have a fixed timeout value instead of being refreshed by each request. Since the cookie will traverse over clear text network and could potentially be intercepted, having a fixed timeout value on the cookie will limit the amount of time the cookie can be replayed. If the cookie is being sent only over HTTPS, it is less likely to be intercepted and having the slidingExpiration setting to True will cause the timeout to be refreshed after each request which gives a better user experience.
PagesEnableViewStateMacShouldBeTrue Verifies that the viewstate mac is enabled.
PagesEnableEventValidationMustBeTrue Verifies that event validation is enabled.
HttpRuntimeEnableHeaderCheckingShouldBeTrue Verifies that the system.web.httpRuntime enableHeaderChecking attribute is set to true. The setting indicates whether ASP.NET should check the request header for potential injection attacks. If an attack is detected, ASP.NET responds with an error. This forces ASP.NET to apply the ValidateRequest protection to headers sent by the client. If an attack is detected the application throws HttpRequestValidationException.
PagesValidateRequestShouldBeEnabled Verify that validateRequest is enabled.
PagesViewStateEncryptionModeShouldBeAlways Verifies that the viewstate encryption mode is not configured to never encrypt.
CustomErrorsModeShouldBeOn Verifies that the system.web.customErrors mode is set to On or RemoteOnly. This disable detailed error message returned by ASP.NET to remote users.
MarkVerbHandlersWithValidateAntiforgeryToken Verifies that ValidateAntiforgeryTokenAttribute is used to protect against potential CSRF attacks against ASP.NET MVC applications.
OWASP O2 platform(VisualStudio C# REPL - O2 Platform (v5.1))
The O2 platform represents a new paradigm for how to perform, document and distribute Web Application security reviews. O2 is designed to Automate Application Security Knowledge and Workflows and to Allow non-security experts to access and consume Security Knowledge. We strongly recommend it to .NET developers since this tool helps you identify current security issues in the framework.(Cruz, 2013)
O2 Platform is also available as a VisualStudio Extension which you can download from VisualStudio Gallery (see VisualStudio C# REPL - O2 Platform) or directly using VisualStudio's Extension Manager: http://visualstudiogallery.msdn.microsoft.com/295fa0f6-37d1-49a3-b51d-ea4741905dc2
References
MSDN 2013 "Code Access Security" available at http://msdn.microsoft.com/en-us/library/33tceax8.aspx (Last viewed 25th July, 2013)
MSDN[2], 2013, "Declarative Security" available at http://msdn.microsoft.com/en-us/library/kaacwy28.aspx (Last viewed 25th July, 2013)
CodePlex, 2010 "Fxcop ASP.NET Security Rules" Available at http://fxcopaspnetsecurity.codeplex.com/ (Last viewed 25th July, 2013)
Cruz, D. 2013 OWASP O2 Platform, available at https://www.owasp.org/index.php/OWASP_O2_Platform (Last viewed 25th July, 2013)