This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Test HTTP Methods (OTG-CONFIG-006)"
Swakefield (talk | contribs) m (→Black Box testing and example) |
|||
(40 intermediate revisions by 18 users not shown) | |||
Line 1: | Line 1: | ||
− | + | {{Template:OWASP Testing Guide v4}} | |
− | {{Template:OWASP Testing Guide | ||
− | == | + | == Summary == |
− | + | HTTP offers a number of methods that can be used to perform actions on the web server. Many of theses methods are designed to aid developers in deploying and testing HTTP applications. These HTTP methods can be used for nefarious purposes if the web server is misconfigured. Additionally, Cross Site Tracing (XST), a form of cross site scripting using the server's HTTP TRACE method, is examined.<br> | |
− | + | ||
− | While GET and POST are by far the most common methods that are used to access information provided by a web server, the Hypertext Transfer Protocol (HTTP) allows several other (and somewhat less known) methods. RFC 2616 (which describes HTTP version 1.1 which is the today | + | While GET and POST are by far the most common methods that are used to access information provided by a web server, the Hypertext Transfer Protocol (HTTP) allows several other (and somewhat less known) methods. RFC 2616 (which describes HTTP version 1.1 which is the standard today) defines the following eight methods: |
* HEAD | * HEAD | ||
Line 15: | Line 14: | ||
* OPTIONS | * OPTIONS | ||
* CONNECT | * CONNECT | ||
+ | |||
Some of these methods can potentially pose a security risk for a web application, as they allow an attacker to modify the files stored on the web server and, in some scenarios, steal the credentials of legitimate users. More specifically, the methods that should be disabled are the following: | Some of these methods can potentially pose a security risk for a web application, as they allow an attacker to modify the files stored on the web server and, in some scenarios, steal the credentials of legitimate users. More specifically, the methods that should be disabled are the following: | ||
− | * PUT: This method allows a client to upload new files on the web server. An attacker can exploit it by uploading malicious files (e.g.: an asp file that executes commands by invoking cmd.exe), or by simply using the victim server as a file repository | + | * PUT: This method allows a client to upload new files on the web server. An attacker can exploit it by uploading malicious files (e.g.: an asp file that executes commands by invoking cmd.exe), or by simply using the victim's server as a file repository. |
− | * DELETE: This method allows a client to delete a file on the web server. An attacker can exploit it as a very simple and direct way to deface a web site or to mount a DoS attack | + | * DELETE: This method allows a client to delete a file on the web server. An attacker can exploit it as a very simple and direct way to deface a web site or to mount a DoS attack. |
− | * CONNECT: This method could allow a client to use the web server as a proxy | + | * CONNECT: This method could allow a client to use the web server as a proxy. |
− | * TRACE: This method simply echoes back to the client whatever string has been sent to the server, and | + | * TRACE: This method simply echoes back to the client whatever string has been sent to the server, and is used mainly for debugging purposes. This method, originally assumed harmless, can be used to mount an attack known as Cross Site Tracing, which has been discovered by Jeremiah Grossman (see links at the bottom of the page). |
+ | |||
+ | |||
+ | If an application needs one or more of these methods, such as REST Web Services (which may require PUT or DELETE), it is important to check that their usage is properly limited to trusted users and safe conditions. | ||
+ | |||
+ | |||
+ | === Arbitrary HTTP Methods === | ||
+ | |||
+ | Arshan Dabirsiaghi (see links) discovered that many web application frameworks allowed well chosen or arbitrary HTTP methods to bypass an environment level access control check: | ||
+ | |||
+ | * Many frameworks and languages treat "HEAD" as a "GET" request, albeit one without any body in the response. If a security constraint was set on "GET" requests such that only "authenticatedUsers" could access GET requests for a particular servlet or resource, it would be bypassed for the "HEAD" version. This allowed unauthorized blind submission of any privileged GET request. | ||
+ | |||
+ | * Some frameworks allowed arbitrary HTTP methods such as "JEFF" or "CATS" to be used without limitation. These were treated as if a "GET" method was issued, and were found not to be subject to method role based access control checks on a number of languages and frameworks, again allowing unauthorized blind submission of privileged GET requests. | ||
+ | |||
+ | |||
+ | In many cases, code which explicitly checked for a "GET" or "POST" method would be safe. | ||
+ | |||
+ | |||
+ | == How to Test == | ||
− | |||
− | |||
'''Discover the Supported Methods''' <br> | '''Discover the Supported Methods''' <br> | ||
− | To perform this test, | + | To perform this test, the tester needs some way to figure out which HTTP methods are supported by the web server that is being examined. The OPTIONS HTTP method provides the tester with the most direct and effective way to do that. RFC 2616 states that, "The OPTIONS method represents a request for information about the communication options available on the request/response chain identified by the Request-URI". |
+ | |||
The testing method is extremely straightforward and we only need to fire up netcat (or telnet): | The testing method is extremely straightforward and we only need to fire up netcat (or telnet): | ||
<pre> | <pre> | ||
− | + | $ nc www.victim.com 80 | |
OPTIONS / HTTP/1.1 | OPTIONS / HTTP/1.1 | ||
Host: www.victim.com | Host: www.victim.com | ||
Line 41: | Line 58: | ||
Content-Length: 0 | Content-Length: 0 | ||
− | |||
</pre> | </pre> | ||
− | As we can see in the example, OPTIONS provides a list of the methods that are supported by the web server, and in this case we can see | + | |
+ | |||
+ | As we can see in the example, OPTIONS provides a list of the methods that are supported by the web server, and in this case we can see that TRACE method is enabled. The danger that is posed by this method is illustrated in the following section | ||
+ | |||
+ | The same test can also be executed using nmap and the http-methods NSE script: | ||
+ | <pre> | ||
+ | C:\Tools\nmap-6.40>nmap -p 443 --script http-methods localhost | ||
+ | |||
+ | Starting Nmap 6.40 ( http://nmap.org ) at 2015-11-04 11:52 Romance Standard Time | ||
+ | |||
+ | Nmap scan report for localhost (127.0.0.1) | ||
+ | Host is up (0.0094s latency). | ||
+ | PORT STATE SERVICE | ||
+ | 443/tcp open https | ||
+ | | http-methods: OPTIONS TRACE GET HEAD POST | ||
+ | | Potentially risky methods: TRACE | ||
+ | |_See http://nmap.org/nsedoc/scripts/http-methods.html | ||
+ | |||
+ | Nmap done: 1 IP address (1 host up) scanned in 20.48 seconds | ||
+ | </pre> | ||
+ | <br><br> | ||
'''Test XST Potential'''<br> | '''Test XST Potential'''<br> | ||
− | Note: in order to understand the logic and the goals of this attack | + | Note: in order to understand the logic and the goals of this attack one must be familiar with [[XSS |Cross Site Scripting attacks]]. |
+ | |||
+ | |||
+ | The TRACE method, while apparently harmless, can be successfully leveraged in some scenarios to steal legitimate users' credentials. This attack technique was discovered by Jeremiah Grossman in 2003, in an attempt to bypass the [[HTTPOnly]] tag that Microsoft introduced in Internet Explorer 6 SP1 to protect cookies from being accessed by JavaScript. As a matter of fact, one of the most recurring attack patterns in Cross Site Scripting is to access the document.cookie object and send it to a web server controlled by the attacker so that he or she can hijack the victim's session. Tagging a cookie as httpOnly forbids JavaScript from accessing it, protecting it from being sent to a third party. However, the TRACE method can be used to bypass this protection and access the cookie even in this scenario. | ||
− | |||
− | As mentioned before, TRACE simply returns any string that is sent to the web server. In order to verify its presence (or to double-check the results of the OPTIONS request shown above), | + | As mentioned before, TRACE simply returns any string that is sent to the web server. In order to verify its presence (or to double-check the results of the OPTIONS request shown above), the tester can proceed as shown in the following example: |
<pre> | <pre> | ||
− | + | $ nc www.victim.com 80 | |
TRACE / HTTP/1.1 | TRACE / HTTP/1.1 | ||
Host: www.victim.com | Host: www.victim.com | ||
Line 65: | Line 103: | ||
Host: www.victim.com | Host: www.victim.com | ||
</pre> | </pre> | ||
− | |||
− | |||
− | * | + | The response body is exactly a copy of our original request, meaning that the target allows this method. Now, where is the danger lurking? If the tester instructs a browser to issue a TRACE request to the web server, and this browser has a cookie for that domain, the cookie will be automatically included in the request headers, and will therefore be echoed back in the resulting response. At that point, the cookie string will be accessible by JavaScript and it will be finally possible to send it to a third party even when the cookie is tagged as httpOnly. |
− | * | + | |
+ | |||
+ | There are multiple ways to make a browser issue a TRACE request, such as the XMLHTTP ActiveX control in Internet Explorer and XMLDOM in Mozilla and Netscape. However, for security reasons the browser is allowed to start a connection only to the domain where the hostile script resides. This is a mitigating factor, as the attacker needs to combine the TRACE method with another vulnerability in order to mount the attack. | ||
+ | |||
+ | |||
+ | An attacker has two ways to successfully launch a Cross Site Tracing attack: | ||
+ | *Leveraging another server-side vulnerability: the attacker injects the hostile JavaScript snippet that contains the TRACE request in the vulnerable application, as in a normal Cross Site Scripting attack | ||
+ | *Leveraging a client-side vulnerability: the attacker creates a malicious website that contains the hostile JavaScript snippet and exploits some cross-domain vulnerability of the browser of the victim, in order to make the JavaScript code successfully perform a connection to the site that supports the TRACE method and that originated the cookie that the attacker is trying to steal. | ||
+ | |||
More detailed information, together with code samples, can be found in the original whitepaper written by Jeremiah Grossman.<br> | More detailed information, together with code samples, can be found in the original whitepaper written by Jeremiah Grossman.<br> | ||
− | == | + | |
− | + | === Testing for arbitrary HTTP methods === | |
− | < | + | |
+ | Find a page to visit that has a security constraint such that it would normally force a 302 redirect to a log in page or forces a log in directly. The test URL in this example works like this, as do many web applications. However, if a tester obtains a "200" response that is not a log in page, it is possible to bypass authentication and thus authorization. | ||
+ | |||
+ | <pre> | ||
+ | $ nc www.example.com 80 | ||
+ | JEFF / HTTP/1.1 | ||
+ | Host: www.example.com | ||
+ | |||
+ | HTTP/1.1 200 OK | ||
+ | Date: Mon, 18 Aug 2008 22:38:40 GMT | ||
+ | Server: Apache | ||
+ | Set-Cookie: PHPSESSID=K53QW... | ||
+ | </pre> | ||
+ | |||
+ | |||
+ | If the framework or firewall or application does not support the "JEFF" method, it should issue an error page (or preferably a 405 Not Allowed or 501 Not implemented error page). If it services the request, it is vulnerable to this issue. | ||
+ | |||
+ | |||
+ | If the tester feels that the system is vulnerable to this issue, they should issue CSRF-like attacks to exploit the issue more fully: | ||
+ | |||
+ | * FOOBAR /admin/createUser.php?member=myAdmin | ||
+ | * JEFF /admin/changePw.php?member=myAdmin&passwd=foo123&confirm=foo123 | ||
+ | * CATS /admin/groupEdit.php?group=Admins&member=myAdmin&action=add | ||
+ | |||
+ | |||
+ | With some luck, using the above three commands - modified to suit the application under test and testing requirements - a new user would be created, a password assigned, and made an administrator. | ||
+ | |||
+ | |||
+ | === Testing for HEAD access control bypass === | ||
+ | |||
+ | Find a page to visit that has a security constraint such that it would normally force a 302 redirect to a log in page or forces a log in directly. The test URL in this example works like this, as do many web applications. However, if the tester obtains a "200" response that is not a login page, it is possible to bypass authentication and thus authorization. | ||
+ | |||
+ | <pre> | ||
+ | $ nc www.example.com 80 | ||
+ | HEAD /admin HTTP/1.1 | ||
+ | Host: www.example.com | ||
+ | |||
+ | HTTP/1.1 200 OK | ||
+ | Date: Mon, 18 Aug 2008 22:44:11 GMT | ||
+ | Server: Apache | ||
+ | Set-Cookie: PHPSESSID=pKi...; path=/; HttpOnly | ||
+ | Expires: Thu, 19 Nov 1981 08:52:00 GMT | ||
+ | Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 | ||
+ | Pragma: no-cache | ||
+ | Set-Cookie: adminOnlyCookie1=...; expires=Tue, 18-Aug-2009 22:44:31 GMT; domain=www.example.com | ||
+ | Set-Cookie: adminOnlyCookie2=...; expires=Mon, 18-Aug-2008 22:54:31 GMT; domain=www.example.com | ||
+ | Set-Cookie: adminOnlyCookie3=...; expires=Sun, 19-Aug-2007 22:44:30 GMT; domain=www.example.com | ||
+ | Content-Language: EN | ||
+ | Connection: close | ||
+ | Content-Type: text/html; charset=ISO-8859-1 | ||
+ | </pre> | ||
+ | |||
+ | |||
+ | If the tester gets a "405 Method not allowed" or "501 Method Unimplemented", the target (application/framework/language/system/firewall) is working correctly. If a "200" response code comes back, and the response contains no body, it's likely that the application has processed the request without authentication or authorization and further testing is warranted. | ||
+ | |||
+ | If the tester thinks that the system is vulnerable to this issue, they should issue CSRF-like attacks to exploit the issue more fully: | ||
+ | |||
+ | * HEAD /admin/createUser.php?member=myAdmin | ||
+ | * HEAD /admin/changePw.php?member=myAdmin&passwd=foo123&confirm=foo123 | ||
+ | * HEAD /admin/groupEdit.php?group=Admins&member=myAdmin&action=add | ||
+ | |||
+ | |||
+ | With some luck, using the above three commands - modified to suit the application under test and testing requirements - a new user would be created, a password assigned, and made an administrator, all using blind request submission. | ||
+ | |||
+ | |||
+ | ==Tools== | ||
+ | *NetCat - http://nc110.sourceforge.net | ||
+ | *cURL - http://curl.haxx.se/ | ||
+ | *nmap http-methods NSE script - https://nmap.org/nsedoc/scripts/http-methods.html | ||
+ | |||
+ | |||
== References == | == References == | ||
'''Whitepapers'''<br> | '''Whitepapers'''<br> | ||
− | * RFC 2616: | + | * RFC 2616: "Hypertext Transfer Protocol -- HTTP/1.1" |
− | * RFC 2109 and RFC 2965: | + | * RFC 2109 and RFC 2965: "HTTP State Management Mechanism" |
* Jeremiah Grossman: "Cross Site Tracing (XST)" - http://www.cgisecurity.com/whitehat-mirror/WH-WhitePaper_XST_ebook.pdf<br> | * Jeremiah Grossman: "Cross Site Tracing (XST)" - http://www.cgisecurity.com/whitehat-mirror/WH-WhitePaper_XST_ebook.pdf<br> | ||
* Amit Klein: "XS(T) attack variants which can, in some cases, eliminate the need for TRACE" - http://www.securityfocus.com/archive/107/308433 | * Amit Klein: "XS(T) attack variants which can, in some cases, eliminate the need for TRACE" - http://www.securityfocus.com/archive/107/308433 | ||
− | + | * Arshan Dabirsiaghi: "Bypassing VBAAC with HTTP Verb Tampering" - http://static.swpag.info/download/Bypassing_VBAAC_with_HTTP_Verb_Tampering.pdf | |
− | * | ||
− | |||
− | |||
− |
Latest revision as of 10:56, 4 November 2015
This article is part of the new OWASP Testing Guide v4.
Back to the OWASP Testing Guide v4 ToC: https://www.owasp.org/index.php/OWASP_Testing_Guide_v4_Table_of_Contents Back to the OWASP Testing Guide Project: https://www.owasp.org/index.php/OWASP_Testing_Project
Summary
HTTP offers a number of methods that can be used to perform actions on the web server. Many of theses methods are designed to aid developers in deploying and testing HTTP applications. These HTTP methods can be used for nefarious purposes if the web server is misconfigured. Additionally, Cross Site Tracing (XST), a form of cross site scripting using the server's HTTP TRACE method, is examined.
While GET and POST are by far the most common methods that are used to access information provided by a web server, the Hypertext Transfer Protocol (HTTP) allows several other (and somewhat less known) methods. RFC 2616 (which describes HTTP version 1.1 which is the standard today) defines the following eight methods:
- HEAD
- GET
- POST
- PUT
- DELETE
- TRACE
- OPTIONS
- CONNECT
Some of these methods can potentially pose a security risk for a web application, as they allow an attacker to modify the files stored on the web server and, in some scenarios, steal the credentials of legitimate users. More specifically, the methods that should be disabled are the following:
- PUT: This method allows a client to upload new files on the web server. An attacker can exploit it by uploading malicious files (e.g.: an asp file that executes commands by invoking cmd.exe), or by simply using the victim's server as a file repository.
- DELETE: This method allows a client to delete a file on the web server. An attacker can exploit it as a very simple and direct way to deface a web site or to mount a DoS attack.
- CONNECT: This method could allow a client to use the web server as a proxy.
- TRACE: This method simply echoes back to the client whatever string has been sent to the server, and is used mainly for debugging purposes. This method, originally assumed harmless, can be used to mount an attack known as Cross Site Tracing, which has been discovered by Jeremiah Grossman (see links at the bottom of the page).
If an application needs one or more of these methods, such as REST Web Services (which may require PUT or DELETE), it is important to check that their usage is properly limited to trusted users and safe conditions.
Arbitrary HTTP Methods
Arshan Dabirsiaghi (see links) discovered that many web application frameworks allowed well chosen or arbitrary HTTP methods to bypass an environment level access control check:
- Many frameworks and languages treat "HEAD" as a "GET" request, albeit one without any body in the response. If a security constraint was set on "GET" requests such that only "authenticatedUsers" could access GET requests for a particular servlet or resource, it would be bypassed for the "HEAD" version. This allowed unauthorized blind submission of any privileged GET request.
- Some frameworks allowed arbitrary HTTP methods such as "JEFF" or "CATS" to be used without limitation. These were treated as if a "GET" method was issued, and were found not to be subject to method role based access control checks on a number of languages and frameworks, again allowing unauthorized blind submission of privileged GET requests.
In many cases, code which explicitly checked for a "GET" or "POST" method would be safe.
How to Test
Discover the Supported Methods
To perform this test, the tester needs some way to figure out which HTTP methods are supported by the web server that is being examined. The OPTIONS HTTP method provides the tester with the most direct and effective way to do that. RFC 2616 states that, "The OPTIONS method represents a request for information about the communication options available on the request/response chain identified by the Request-URI".
The testing method is extremely straightforward and we only need to fire up netcat (or telnet):
$ nc www.victim.com 80 OPTIONS / HTTP/1.1 Host: www.victim.com HTTP/1.1 200 OK Server: Microsoft-IIS/5.0 Date: Tue, 31 Oct 2006 08:00:29 GMT Connection: close Allow: GET, HEAD, POST, TRACE, OPTIONS Content-Length: 0
As we can see in the example, OPTIONS provides a list of the methods that are supported by the web server, and in this case we can see that TRACE method is enabled. The danger that is posed by this method is illustrated in the following section
The same test can also be executed using nmap and the http-methods NSE script:
C:\Tools\nmap-6.40>nmap -p 443 --script http-methods localhost Starting Nmap 6.40 ( http://nmap.org ) at 2015-11-04 11:52 Romance Standard Time Nmap scan report for localhost (127.0.0.1) Host is up (0.0094s latency). PORT STATE SERVICE 443/tcp open https | http-methods: OPTIONS TRACE GET HEAD POST | Potentially risky methods: TRACE |_See http://nmap.org/nsedoc/scripts/http-methods.html Nmap done: 1 IP address (1 host up) scanned in 20.48 seconds
Test XST Potential
Note: in order to understand the logic and the goals of this attack one must be familiar with Cross Site Scripting attacks.
The TRACE method, while apparently harmless, can be successfully leveraged in some scenarios to steal legitimate users' credentials. This attack technique was discovered by Jeremiah Grossman in 2003, in an attempt to bypass the HTTPOnly tag that Microsoft introduced in Internet Explorer 6 SP1 to protect cookies from being accessed by JavaScript. As a matter of fact, one of the most recurring attack patterns in Cross Site Scripting is to access the document.cookie object and send it to a web server controlled by the attacker so that he or she can hijack the victim's session. Tagging a cookie as httpOnly forbids JavaScript from accessing it, protecting it from being sent to a third party. However, the TRACE method can be used to bypass this protection and access the cookie even in this scenario.
As mentioned before, TRACE simply returns any string that is sent to the web server. In order to verify its presence (or to double-check the results of the OPTIONS request shown above), the tester can proceed as shown in the following example:
$ nc www.victim.com 80 TRACE / HTTP/1.1 Host: www.victim.com HTTP/1.1 200 OK Server: Microsoft-IIS/5.0 Date: Tue, 31 Oct 2006 08:01:48 GMT Connection: close Content-Type: message/http Content-Length: 39 TRACE / HTTP/1.1 Host: www.victim.com
The response body is exactly a copy of our original request, meaning that the target allows this method. Now, where is the danger lurking? If the tester instructs a browser to issue a TRACE request to the web server, and this browser has a cookie for that domain, the cookie will be automatically included in the request headers, and will therefore be echoed back in the resulting response. At that point, the cookie string will be accessible by JavaScript and it will be finally possible to send it to a third party even when the cookie is tagged as httpOnly.
There are multiple ways to make a browser issue a TRACE request, such as the XMLHTTP ActiveX control in Internet Explorer and XMLDOM in Mozilla and Netscape. However, for security reasons the browser is allowed to start a connection only to the domain where the hostile script resides. This is a mitigating factor, as the attacker needs to combine the TRACE method with another vulnerability in order to mount the attack.
An attacker has two ways to successfully launch a Cross Site Tracing attack:
- Leveraging another server-side vulnerability: the attacker injects the hostile JavaScript snippet that contains the TRACE request in the vulnerable application, as in a normal Cross Site Scripting attack
- Leveraging a client-side vulnerability: the attacker creates a malicious website that contains the hostile JavaScript snippet and exploits some cross-domain vulnerability of the browser of the victim, in order to make the JavaScript code successfully perform a connection to the site that supports the TRACE method and that originated the cookie that the attacker is trying to steal.
More detailed information, together with code samples, can be found in the original whitepaper written by Jeremiah Grossman.
Testing for arbitrary HTTP methods
Find a page to visit that has a security constraint such that it would normally force a 302 redirect to a log in page or forces a log in directly. The test URL in this example works like this, as do many web applications. However, if a tester obtains a "200" response that is not a log in page, it is possible to bypass authentication and thus authorization.
$ nc www.example.com 80 JEFF / HTTP/1.1 Host: www.example.com HTTP/1.1 200 OK Date: Mon, 18 Aug 2008 22:38:40 GMT Server: Apache Set-Cookie: PHPSESSID=K53QW...
If the framework or firewall or application does not support the "JEFF" method, it should issue an error page (or preferably a 405 Not Allowed or 501 Not implemented error page). If it services the request, it is vulnerable to this issue.
If the tester feels that the system is vulnerable to this issue, they should issue CSRF-like attacks to exploit the issue more fully:
- FOOBAR /admin/createUser.php?member=myAdmin
- JEFF /admin/changePw.php?member=myAdmin&passwd=foo123&confirm=foo123
- CATS /admin/groupEdit.php?group=Admins&member=myAdmin&action=add
With some luck, using the above three commands - modified to suit the application under test and testing requirements - a new user would be created, a password assigned, and made an administrator.
Testing for HEAD access control bypass
Find a page to visit that has a security constraint such that it would normally force a 302 redirect to a log in page or forces a log in directly. The test URL in this example works like this, as do many web applications. However, if the tester obtains a "200" response that is not a login page, it is possible to bypass authentication and thus authorization.
$ nc www.example.com 80 HEAD /admin HTTP/1.1 Host: www.example.com HTTP/1.1 200 OK Date: Mon, 18 Aug 2008 22:44:11 GMT Server: Apache Set-Cookie: PHPSESSID=pKi...; path=/; HttpOnly Expires: Thu, 19 Nov 1981 08:52:00 GMT Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Set-Cookie: adminOnlyCookie1=...; expires=Tue, 18-Aug-2009 22:44:31 GMT; domain=www.example.com Set-Cookie: adminOnlyCookie2=...; expires=Mon, 18-Aug-2008 22:54:31 GMT; domain=www.example.com Set-Cookie: adminOnlyCookie3=...; expires=Sun, 19-Aug-2007 22:44:30 GMT; domain=www.example.com Content-Language: EN Connection: close Content-Type: text/html; charset=ISO-8859-1
If the tester gets a "405 Method not allowed" or "501 Method Unimplemented", the target (application/framework/language/system/firewall) is working correctly. If a "200" response code comes back, and the response contains no body, it's likely that the application has processed the request without authentication or authorization and further testing is warranted.
If the tester thinks that the system is vulnerable to this issue, they should issue CSRF-like attacks to exploit the issue more fully:
- HEAD /admin/createUser.php?member=myAdmin
- HEAD /admin/changePw.php?member=myAdmin&passwd=foo123&confirm=foo123
- HEAD /admin/groupEdit.php?group=Admins&member=myAdmin&action=add
With some luck, using the above three commands - modified to suit the application under test and testing requirements - a new user would be created, a password assigned, and made an administrator, all using blind request submission.
Tools
- NetCat - http://nc110.sourceforge.net
- cURL - http://curl.haxx.se/
- nmap http-methods NSE script - https://nmap.org/nsedoc/scripts/http-methods.html
References
Whitepapers
- RFC 2616: "Hypertext Transfer Protocol -- HTTP/1.1"
- RFC 2109 and RFC 2965: "HTTP State Management Mechanism"
- Jeremiah Grossman: "Cross Site Tracing (XST)" - http://www.cgisecurity.com/whitehat-mirror/WH-WhitePaper_XST_ebook.pdf
- Amit Klein: "XS(T) attack variants which can, in some cases, eliminate the need for TRACE" - http://www.securityfocus.com/archive/107/308433
- Arshan Dabirsiaghi: "Bypassing VBAAC with HTTP Verb Tampering" - http://static.swpag.info/download/Bypassing_VBAAC_with_HTTP_Verb_Tampering.pdf