This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Test integrity checks (OTG-BUSLOGIC-003)"
David Fern (talk | contribs) |
David Fern (talk | contribs) |
||
Line 4: | Line 4: | ||
Additionally, the application must not depend on non-editable controls, drop-down menus or hidden fields for business logic processing because these fields remain non-editable only in the context of the browsers. Users may be able to edit their values using proxy editor tools and try to manipulate business logic. If the application exposes values related to business rules like quantity, etc. as non-editable fields it must maintain a copy on the server side and use the same for business logic processing. | Additionally, the application must not depend on non-editable controls, drop-down menus or hidden fields for business logic processing because these fields remain non-editable only in the context of the browsers. Users may be able to edit their values using proxy editor tools and try to manipulate business logic. If the application exposes values related to business rules like quantity, etc. as non-editable fields it must maintain a copy on the server side and use the same for business logic processing. | ||
+ | |||
+ | Finally, aside from data system functionality and log systems must be secured in such a manner to prevent read, writing and removal. | ||
== Issue == | == Issue == | ||
− | The application must be smart enough to check for relational edits and not allow users to submit information directly to the server that is not valid, trusted because it came from a non-editable controls or the user is not authorized to submit through the front end. | + | The application must be smart enough to check for relational edits and not allow users to submit information directly to the server that is not valid, trusted because it came from a non-editable controls or the user is not authorized to submit through the front end. Additionally, system artifacts such as logs must be “protected” from unauthorized read, writing and removal. |
== Example == | == Example == | ||
Line 22: | Line 24: | ||
Suppose the motor vehicle administration system required an employee initially verify each citizens documentation and information when they issue an identification or drivers license. At this point the business process has created data with a high level of integrity as the integrity of submitted data is checked by the application. Now suppose the application is moved to the Internet so employees can log on for full service or citizens can log on for a reduced self-service application to update certain information. At this point an attacker may be able to use an intercepting proxy to add or update data that they should not have access to and they could destroy the integrity of the data by stating that the citizen was not married but supplying data for a spouse’s name. This type of inserting or updating of unverified data destroys the data integrity and might have been prevented if the business process logic was followed. | Suppose the motor vehicle administration system required an employee initially verify each citizens documentation and information when they issue an identification or drivers license. At this point the business process has created data with a high level of integrity as the integrity of submitted data is checked by the application. Now suppose the application is moved to the Internet so employees can log on for full service or citizens can log on for a reduced self-service application to update certain information. At this point an attacker may be able to use an intercepting proxy to add or update data that they should not have access to and they could destroy the integrity of the data by stating that the citizen was not married but supplying data for a spouse’s name. This type of inserting or updating of unverified data destroys the data integrity and might have been prevented if the business process logic was followed. | ||
+ | |||
+ | Example 4 | ||
+ | |||
+ | Many systems include logging for auditing and troubleshooting purposes. But, how good/valid is the information in these logs? Can they be manipulated having their integrity destroyed? | ||
== Testing Method == | == Testing Method == | ||
− | Method 1 | + | Generic Testing Method |
+ | |||
+ | • Identify all components in the application/system where the data/ information are stored or handled. For example, input fields or logs | ||
+ | • For each identified component attempt to edit the values with invalid data/information. | ||
+ | |||
+ | |||
+ | Specific Testing Method 1 | ||
• Using a proxy capture and HTTP traffic looking for hidden fields. | • Using a proxy capture and HTTP traffic looking for hidden fields. | ||
Line 31: | Line 43: | ||
• If a hidden field is found see how these fields compare with the GUI application and start interrogating this value through the proxy by submitting different data values trying to circumvent the business process and manipulate values you were not intended to have access to. | • If a hidden field is found see how these fields compare with the GUI application and start interrogating this value through the proxy by submitting different data values trying to circumvent the business process and manipulate values you were not intended to have access to. | ||
− | Method 2 | + | Specific Testing Method 2 |
• Using a proxy capture and HTTP traffic looking a place to insert information into areas of the application that are non-editable. | • Using a proxy capture and HTTP traffic looking a place to insert information into areas of the application that are non-editable. | ||
• If it is found see how these fields compare with the GUI application and start interrogating this value through the proxy by submitting different data values trying to circumvent the business process and manipulate values you were not intended to have access to. | • If it is found see how these fields compare with the GUI application and start interrogating this value through the proxy by submitting different data values trying to circumvent the business process and manipulate values you were not intended to have access to. | ||
+ | |||
+ | Specific Testing Method 3 | ||
+ | |||
+ | • List components of the application or system that could be edited, for example logging. | ||
+ | |||
+ | • For each component identified, try to read, edit or remove its information. For example log files should be identified and Testers should try to manipulate the data/information being collected. | ||
+ | |||
== Test Tools == | == Test Tools == | ||
Line 45: | Line 64: | ||
== Related Test Cases == | == Related Test Cases == | ||
− | + | 4.8 Data Validation Testing | |
+ | |||
+ | 4.11.1 Test time synchronisation (OTG-LOG-001) formerly "Incorrect time" | ||
+ | |||
+ | 4.11.2 Test user-viewable log of authentication events (OTG-LOG-002) | ||
== References == | == References == | ||
− | None now | + | Implementing Referential Integrity and Shared Business Logic in a RDB - http://www.agiledata.org/essays/referentialIntegrity.html |
+ | |||
+ | On Rules and Integrity Constraints in Database Systems - http://www.comp.nus.edu.sg/~lingtw/papers/IST92.teopk.pdf | ||
+ | |||
+ | Use referential integrity to enforce basic business rules in Oracle - http://www.techrepublic.com/article/use-referential-integrity-to-enforce-basic-business-rules-in-oracle/ | ||
+ | |||
+ | Maximizing Business Logic Reuse with Reactive Logic - http://architects.dzone.com/articles/maximizing-business-logic | ||
+ | None now | ||
+ | |||
+ | Tamper Evidence Logging - http://tamperevident.cs.rice.edu/Logging.html | ||
== Remediation == | == Remediation == | ||
The application must be smart enough to check for relational edits and not allow users to submit information directly to the server that is not valid, trusted because it came from a non-editable controls or the user is not authorized to submit through the front end | The application must be smart enough to check for relational edits and not allow users to submit information directly to the server that is not valid, trusted because it came from a non-editable controls or the user is not authorized to submit through the front end |
Revision as of 13:32, 16 December 2013
Brief Description
Many applications are designed to display different fields depending on the user of situation by leaving some inputs hidden. However, in many cases it is possible to submit values hidden field values to the server using a proxy. In these cases the server side controls must be smart enough to perform relational or server side edits to ensure that the proper data is allowed to the server based on user and application specific business logic.
Additionally, the application must not depend on non-editable controls, drop-down menus or hidden fields for business logic processing because these fields remain non-editable only in the context of the browsers. Users may be able to edit their values using proxy editor tools and try to manipulate business logic. If the application exposes values related to business rules like quantity, etc. as non-editable fields it must maintain a copy on the server side and use the same for business logic processing.
Finally, aside from data system functionality and log systems must be secured in such a manner to prevent read, writing and removal.
Issue
The application must be smart enough to check for relational edits and not allow users to submit information directly to the server that is not valid, trusted because it came from a non-editable controls or the user is not authorized to submit through the front end. Additionally, system artifacts such as logs must be “protected” from unauthorized read, writing and removal.
Example
Example 1
Imagine an ASP.NET application GUI application that only allows the admin user to change the password for other users in the system. The admin user will see the username and password fields to enter a username and password while other users will not see either field. However, if a non admin user submits information in the username and password field through a proxy they may be able to “trick” the server into believing that the request has come from an admin user and change password of other users.
Example 2
Most web applications have dropdown lists making it easy for the user to quickly select their state, month of birth, etc. Suppose a Project Management application allowed users to login and depending on their privileges presented them with a drop down list of projects they have access to. What happens if an attacker finds the name of another project that they should not have access to and submits the information via a proxy. Will the application give access to the project? They should not have access even though they skipped an authorization business logic check.
Example 3
Suppose the motor vehicle administration system required an employee initially verify each citizens documentation and information when they issue an identification or drivers license. At this point the business process has created data with a high level of integrity as the integrity of submitted data is checked by the application. Now suppose the application is moved to the Internet so employees can log on for full service or citizens can log on for a reduced self-service application to update certain information. At this point an attacker may be able to use an intercepting proxy to add or update data that they should not have access to and they could destroy the integrity of the data by stating that the citizen was not married but supplying data for a spouse’s name. This type of inserting or updating of unverified data destroys the data integrity and might have been prevented if the business process logic was followed.
Example 4
Many systems include logging for auditing and troubleshooting purposes. But, how good/valid is the information in these logs? Can they be manipulated having their integrity destroyed?
Testing Method
Generic Testing Method
• Identify all components in the application/system where the data/ information are stored or handled. For example, input fields or logs • For each identified component attempt to edit the values with invalid data/information.
Specific Testing Method 1
• Using a proxy capture and HTTP traffic looking for hidden fields.
• If a hidden field is found see how these fields compare with the GUI application and start interrogating this value through the proxy by submitting different data values trying to circumvent the business process and manipulate values you were not intended to have access to.
Specific Testing Method 2
• Using a proxy capture and HTTP traffic looking a place to insert information into areas of the application that are non-editable.
• If it is found see how these fields compare with the GUI application and start interrogating this value through the proxy by submitting different data values trying to circumvent the business process and manipulate values you were not intended to have access to.
Specific Testing Method 3
• List components of the application or system that could be edited, for example logging.
• For each component identified, try to read, edit or remove its information. For example log files should be identified and Testers should try to manipulate the data/information being collected.
Test Tools
OWASP Zed Attack Proxy (ZAP) - https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project
ZAP is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing. ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually.
Related Test Cases
4.8 Data Validation Testing
4.11.1 Test time synchronisation (OTG-LOG-001) formerly "Incorrect time"
4.11.2 Test user-viewable log of authentication events (OTG-LOG-002)
References
Implementing Referential Integrity and Shared Business Logic in a RDB - http://www.agiledata.org/essays/referentialIntegrity.html
On Rules and Integrity Constraints in Database Systems - http://www.comp.nus.edu.sg/~lingtw/papers/IST92.teopk.pdf
Use referential integrity to enforce basic business rules in Oracle - http://www.techrepublic.com/article/use-referential-integrity-to-enforce-basic-business-rules-in-oracle/
Maximizing Business Logic Reuse with Reactive Logic - http://architects.dzone.com/articles/maximizing-business-logic
None now
Tamper Evidence Logging - http://tamperevident.cs.rice.edu/Logging.html
Remediation
The application must be smart enough to check for relational edits and not allow users to submit information directly to the server that is not valid, trusted because it came from a non-editable controls or the user is not authorized to submit through the front end