This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "OWASP ModSecurity Securing WebGoat Section4 Sublesson 03.2"

From OWASP
Jump to: navigation, search
(add content)
 
(Strategy)
 
Line 15: Line 15:
 
The WebGoat solution is to modify the source code and return only the users and their information that is allowed according to the user requesting the information.
 
The WebGoat solution is to modify the source code and return only the users and their information that is allowed according to the user requesting the information.
  
Since ModSecurity cannot alter an HTTP response, there seems to be no ModSecurity solution to this vulnerability.
+
This is essentially an information leakage problem that does not need to be exploited (the extra information is always there).
 +
 
 +
Since ModSecurity cannot alter an HTTP response (intercept, then remove the unnecessary data), there seems to be no ModSecurity solution to this vulnerability.
  
 
=== Implementation ===  
 
=== Implementation ===  
  
 
None
 
None

Latest revision as of 09:36, 13 November 2008

3. AJAX Security -> 3.2 LAB: Client Side Filtering

Lesson overview

The WebGoat lesson overview is included with the WebGoat lesson solution.

Lesson solution

Refer to the zip file with the WebGoat lesson solutions. See Appendix A for more information.

Strategy

In this WebGoat lab, an XPath query returns name, salary, and other information about users in XML in a hidden table. The vulnerability is that user information is sent for users not within the scope of the requesting user and client side filtering is relied upon to show only the necessary users.

The WebGoat solution is to modify the source code and return only the users and their information that is allowed according to the user requesting the information.

This is essentially an information leakage problem that does not need to be exploited (the extra information is always there).

Since ModSecurity cannot alter an HTTP response (intercept, then remove the unnecessary data), there seems to be no ModSecurity solution to this vulnerability.

Implementation

None