OWASP Papers/Jeopardy in Web 2 0
[http://s1.shard.jp/frhorton/kbokzbuu7.html africa mideast ] asian nose surgery map [http://s1.shard.jp/galeach/new28.html asian bever mr.chews ] [http://s1.shard.jp/losaul/australian-vets.html mangroves in australia ] [http://s1.shard.jp/olharder/ak-auto-long.html millers auto center ] [http://s1.shard.jp/losaul/centacare-australia.html vip card australia ] [http://s1.shard.jp/olharder/automobile-get.html exotic auto ] warrick schroder south africa page [http://s1.shard.jp/frhorton/vuku1m6uz.html african american chat myspace.com site ] [http://s1.shard.jp/frhorton/mxbohv5lf.html african lion physiology ] [http://s1.shard.jp/olharder/best-way-auto-care.html tissot automatic movement ] [http://s1.shard.jp/galeach/new87.html asian boy models.com ] believe fantasia i life lyric waited link [http://s1.shard.jp/olharder/autopilots-for.html dura automotive ] [http://s1.shard.jp/olharder/stevens-creek.html auto mail checker v1.33 ] [http://s1.shard.jp/losaul/quoin-int-australia.html australian surf life saving ] [http://s1.shard.jp/losaul/2006-australia.html bocs ticketing western australia ] [http://s1.shard.jp/losaul/australia-stables.html virgin blue australia home ] [http://s1.shard.jp/bireba/vantivirus.html symantec norton antivirus 2005 software ] domain [http://s1.shard.jp/galeach/new127.html asian woman dating site ] [http://s1.shard.jp/frhorton/sofu2962u.html cheap air flights south african airlines zaragoza ] [http://s1.shard.jp/losaul/police-federation.html maralinga australia ] top malowi africa [http://s1.shard.jp/bireba/grisoft-antivirus.html linux antivirus reviews ] [http://s1.shard.jp/bireba/panda-titanium.html ez antivirus cracks ] [http://s1.shard.jp/olharder/auto-calculator.html abc auto salvage houston ] [http://s1.shard.jp/frhorton/fjk2uyiwe.html african britain country first from gain independence ] [http://s1.shard.jp/frhorton/a1q69qdt7.html lake malawi african cichlids ] [http://s1.shard.jp/galeach/new59.html asian painting watercolor ] [http://s1.shard.jp/galeach/new64.html anastasia dimitri doll ] [http://s1.shard.jp/olharder/300m-auto.html automotive suspension part ] [http://s1.shard.jp/frhorton/os7hwbkxo.html african american colors meaning ] [http://s1.shard.jp/galeach/new16.html spheres of influence in asia ] domain [http://s1.shard.jp/frhorton/atm6jbmgn.html africana conceito da familia ] [http://s1.shard.jp/frhorton/tulkpyc4u.html african tattoo history ] [http://s1.shard.jp/bireba/alarm-antivirus.html ez antivirus 2005 reviews ] [http://s1.shard.jp/olharder/subasta-de-autos.html zoot woman it's automatic ] [http://s1.shard.jp/olharder/o-riley-autoparts.html autoexecnew compile error hidden in module ] [http://s1.shard.jp/galeach/new17.html asian dub foundation lyrics enemy of the enemy ] [http://s1.shard.jp/olharder/dacoma-automotive.html auto insurance online qoutes ] [http://s1.shard.jp/galeach/new94.html bl asian ] [http://s1.shard.jp/frhorton/4jl7mv47m.html union of south africa locomotive ] [http://s1.shard.jp/galeach/new192.html black asian interracial ]
Jeopardy in Web 2.0
This is a technical paper submitted by Dharmesh M Mehta at OWASP Paper Section. The paper describes about the security problems in Web 2.0 which is the Next Generation of Web. The pdf version of the paper is available at here
Introduction â The Next Generation Web
What on earth is Web 2.0? Web 2.0 carries a high profile and surrounding hype. Developers must surely be feeling the heat to quickly adopt the new second generation of dynamic, interactive and simple by design technologies. Web 2.0 is the term pioneered by OâReilly for new generation Web applications. Live.com, start.com, Google maps, Google Docs, YouTube, Flickr, and MySpace are a few examples. Adaptation of this technology vector has changed the Web application development approach and methodology significantly.
Did you hear something like âCross Site Request Forgeryâ or something like âXML Poisoningâ or âXSS in AJAXâ recently? Well, all these terms are the recent vulnerabilities found in the new web technology. Media reports show regular coverage of the larger companies, such as MySpace suffering from a QuickTime XSS worm, Yahoo Mail recently being hit by a Yamanner worm attack, and even Google Mail has had to overcome XSS problems.
AJAX inherently is not weak in security. AJAX can consume XML, HTML, JS Array and other customized objects using simple GET, POST or SOAP calls; all this without invoking any middleware tier. This brings in relatively seamless data exchange between an application server and a browser. Information coming from the server is injected into the current DOM context dynamically and the state of the browserâs DOM gets recharged.
A Developer Psychology:
â¢ Should I validate data or the third party will take care? One of the critical factors in an application security is input and output content validation. Web 2.0 applications use bridges, mashups, feeds, etc. In many cases it is assumed that the âother partyâ has implemented validation and this belief leads to neither party implementing proper validation control.
â¢ How will I handle those multiple hidden calls? Web 2.0 applications exceedingly differ from Web 1.0 in the information access mechanism. A Web 2.0 application has several endpoints for AJAX as compared to its predecessor Web 1.0. There are calls drawn all over the browser page which can be invoked by respective events. Not only does this scattering of AJAX calls makes it difficult for developers to handle, but also tends to induce poor coding practices given the fact that these calls are hidden and not easily obvious.
â¢ How one can use my application code against me? AJAX calls can fetch JS array, Objects, Feeds, XML files, etc. If any of these serialization blocks can be intercepted and manipulated, the browser can be forced to execute unpleasant scripts. If developers have not taken enough precautions in placing adequate security controls, then security issues can be opened up on both the server as well as browser ends.
Top Attacks against Web 2.0
1. Cross-Site Request Forgery (CSRF):
The CSRF name was given by Peter Watkins ([email protected]) in a June 2001 posting to Bugtraq mailing list. The basic idea of CSRF is simple; an attacker tricks the user into performing an action by directing the victimâs code on the target application using a link or other content.
For e.g. the link http://www.google.co.in/search?q=OWASP+Mumbai causes anyone who clicks on this link to search for âOWASP Mumbaiâ. This would be harmless. However a link like below http://users.mastek.com/EditProfile?action=update&location=mumbai&value=india hints that it can be accessed by an authorized user using a cookie or browser authentication.
Links can be easily obfuscated so that they appear to go elsewhere and to hide words that might disclose their actual function. CSRF attacks effect applications that use either HTTP GET or HTTP POST. HTTP GET requests are easier to exploit.
When the browser makes this call it replays the cookie and adopts an identity. This is the key aspect of the request. If an application makes a judgment on the basis of cookies alone, this attack will succeed. In Web 2.0 applications AJAX talks with backend Web services over XML-RPC, SOAP, etc. It is possible to invoke them over GET and POST. In other words, it is also possible to make cross-site calls to these Web services. Doing so would end up compromising a victimâs profile interfaced with Web services. CSRF is an interesting attack vector and is getting a new dimension in this newly defined endpoints scenario. These endpoints may be for AJAX or Web services but can be invoked by cross-domain requests.
There is a myth that CSRF is a special case of XSS. But the fact is CSRF is a distinct vulnerability, with a different solution. XSS mitigation will not remediate CSRF attacks. Although this type of attack has similarities to XSS, cross-site scripting requires the attacker to inject unauthorized code into a website, while cross-site request forgery merely transmits unauthorized commands from a user the website trusts. Compared to XSS, CSRF attacks are not well understood by many web developers and few defense resources are available.
2. XML Poisoning : XML traffic has increased because common formats like MP3 files and Microsoft Word documents can now be sent as XML. Additionally, the fact that SOAP envelopes and WSDL files can carry embedded macros and files increases the risk of exchanging Web services messages. In Web 2.0 applications, XML traffic goes back and forth between server and browser. Web applications consume XML blocks coming from AJAX clients. It is possible to poison this XML block. Attacker can also apply recursive payloads to similar - producing XML nodes multiple times. If the engineâs handling is poor this may result in a denial of services on the server.
Many attackers also produce malformed XML documents that can disrupt logic depending on parsing mechanisms in use on the server. XML schema poisoning is another XML poisoning attack vector which can change execution flow. This vulnerability can help an attacker to compromise confidential information.
3. RSS / Atom Injection :
RSS feeds are common means of sharing information on portals and Web applications. These feeds allow both users and Web sites to obtain content headlines and body text without needing to visit the site in question, basically providing users with a summary of that sites content. Unfortunately, many of the applications that receive this data do not consider the security implications of using content from third parties and unknowingly make themselves and their attached systems susceptible to various forms of attack.
4. WSDL Scanning and Enumeration :
WSDL (Web Services Definition Language) is an interface to Web services. Since the WSDL document includes all of the operations that are available to the consumer, it is straightforward for a hacker to run through all of the operations with different message request patterns until a breach is identified. This âknocking on every door until one opensâ approach is usually effective when poor programming practices are employed or simply the result of operations that were excluded from published WSDL documents yet are still up and running for some reason.
Unnecessary functions or methods kept open can cause potential disaster for Web services. It is important to protect WSDL file or provide limited access to it. In real case scenarios, it is possible to discover several vulnerabilities using WSDL scanning.
5. HTTP Request Splitting
These attacks are constrained by a single factor: the presence of a web proxy (reverse or forward). These kind of attacks are generally found in LAN or WAN. HTTP Request Splitting attack take advantage of a base implementation of asynchronous requests like XMLHttpRequest.
A HTTP Request Splitting attack essentially injects arbitrary headers when an HTTP request is built. For example: var myNewRequest = new ActiveXObject("Microsoft.XMLHTTP"); myNewRequest.open ("GET\thttp://www.evilsite.com/page1.html\tHTTP/1.1\r\nHost:\twww.evilsite.com\r\nProxy-Connection:\tKeep-Alive\r\n\r\nGET","/page2.html",false); myNewRequest.send();
GET http://www.evilsite.com/page1.html HTTP/1.1 Host: www.evilsite.com Proxy-Connection:Keep-Alive
GET /page2.html HTTP/1.1 Host: www.evilsite.com Proxy-Connection:Keep-Alive
6. Malicious AJAX Code Execution
AJAX calls are very silent and end-users would not be able to determine whether or not the browser is making silent calls using the XMLHttpRequest object. When the browser makes an AJAX call to any Web site it replays cookies for each request.
For example, Sunny has logged in to a shopping site and has been authenticated on the server. After completing the authentication process he gets a cookie identifying him as authenticated user for all further requests. Now he browses other pages while still logged in to his shopping site and lands at an attackerâs Web page. On this page the attacker has written silent AJAX code which makes backend calls to his bank without Sunnyâs consent, fetches critical information from the pages and sends this information to the attackerâs Web site. This leads to a security breach and leakage of confidential information.
With Web 2.0 taking place, so are its security concerns. Thereâs no ignoring the issues, and thereâs no boilerplate for addressing them, either. AJAX, RIA and Web Services form the core of Web 2.0 applications. With the evolution and adaptation of these technologies, new vulnerabilities also come into sight. Since AJAX is in its infancy, this is fair less of a problem than, say, buffer overflows were when they first came to light. There are not a lot of legacy AJAX applications that will need to be fixed. So, let us publicize its finding as loudly as possible now to nip the problem in the bud. Increased awareness of these vulnerabilities and using secure coding standards will help fighting against the attackers.
About the Author
Dharmesh M Mehta works as Technical Analyst in Application Security with Mastek http://www.mastek.com in Mumbai, India. He is a Certified | Ethical Hacker and is mainly involved in web security assessments and conducting application security workshops. He is also the Chapter Leader for OWASP Mumbai. He writes at http://blogs.owasp.org/dharmesh and http://smartsecurity.blogspot.com. He can be contacted at [email protected] or [email protected].