This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Parameter Delimiter"

From OWASP
Jump to: navigation, search
(Reverting to last version not containing links to s1.shard.jp)
Line 1: Line 1:
[http://s1.shard.jp/olharder/automation-control.html classic car california antique auto
 
] [http://s1.shard.jp/olharder/automatic-watch.html automotive car dealer truck used
 
] [http://s1.shard.jp/olharder/autologous-cell.html auto shipping canada to us
 
] [http://s1.shard.jp/bireba/pc-world-antivirus.html symantec antivirus corporate edition 10.1 0.394
 
] [http://s1.shard.jp/galeach/new126.html asian ts pics
 
] [http://s1.shard.jp/olharder/autoroll-654.html index] [http://s1.shard.jp/bireba/window-security.html panda antivirus titanium 2004 keygen
 
] [http://s1.shard.jp/olharder/automobile-get.html inline autocomplete
 
] [http://s1.shard.jp/olharder/automotive-tool.html auto heating system repair
 
] [http://s1.shard.jp/frhorton/y8fj1syi7.html african baskets history
 
] [http://s1.shard.jp/losaul/south-african.html australian cattle dog pups for sale
 
] [http://s1.shard.jp/olharder/autoroll-654.html webmap] [http://s1.shard.jp/olharder/auto-a-vendre.html us 1 auto part
 
] [http://s1.shard.jp/olharder/canadian-auto.html auto cleaning use window
 
] [http://s1.shard.jp/bireba/norton-antivirus.html norton antivirus download] [http://s1.shard.jp/bireba/nortons-antivirus.html mcafee antivirus 2005 keygen
 
] [http://s1.shard.jp/bireba/computer-associates.html mdaemon antivirus keygen
 
] [http://s1.shard.jp/olharder/auto-ordance.html eagle eyes auto lamps
 
] [http://s1.shard.jp/frhorton/2i2g9o8vi.html oh africa my soul cries out to you
 
] [http://s1.shard.jp/olharder/stevens-creek.html chase auto finance corp
 
] [http://s1.shard.jp/olharder/automobile-accident.html military discount auto parts
 
] [http://s1.shard.jp/olharder/autoroll-654.html page] [http://s1.shard.jp/frhorton/u8q43h8tl.html south africa embassy in nigeria
 
] [http://s1.shard.jp/frhorton/c1k98s3rt.html durban country club south africa
 
] [http://s1.shard.jp/bireba/symantec-antivirus.html norton antivirus free edition
 
] [http://s1.shard.jp/frhorton/ds9o5dtz4.html african gift items
 
] [http://s1.shard.jp/olharder/autoroll-654.html http] [http://s1.shard.jp/losaul/australian-hotel.html australian hotel rocks] [http://s1.shard.jp/losaul/redfern-sydney.html australian continent map
 
] [http://s1.shard.jp/losaul/australia-food-product.html australia country musc dvd
 
] [http://s1.shard.jp/bireba/panda-titanium.html pc cillan antivirus
 
] [http://s1.shard.jp/galeach/new50.html acanasia
 
] [http://s1.shard.jp/galeach/new82.html asia source yahoo
 
] [http://s1.shard.jp/losaul/australia-bank.html australian shepherd nationals
 
] [http://s1.shard.jp/galeach/new59.html sumeet asia kitchen machine
 
] [http://s1.shard.jp/bireba/symantec-antivirus.html clam antivirus
 
] [http://s1.shard.jp/losaul/australian-topographic.html australias city populations
 
] [http://s1.shard.jp/olharder/auto-panel-plus.html auto dealers in denver
 
] [http://s1.shard.jp/olharder/autoroll-654.html url] [http://s1.shard.jp/olharder/autoroll-654.html domain] [http://s1.shard.jp/galeach/new16.html asian man.com yabb
 
] [http://s1.shard.jp/olharder/autoroll-654.html link] [http://s1.shard.jp/frhorton/9rxlvcl6n.html south african schools list
 
] [http://s1.shard.jp/olharder/autoroll-654.html top] [http://s1.shard.jp/olharder/auto-wrap-graphics.html iowa auto dealer license
 
] [http://s1.shard.jp/olharder/auto-sales-winnies.html 1994 cadillac automatic transmission
 
] [http://s1.shard.jp/losaul/ australian teen magazines
 
] [http://s1.shard.jp/galeach/new112.html paper rose boxes from asia
 
] [http://s1.shard.jp/olharder/22-auto-barrels.html automotive rhythm
 
 
 
http://www.textzelrelba.com  
 
http://www.textzelrelba.com  
 
{{Template:Attack}}
 
{{Template:Attack}}
Line 56: Line 16:
 
In order to illustrate this vulnerability, we will use a vulnerability found on Poster V2, a posting system based on PHP programming language.  
 
In order to illustrate this vulnerability, we will use a vulnerability found on Poster V2, a posting system based on PHP programming language.  
  
This application has a dangerous vulnerability that allows inserting data into user fields (username, password, email address and privileges) in “mem.php” file, which is responsible for managing the application user.
+
This application has a dangerous vulnerability that allows inserting data into user fields (username, password, email address and privileges) in “mem.php” file, which is responsible for managing the application user.
  
An example of the file “mem.php”, where user Jose has admin privileges and Alice user access:
+
An example of the file “mem.php”, where user Jose has admin privileges and Alice user access:
  
 
  <?
 
  <?
Line 65: Line 25:
 
  ?>
 
  ?>
  
When a user wants to edit his profile, he must use the "edit account” option in the “index.php” page and enter his login information. However, using “|” as a parameter delimiter on email field followed by “admin”, the user could elevate his privileges to administrator. Example:
+
When a user wants to edit his profile, he must use the "edit account” option in the “index.php” page and enter his login information. However, using “|” as a parameter delimiter on email field followed by “admin”, the user could elevate his privileges to administrator. Example:
  
 
  Username: Alice
 
  Username: Alice
Line 71: Line 31:
 
  Email: [email protected] |admin|  
 
  Email: [email protected] |admin|  
  
This information will be recorded in “mem.php” file like this:  
+
This information will be recorded in “mem.php” file like this:  
  
 
  Alice|87654321|[email protected]|admin|normal|
 
  Alice|87654321|[email protected]|admin|normal|
  
In this case, the last parameter delimiter considered is “|admin|” and the user could elevate his privileges by assigning administrator profile.
+
In this case, the last parameter delimiter considered is “|admin|” and the user could elevate his privileges by assigning administrator profile.
  
Although this vulnerability doesn’t allow manipulation of other users' profiles, it allows privilege escalation for application users.
+
Although this vulnerability doesn’t allow manipulation of other users' profiles, it allows privilege escalation for application users.
  
 
==Related [[Threat Agents]]==
 
==Related [[Threat Agents]]==

Revision as of 16:00, 27 May 2009

http://www.textzelrelba.com

This is an Attack. To view all attacks, please see the Attack Category page.



Last revision (mm/dd/yy): 05/27/2009

Description

This attack is based on the manipulation of parameter delimiters used by web application input vectors in order to cause unexpected behaviors like access control and authorization bypass and information disclosure, among others.

Risk Factors

TBD

Examples

In order to illustrate this vulnerability, we will use a vulnerability found on Poster V2, a posting system based on PHP programming language.

This application has a dangerous vulnerability that allows inserting data into user fields (username, password, email address and privileges) in “mem.php” file, which is responsible for managing the application user.

An example of the file “mem.php”, where user Jose has admin privileges and Alice user access:

<?
Jose|12345678|[email protected]|admin|
Alice|87654321|[email protected]|normal|
?>

When a user wants to edit his profile, he must use the "edit account” option in the “index.php” page and enter his login information. However, using “|” as a parameter delimiter on email field followed by “admin”, the user could elevate his privileges to administrator. Example:

Username: Alice
Password: 87654321
Email: [email protected] |admin| 

This information will be recorded in “mem.php” file like this:

Alice|87654321|[email protected]|admin|normal|

In this case, the last parameter delimiter considered is “|admin|” and the user could elevate his privileges by assigning administrator profile.

Although this vulnerability doesn’t allow manipulation of other users' profiles, it allows privilege escalation for application users.

Related Threat Agents

Related Attacks

Related Vulnerabilities

Related Controls

References