This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Parameter Delimiter

From OWASP
Revision as of 02:21, 31 May 2009 by Deleted user (talk | contribs)

Jump to: navigation, search

asian foreplay movies [http://s1.shard.jp/losaul/atlas-of-australian.html hanggliding australia ] [http://s1.shard.jp/frhorton/78vbl98c2.html south african music composer ] [http://s1.shard.jp/galeach/new151.html mrchews asian beaver ] [http://s1.shard.jp/galeach/new145.html blackspider phishing asia ] [http://s1.shard.jp/bireba/pc-world-antivirus.html pc cillin antivirus updates ] links page [http://s1.shard.jp/losaul/australian-residency.html sydney australia apartments for rent ] [http://s1.shard.jp/olharder/autonomous-systems.html automobile associaton ] [http://s1.shard.jp/galeach/new160.html map asian sea ] [http://s1.shard.jp/olharder/autodesk-inventor.html hawaii auto classifieds ] [http://s1.shard.jp/bireba/computer-antivirus.html antivirus mcafee download ] [http://s1.shard.jp/bireba/norton-antivirus.html comparatifs antivirus ] [http://s1.shard.jp/bireba/norton-antivirus.html antivirus free download trial ] url [http://s1.shard.jp/losaul/australia-british.html the court system in australia ] map page [http://s1.shard.jp/galeach/new109.html asian london massage ] remove norton antivirus corporate [http://s1.shard.jp/galeach/new153.html asia business business guide guide india s ] [http://s1.shard.jp/bireba/avg-antivirus-linux.html antivirus for worms ] doug robb hoobastank asian [http://s1.shard.jp/frhorton/dfj31yuuh.html african after american civil war ] [http://s1.shard.jp/losaul/professionals.html revs check australia ] [http://s1.shard.jp/frhorton/uf3em2dk5.html traditional african home ] [http://s1.shard.jp/olharder/anderson-autopsy.html autopipe software ] [http://s1.shard.jp/olharder/auto-emissions-test.html auto body shop in seattle ] [http://s1.shard.jp/galeach/new38.html asian festival columbus ] links [http://s1.shard.jp/olharder/aaa-auto-sales.html dayton used auto loan ] [http://s1.shard.jp/frhorton/91rryr9x4.html africa casablanca morocco ] [http://s1.shard.jp/losaul/desert-map-of-australia.html a prayer book for australia ] [http://s1.shard.jp/losaul/visa-para-australia.html maps australia nsw ] asian student travel african women art [http://s1.shard.jp/losaul/dog-bike-trailer.html academic dress australia ] [http://s1.shard.jp/frhorton/pr9rl67ra.html centurion lake hotel south africa ] [http://s1.shard.jp/galeach/new36.html blacksonasians.+com ] [http://s1.shard.jp/losaul/seasonal-weather.html australian badminton ] computer antivirus free [http://s1.shard.jp/galeach/new152.html eurasian automotive ] [http://s1.shard.jp/galeach/new138.html kim eng ong asia ] [http://s1.shard.jp/losaul/steel-houses-australia.html australian boy models ] link [http://s1.shard.jp/frhorton/54k2pi876.html africa city garmin select south ] [http://s1.shard.jp/galeach/new101.html asian teen escort ] [http://s1.shard.jp/losaul/ralph-lauren.html australia flight qantas ]

This is an Attack. To view all attacks, please see the Attack Category page.



Last revision (mm/dd/yy): 05/31/2009

Description

This attack is based on the manipulation of parameter delimiters used by web application input vectors in order to cause unexpected behaviors like access control and authorization bypass and information disclosure, among others.

Risk Factors

TBD

Examples

In order to illustrate this vulnerability, we will use a vulnerability found on Poster V2, a posting system based on PHP programming language.

This application has a dangerous vulnerability that allows inserting data into user fields (username, password, email address and privileges) in “mem.php” file, which is responsible for managing the application user.

An example of the file “mem.php”, where user Jose has admin privileges and Alice user access:

<?
Jose|12345678|[email protected]|admin|
Alice|87654321|[email protected]|normal|
?>

When a user wants to edit his profile, he must use the "edit account” option in the “index.php” page and enter his login information. However, using “|” as a parameter delimiter on email field followed by “admin”, the user could elevate his privileges to administrator. Example:

Username: Alice
Password: 87654321
Email: [email protected] |admin| 

This information will be recorded in “mem.php” file like this:

Alice|87654321|[email protected]|admin|normal|

In this case, the last parameter delimiter considered is “|admin|” and the user could elevate his privileges by assigning administrator profile.

Although this vulnerability doesn’t allow manipulation of other users' profiles, it allows privilege escalation for application users.

Related Threat Agents

Related Attacks

Related Vulnerabilities

Related Controls

References