Abusing Locality in Shared Web Hosting
|
|
|
- Claire Walters
- 10 years ago
- Views:
Transcription
1 Abusing Locality in Shared Web Hosting Nick Nikiforakis, Wouter Joosen DistriNet, Katholieke Universiteit Leuven Martin Johns SAP Research - Karlsruhe [email protected] ABSTRACT The increasing popularity of the World Wide Web has made more and more individuals and companies to identify the need of acquiring a Web presence. The most common way of acquiring such a presence is through Web hosting companies and the most popular hosting solution is shared Web hosting. In this paper we investigate the workings of shared Web hosting and we point out the potential lack of session isolation between domains hosted on the same physical server. We present two novel server-side attacks against session storage which target the logic of a Web application instead of specific logged-in users. Due to the lack of isolation, an attacker with a domain under his control can force arbitrary sessions to co-located Web applications as well as inspect and edit the contents of their existing active sessions. Using these techniques, an attacker can circumvent authentication mechanisms, elevate his privileges, steal private information and conduct attacks that would be otherwise impossible. Finally, we test the applicability of our attacks against common open-source software and evaluate their effectiveness in the presence of generic server-side countermeasures. Categories and Subject Descriptors K.4.4 [Electronic Commerce]: Security; K.6.5 [Security and Protection]: Unauthorized access General Terms Security, Design, Experimentation Keywords Web applications, session identifiers, session storage, serverside attacks 1. INTRODUCTION In 1993 CERN announced the release of the World Wide Web as a free product available to everyone. Today, the Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. EUROSEC 11, Salzburg, Austria. Copyright 2011 ACM /11/04 $ WWW has become synonymous to the whole Internet infrastructure since for most people, Internet is accessed through their browser. In this ever-expanding online world, more and more individuals and companies identify the need to have a Web presence, i.e, a website to provide services, sell goods and communicate news to their customers. Thus thousands of domain names are being registered every day and thousands of hosting plans from Web hosting providers are acquired. At the time of writing, there are more than 120 million active registered domains 1. Each of these domain names, finally points to the IP address of a server, hosting the content of each individual website. With the exception of large cooperations, institutions and government services, the majority of websites are hosted on companies that provide Web hosting services. Web hosting providers offer a variety of hosting products, ranging from shared solutions to fully dedicated servers. While competition has driven the prices of all hosting products down, the most economical solution was and still is shared hosting. In shared Web hosting, the client is given access to a limited number of resources (e.g., a limited number of Gigabytes on disk and of SQL databases) which he can use to host his own website/web application. The physical servers that provide the shared-hosting resources are shared amongst hundreds or even thousands of clients at the same time. Thus, the user doesn t suffer only from limited performance but there is also a potential for limited security since his Web applications are co-located with other scripts that can act maliciously by design or by omission. Due to this fact, several barriers are placed for each user in-order to ensure that a malicious or vulnerable application cannot interfere with the others [2]. In this paper we present two new attacks against the session management system of Web applications in shared hosting environments: Session Snooping and Session Poisoning. To be susceptible to these attacks, a Webserver s configuration has to meet certain criteria in respect to the way sessions are handled (see Sec. 3 for details). If these preconditions are fulfilled, an adversary who controls a Web application that is hosted on such a server, is able to attack all other applications that share this locality. More precisely, he is able to force arbitrary sessions to the vulnerable Web applications (Session Poisoning) or to inspect and modify their session values (Session Snooping). This way, an attacker can circumvent authentication procedures, steal private data, evade Web application firewalls, and use this attack as an intermediate step to launch other attacks such 1
2 ?19,14614*!""#$%&'()*!* +(,-.*///0&#$%10%(2* 3$4.*567(,-5///5&#$%10%(2* :(22()*,1,,$()*;&-&*,-(41* 3$4.*5-2"* 9;DE&C*!""#$%&'()*8* +(,-.*///09(90)1-* 3$4.*567(,-5///59(90)1-* FG3H9;DE&C* <,14*=* <,14*>* Figure 1: Common session store for shared hosting as SQL injection and command execution. Unlike existing attacks against session identifiers which target authenticated users, our attacks are performed on the server and they circumvent a Web application s logic. For most parts of this paper, we focus on the ubiquitous PHP programming language to present and evaluate our findings; a sensible choice given the perceived dominance of PHP in the area of shared hosting offers. However, the discussed issues are not necessary unique to PHP. In fact, every Web application framework that exposes the necessary preconditions is potentially susceptible. To validate this assumption, we also briefly examine the session handling provided by Mod_Python and Mod_Perl and identify similar issues as with PHP (see Sec. 4.3). The rest of our paper is structured as follows: In Section 2 we present background information concerning the workings of session identifiers on the server side. In Section 3 we describe the aforementioned server-side attacks against session identifiers and we explore their implications. We evaluate our attacks against open-source software in Section 4, we discuss the reasons that made these attacks possible in Section 5 and test generic server-side countermeasures in Section 6. In Section 7 we present the related work and we conclude our paper in Section BACKGROUND In this section we provide the necessary background knowledge about session identifiers to understand the attacks presented in Section 3. The most common protocol used today, the Hyper Text Transfer protocol and its secure version (HTTPS) are by design stateless. While there are several ways of enforcing basic access control, such as HTTP Authentication and client-side SSL certificates, none can provide the flexibility and fine-grained control of session identifiers. Thus session identifiers are the de facto modern mechanism used in virtually all non-static webpages. The first time that a user visits a website/web application, he is assigned a session identifier (typically consisting of a long pseudo-random alpha-numerical string). This identifier is communicated to the client using a variety of ways, the most common of which, is through Cookie headers. On the server-side, the Web application binds the identifier with information about the user (e.g., if he is logged in and his user privileges). On every subsequent request, the client provides the Web application with the identifier that was first entrusted to him. This way the application can recognize the user amongst many requests and respond appropriately. When sessions are used to recognize a logged-in user, the session identifier token is as sensitive as the username and password combination of the logged-in user. While the client-side part of session management is straightforward and well-understood by the security community, the corresponding server-side is implementation-specific and hasn t received as much attention as its client-side counterpart. In PHP, when a new session identifier is requested by the Web application (e.g., through the session_start() function), PHP generates a pseudo-random identifier which it returns to the application. All the values that the application stores in the session id, are stored, by default, on a flat file on the disk of the Webserver. On standard installations of PHP and unless instructed otherwise by the Web programmer or the Web administrator, the file is stored in a temporary directory, (e.g. /tmp), and the name of the file is predictable and consists of the string sess followed by an underscore and the value of the session identifier. The values that are set by the Web application are stored in this file, in a manner which will enable PHP to re-construct them on subsequent requests. At a later request of the same user, PHP uses the session identifier provided by the request to locate the file containing the previously-set session values and load them in the global session array ($_SESSION) that the Web application utilizes. The session identifier is actually read from the cookie value that the user s browser appended to the user s request. With PHP managing all the details of session identifiers, the Web application can track the user in time and use simple logic built around values of the global session array, to enforce the desired access control to its resources. 3. LOCALITY ABUSE In Section 2 we provided an overview of how PHP handles session identifiers and how user-provided information (the value of the session Cookie) is used to determine the session file containing the appropriate stored information for the user s session. The two attacks that we are about to present are based on the following two weaknesses: 1. PHP s standard session mechanisms do not offer a way for a Web application to distinguish between sessions that were created by itself and sessions that were created by other Web applications located on the same physical server 2. The session store of PHP installations is by default a temporary folder which is shared among all the PHP scripts running on that physical machine, see Fig. 1. The combination of the two above weaknesses enable an attacker to create session identifiers from his own Web application and force them as legitimate session identifiers to the other Web applications residing on the same physical server (Session Poisoning). It also allows the attacker s scripts to open session identifiers that were created by co-located Web applications, inspect the stored values and make arbitrary changes to them (Session Snooping). The specific details for these attacks are presented in the following two sections.
3 !"#$"%&"%'!"#$"%&"%' ())*+,-./0'(' 1/$23'4445-*+,"5,/6' 7+%3'8&9/$ *+,"5,/6' =/66/0'$"$$+/0'>-2-'$2/%"' 7+%3'826)' (>&"%$-%<' (:-,;"%' 1/$23'44456-**/%<5,/6' 7+%3'8&9/$ **/%<5,/6' Figure 2: Attacking the common session store Code Listing 1 Session Poisoning script <? php session_start (); $_SESSION [ isadmin ] = true ; $_SESSION [ userid ] = 1; $_SESSION [ user ] = " admin "; print session_id ();?> 3.1 Session Poisoning In a Session Poisoning attack, the attacker tries to circumvent the logic of a victim Web application by creating a session with arbitrary content and forcing it as a valid session onto the vulnerable Web application. For example, consider two domains, alice.com and mallory.com hosted on the same physical server and using a common session store. Alice.com has a Web administration interface where an administrator can login and perform privileged operations. When the administrator provides valid credentials, a boolean variable isadmin is created in his active session and it is set to true. This enables the Web application to track him between page-loads and to provide him administrative rights without the need for re-sending his credentials with each request. The malicious owner of mallory.com creates a session for mallory.com where he also sets a boolean variable named isadmin to true. In the next and final step, the user from mallory.com visits the Web administration interface at alice.com where he provides as a session-cookie the session created for mallory.com. Since both Web applications share a common session store, alice.com will locate and load the session file created by mallory.com, which will in-turn provide the attacker with administrative rights (see Fig. 2). In the aforementioned process, the attacker can force the malicious session identifier, simply by adding an HTTP Cookie header with the value of the session identifier, as returned by mallory.com. The only real difficulty of the malicious user controlling mallory.com is to predict the names and contents of the session variables needed to grant him administrative rights. An attacker can compensate for this by using a large set of commonly-used variable names (see Listing 1). As long as the subset of variables needed exist in the set of variables the attacker creates, the vulnerable Web application will ignore the rest and take into account only the ones dictated by its access-control logic. Additionally, if the victim application is not a collection of custom scripts but is an open-source software product, the attacker can inspect the source-code of the particular application, discover the access-control variables and set them appropriately. 3.2 Session Snooping The Session Snooping attack is essentially a reverse of the Session Poisoning attack where the attacker can inspect active sessions created by other Web applications and arbitrarily change their content. In this scenario, alice.com hosts a Web application that users can register, login and access different content based on their user privileges such as a forum or a Webmail platform. The malicious administrator of mallory.com, visits alice.com registers an account and logs-in. Alice.com populates a variable named userid in the attacker s session with the user s identifier which is used to provide him with the right content from the Web application s database. At this point, the attacker switches to mallory.com and instructs his malicious scripts to load the session corresponding to the session identifier provided by alice.com. The attacker can now inspect the variables set by alice.com and change the userid to that of another user using standard session functionality. The final step for the attacker, consists of simply visiting again the vulnerable Web application at alice.com. The application will reload the values stored in the session file corresponding to the attacker s session and thus recognize the attacker as a different user. The attacker has now full rights over the account of that user and depending on the specifics of the application, the attacker will be able to get access to a wide range of private data such as the user s home address, s, credit card information and so on. It is important to point out that changing a session identifier to a user-provided value is a legitimate operation in PHP and can be performed by the built-in session_id() function. Even if the function did not exist, Web frameworks still rely on the user to provide the correct session identifier, in which case the attacker could simply change the value of his HTTP Cookie header as in Section 3.1. Lastly, note that it is advantageous for an attacker to use the builtin session management functions to load, inspect and edit session variable values instead of opening the session file directly since potential protections that are implemented in the file-system level may be lifted when the data is accessed through PHP s session management system(see Section 6.2). 3.3 Resulting malicious capabilities Session snooping can be used as an intermediate step which will help the attacker to launch new attacks against a Web application that would otherwise be impossible. We believe it is a common programming practice to trust the values of set variables when the variables are not directly affected by user input. Through Session Snooping, any variable stored in the global session array ($_SESSION) can be arbitrarily modified by an attacker. Thus, while a login script may be thoroughly checked for SQL injection attacks, the values that are set by the programmer s script inside session identifiers may be used directly in SQL queries without
4 Code Listing 2 SQL Injection through Session Snooping <? php if ( isset ( $_SESSION [ userid ])){ $result = db_request (" SELECT * from users where id = ". $_SESSION [ userid ]); $row = mysql_fetch_array ( $result ); }?> further sanitization. Code listing 2 shows a snippet of PHP code that is responsible of getting the personal details of a logged-in user based on his user identifier. This action is very common in Web applications which provide a user the option to view and edit his personal profile. Traditionally the programmer has no reason to sanitize the $_SESSION[ userid ] value, since it is only set by the database as a result of successful user login (not shown). However, through Session Snooping, an attacker can change the value of userid to an SQL statement and thus perform an SQL injection attack, that was previously not possible. In addition to SQL injection, Session Snooping can be used to modify the values of session variables that affect local file operations, remote file includes, database settings and so on. Even more interestingly, the attack vectors are not present in external HTTP(S) traffic towards the vulnerable Web application. That is because, the attacker modifies the contents of a session file (through traffic directed at his domain) which is at a later request internally loaded into the running PHP environment of the victim Web application. This means that Web application firewalls, both rule-based and behaviour-based [10, 13], that check the contents of headers will be unable to stop common Web attacks. For the same reason, the Webserver logs of the victim domain will contain no information about the actual attack, making postexploitation forensic investigations much harder. 3.4 Attack variants In the above sections we assumed that the adversary is controlling a Web application which is co-hosted on the same server as the attacked application. Such circumstances are not a necessary precondition for the attacks to be feasible. In this section we list alternative scenarios that enable the adversary to exploit common session data stores: Co-located identical applications: Consider the following scenario: On a shared hosting server a given Web application (e.g., a specific CMS) is installed by two different hosting customers. Based on the observations above, a legitimate user on one of these installations (e.g., an user with administrative rights) can force the second application to use the session data store which was originally filled by the first application. Depending on the application s logic, this might result in gaining access to the second application, potentially even with administrative rights. PHP code injection: Applications written in PHP frequently expose code injection vulnerabilities. Such vulnerabilities enable an attacker to execute PHP commands with the rights of the vulnerable applications. Hence, he can conduct the attacks described above against all co-located Web applications, even if these applications do not expose any vulnerabilities of their own. 3.5 Finding co-located applications A practical issue for an attacker, is that of finding which websites/web applications are located on the same physical server as his own. Depending on the configuration details of each Webserver this can be done in multiple ways with varying degrees of success. If a Webserver permits it, the attacker can use his scripts to recursively list directories towards the root of the file-system and record the names of his co-located applications. In cases where the Webserver is running scripts with the permissions of their owners (see Section 6.1) the owner of each listed file can also identify URIs of other applications. Lastly, an attacker can utilize online services 2 which, given a URI, report other URIs hosted on the same physical server based on matching IP addresses and other heuristics. 4. PRACTICAL EVALUATION 4.1 Common Session Stores In Sections 2 and 3 we discussed about the temporary directories in which PHP saves, by default, the files corresponding to active sessions and how this behavior can be abused to perform server-side attacks against Web applications. We decided to perform a simple experiment to discover what percentage of PHP websites keep the default, and unsafe, session save path (session.save_path in PHP) and what percentage change it to per-domain value. PHP provides a function named phpinfo() which prints a detailed report of all its configuration parameters. Among others, the save path of sessions is included in the generated report. This function is normally used for debugging and testing purposes however in many cases the PHP files that make use of phpinfo() are forgotten on the Webserver. Using Google, we located phpinfo pages on websites and crawled through the first 500 of them, recording the stated session path. Surprisingly, we discovered that 89.71% of all sites used a default path (e.g., /tmp,/var/lib/php4 and C:\PHP\sessiondata). This means that for 9 out of 10 tested websites, a per-domain session path is not forced by each Webserver and that the programmer of each Web application did not change the default session configuration. While our experiment is certainly not an exhaustive one, we believe that it still demonstrates that keeping the default session save path is the common case. At this point, one might think that finding a phpinfo page at a specific website is already enough evidence that security is not taken seriously and thus can t be used as a global metric towards the save path of sessions. We argue that this is not the case. Since phpinfo pages can be generated simply by calling the phpinfo() function, their mere presence can t be used to measure the security of a Webserver installation. On the other hand, the various configuration parameters presented by the phpinfo pages, give a more complete picture of the security mechanisms and configurations set in place by the Web administrators and in our case attest to the insecure practice of common session stores. 4.2 Effectiveness In this section we present a security evaluation of the attacks described in Section 3 by testing them against popu- 2 web-sites-on-web-server/
5 lar open-source Web applications. It is widely accepted that open-source software is more secure that proprietary software since many developers can review the code and report vulnerabilities. In our case however, open-source Web applications are an easier target since an attacker knows exactly which variables to set to which values through a Session Poisoning attack. For our evaluation, we decided to investigate open-source Content Management Systems. Content Management Systems (CMSs) are software products that allow users to create and manage completely dynamic websites without the need of directly writing code. A recent study showed that more than 24.1% of the top 1 million websites (as reported by Alexa.com) use a CMS [6]. Due to their popularity, an attack against a CMS automatically means an attack against millions of its installations, much like attacks against Operating Systems or popular software. Specifically, we investigated the session handling techniques of 10 popular CMSs to discover if they were vulnerable to Session snooping/session poisoning attacks. From these ten CMSs (Joomla, WordPress, PHPNuke, Concrete5, Drupal, WolfCMS, ImpressCMS, Mambo, B2Evo and DotClear), 9 of them were using sessions (WordPress doesn t natively use sessions) and 2 out of these 9 were using the default PHP session management functionality (Concrete5 and WolfCMS) which makes them vulnerable when installed in a shared hosting environment. Using the described session attacks an attacker can login as an administrator into these two CMSs without knowing the administrator password. 4.3 Further affected technologies In addition to our practical experiments with PHP, we examined mod_python and mod_perl to evaluate whether the observed issues are specific to PHP or if similar problems can be also encountered in other frameworks. We chose these two technologies as they are also frequently offered in shared hosting scenarios, probably because they are free and work well with the popular Apache Webserver. Mod_perl does not provide native session handling. Instead, specialized Perl libraries are provided for this task. A common choice is Apache::Session. Very similar to PHP, the file-based mechanism of Apache::Session defaults to a common, server-global temporary directory. The filename of the session file is identical to the session ID value and the library s API-call to retrieve the session data only takes the session ID as the only argument. Mod_python s session handling mechanism utilizes in its default configuration a global session storage file called mp_see.dbm.db which holds the data values for all currently active sessions. This file is global for all hosted applications, regardless of applications s domains. Retrieval of session data is handled transparently for the application programmer and apparently is solely based on the value of the pysid cookie. In our practical experiments both frameworks proved to be susceptible to the attacks described in Section DISCUSSION To understand the circumstances that have led to these vulnerabilities, one has to recall the history of HTTP: In its original form and early versions HTTP had neither a session concept nor native capabilities for shared hosting. While the latter was added to HTTP 1.1 via the Host header, the former was left to the programmers, which resorted to session identifiers (see Sec. 2). In consequence, we have a case of ill fitted separation of concerns: The Webserver is responsible to route the requests to the correct executable (deducted from the Host-header and the requested URI), while the programmer s duty is to implement the session handling. But as witnessed above, in shared hosting scenarios, these two functionalities should not be handled separately as there is a functional dependency between a given session and its Host or its Hosts in cases in which the Web application spans more than one (sub-)domain. This problem is not easily addressed in a general fashion. In most scenarios the Webserver, that handles the Host separation, the application framework, that provides the session handling, and the actual Web application are three distinct units, all created and maintained separately. However, without support from the application, neither the framework nor the server can assess to which set of domains (i.e, Host-header values) a given session should apply, rendering default isolation mechanism susceptible to potential weaknesses. 6. EXISTING COUNTERMEASURES Due to the popularity of shared Web hosting, much effort has been put into making shared hosting installations more secure. In this section, we will overview the most common server-side attack countermeasures that are deployed on Webservers and how they stand up against the serverside session attacks described in Section suexec and suphp In default Apache and PHP installations, all PHP scripts execute under a single user, the Webserver user, regardless of their path on the disk or of the owner of the file. Two of the most popular solutions to this insecure behavior are suexec 3 and suphp 4. While the two solutions are implemented differently the end goal of their developers is the same; to have each script run under the permissions of their owners and not under the permissions of the calling Webserver. This means that the scripts of user A have different permissions of user B and thus each is protected from the other. Unfortunately, the extra security comes at a cost. Even though we couldn t locate official comparisons, individual users have benchmarked their installations and have found both solutions to incur a performance penalty ranging between 2,500% to 3,600% [7]. We believe that making a Webserver 36 times slower comes into antithesis with hosting companies profit strategy which consists of placing as many users as possible on a single physical server. Even if we assume however that a hosting company deploys such a solution, a server-side session attack is still possible. More specifically, Session Poisoning can still be executed on shared hosting sites that use a common session store. The only modification to the methodology presented in Sec. 3.1 is for the attacker to change the session file permissions, just before forcing it onto other Web applications. By making the file world-readable, the victim Web application is allowed to open the attacker s poisoned session file. On the other hand, Session Snooping is no longer possible since the attacker s scripts cannot open the session files of other Web applications and thus can t change their content. 3 suexec 4 suphp
6 6.2 Suhosin patch Suhosin 5 is a server-side protection mechanism which can, among others, protect session files by symmetrically encrypting their content. Thus, if an attacker opens a session file on a Webserver with the Suhosin mechanism, he can no longer inspect the session contents or intelligibly edit the values. The encryption/decryption key of each session consists of a global key (by default common to all scripts running on the same server) combined with one or more of the following values: the remote IP address of the current visitor, the Document Root of the executing script and the User-Agent of the visitor s browser. The active combination of the above values differs between installations and depends upon the installation framework and custom choices of Web administrators. In our described attacks, the only fields that could differ between an attacker s encryption key and the encryption key of all other Web applications situated on the same server are the Document Root field and the global key. The remote IP address and the User-Agent of the attacker s browser will be the same towards all Web applications. This effectively means, that unless the Document Root encryption option is active and/or a Web application has explicitly modified the global Suhosin key, an attacker will be able to correctly encrypt and decrypt the session files of a given Web application and thus circumvent the protection provided by Suhosin. Note also that the encryption and decryption happens automatically by the PHP framework when the appropriate session management functions are called, thus the attacker doesn t need to manually perform these tasks. 6.3 PHP Safe Mode The, since June 2009 deprecated, PHP Safe Mode 6 could be configured to mitigate the attack via restricting the session_start() method. However, reliance on Safe Mode features is actively discouraged and Safe Mode will be removed completely in the next major version of PHP, hence, on modern set-ups this option may not exist at all. 7. RELATED WORK To the best of our knowledge, this paper is the first one to describe server-side data attacks against session identifiers. A similar technique is described in [12], where an attacker can browse the common session store of a shared host and use the data to perform session hijacking or expose private information. Note however, that the described attack targets the authenticated clients of a Web application, as opposed to the server-side attacks described in Sec. 3 which target the logic of the Web application itself. Additionally, a removal of read-permissions from the common session store by the administrator would stop the described attack (since directory listing is no longer feasible) but would have no impact on Session Snooping and Session Poisoning since these attacks do not rely on a list-able session store. The client-side of session identifiers has, in general, been a common target of Web application attacks. The most standard way of hijacking a session identifier is through a Cross-site scripting attack. Cross-site scripting [15] (XSS) is a type of code injection attack, where the victim executes Javascript code on behalf of the attacker. XSS are 5 Suhosin 6 SafeMode among the top attacks conducted today against Web applications [11]. Apart from manually finding and exploiting them, Kieyzun et al. [8] have also shown that it is possible to automate the procedure. Other common attacks against session identifiers include Cross-site Request Forgery (CSRF) [14], session fixation [9] and session sidejacking [4]. Using CSRF, a malicious website is able to generate arbitrary requests towards trusted websites taking advantage of the fact that the visiting user is authenticated to the trusted websites and his session cookies will be appended automatically by his browser. In session fixation attacks, an attacker can force a victim to use a session identifier that is already known to him. This attack can be mainly performed on websites that accept session information as a GET parameter. Session sidejacking, is essentially session hijacking performed through side channels such as packet sniffing on open wireless or hubbed networks. In addition to attacks against session identifiers, the complexities and subtleties of the HTTP protocol have also given rise to other, less common attacks against Web applications. Carettoni and Di Paola [5] were among the first ones to notice that there is no formal definition of parameter precedence for cases when a URI contains two or more parameters with the same name. The lack of a formal definition has led to implementation-specific behaviors which can be exploited by attackers, to inject new values in existing URIs. The new parameter values can, among others, overwrite hard-coded parameters and corrupt both the client-side as well as the server-side logic of a Web application. This attack, namely HTTP Parameter Pollution (HPP), was recently verified by Balduzzi et al. [1] who discovered that 29.88% from 5,000 tested websites were vulnerable to it. Researchers have also discovered that different inputs can lead Web applications to different code paths which in turn respond in different timings. These differences are measurable and can lead to the exposal of private information [3]. 8. CONCLUSION Shared hosting is the most popular type of Web hosting mainly due to its low-monthly costs and easy administration. At the same time however, Web applications stored on shared hosting plans, suffer from limited performance and, more importantly, limited security. In this paper we presented two new attacks that abuse the lack of proper isolation between session identifiers of different Web applications hosted on the same physical server. We experimentally demonstrated that most websites use a standard and global session store which an attacker in control of a domain hosted on a shared hosting server can abuse. The resulting attacks, allow a malicious user to circumvent authentication mechanisms of vulnerable Web applications, elevate his privileges, steal private information and conduct attacks that would be otherwise impossible. Finally, we tested our attacks against popular Content Management Systems and showed that they are effective even when generic server-side countermeasures are deployed. Acknowledgements:. We thank the anonymous reviewers for their helpful comments. This research is partially funded by the Interuniversity Attraction Poles Programme Belgian State, Belgian Science Policy, the IBBT, the Research Fund K.U.Leuven and by the EU Project WebSand (FP ).
7 9. REFERENCES [1] M. Balduzzi, C. T. Gimenez, D. Balzarotti, and E. Kirda. Automated Discovery of Parameter Pollution Vulnerabilities in Web Applications. In NDSS 11, [2] T. Ballad and W. Ballad. Securing PHP Web Applications. Addison-Wesley Professional, [3] A. Bortz and D. Boneh. Exposing private information by timing web applications. WWW 07. ACM, [4] E. Butler. Firesheep. [5] L. Carettoni and S. D. Paola. HTTP Parameter Pollution. In OWASP AppSec Europe, [6] Water and Stone: Open Source CMS Market Share Report, [7] S. Herbert. Using suphp To Secure A Shared Server. using-suphp-to-secure-a-shared-server/. [8] A. Kieyzun, P. Guo, K. Jayaraman, and M. Ernst. Automatic creation of sql injection and cross-site scripting attacks. In ICSE 09, May [9] M. Kolsek. Session Fixation Vulnerability in Web-based Applications. com/papers/session_fixation.pdf. [10] T. Krueger, C. Gehl, K. Rieck, and P. Laskov. Tokdoc: a self-healing web application firewall. SAC 10. ACM, [11] OWASP Top 10 Web Application Security Risks. OWASP_Top_Ten_Project. [12] PHP Security Consortium - PHP Security Guide: Shared Hosts. [13] W. Robertson, G. Vigna, C. Kruegel, and R. A. Kemmerer. Using generalization and characterization techniques in the anomaly-based detection of web attacks. In NDSS 06, [14] C. Shiflett. Cross-Site Request Forgeries. cross-site-request-forgeries. [15] The Cross-site Scripting FAQ.
Breaking Web Applications in Shared Hosting Environments. Nick Nikiforakis Katholieke Universiteit Leuven
Breaking Web Applications in Shared Hosting Environments Nick Nikiforakis Katholieke Universiteit Leuven Who am I? Nick Nikiforakis PhD student at KULeuven Security Low-level Web applications http://www.securitee.org
Abusing Locality in Shared Web Hosting. Nick Nikiforakis
Abusing Locality in Shared Web Hosting Nick Nikiforakis Nick Nikiforakis Brucon 19 th September 2011 PhD student at KUL About me Applied security research Low-level countermeasures for unsafe languages
Two Novel Server-Side Attacks against Log File in Shared Web Hosting Servers
Two Novel Server-Side Attacks against Log File in Shared Web Hosting Servers Seyed Ali Mirheidari 1, Sajjad Arshad 2, Saeidreza Khoshkdahan 3, Rasool Jalili 4 1 Computer Engineering Department, Sharif
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security Presented 2009-05-29 by David Strauss Thinking Securely Security is a process, not
Web application security
Web application security Sebastian Lopienski CERN Computer Security Team openlab and summer lectures 2010 (non-web question) Is this OK? int set_non_root_uid(int uid) { // making sure that uid is not 0
WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY
WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY www.alliancetechpartners.com WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY More than 70% of all websites have vulnerabilities
1. Introduction. 2. Web Application. 3. Components. 4. Common Vulnerabilities. 5. Improving security in Web applications
1. Introduction 2. Web Application 3. Components 4. Common Vulnerabilities 5. Improving security in Web applications 2 What does World Wide Web security mean? Webmasters=> confidence that their site won
External Vulnerability Assessment. -Technical Summary- ABC ORGANIZATION
External Vulnerability Assessment -Technical Summary- Prepared for: ABC ORGANIZATI On March 9, 2008 Prepared by: AOS Security Solutions 1 of 13 Table of Contents Executive Summary... 3 Discovered Security
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
Criteria for web application security check. Version 2015.1
Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
ArcGIS Server Security Threats & Best Practices 2014. David Cordes Michael Young
ArcGIS Server Security Threats & Best Practices 2014 David Cordes Michael Young Agenda Introduction Threats Best practice - ArcGIS Server settings - Infrastructure settings - Processes Summary Introduction
The Weakest Link: Mitigating Web Application Vulnerabilities. webscurity White Paper. webscurity Inc. Minneapolis, Minnesota USA
The Weakest Link: Mitigating Web Application Vulnerabilities webscurity White Paper webscurity Inc. Minneapolis, Minnesota USA January 25, 2007 Contents Executive Summary...3 Introduction...4 Target Audience...4
Web applications. Web security: web basics. HTTP requests. URLs. GET request. Myrto Arapinis School of Informatics University of Edinburgh
Web applications Web security: web basics Myrto Arapinis School of Informatics University of Edinburgh HTTP March 19, 2015 Client Server Database (HTML, JavaScript) (PHP) (SQL) 1 / 24 2 / 24 URLs HTTP
How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering
How to break in Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering Time Agenda Agenda Item 9:30 10:00 Introduction 10:00 10:45 Web Application Penetration
Web Application Guidelines
Web Application Guidelines Web applications have become one of the most important topics in the security field. This is for several reasons: It can be simple for anyone to create working code without security
Last update: February 23, 2004
Last update: February 23, 2004 Web Security Glossary The Web Security Glossary is an alphabetical index of terms and terminology relating to web application security. The purpose of the Glossary is to
Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data
Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V2.0, JULY 2015 Multiple Layers of Protection Overview Password Salted-Hash Thank you
Sitefinity Security and Best Practices
Sitefinity Security and Best Practices Table of Contents Overview The Ten Most Critical Web Application Security Risks Injection Cross-Site-Scripting (XSS) Broken Authentication and Session Management
Columbia University Web Security Standards and Practices. Objective and Scope
Columbia University Web Security Standards and Practices Objective and Scope Effective Date: January 2011 This Web Security Standards and Practices document establishes a baseline of security related requirements
Web Vulnerability Scanner by Using HTTP Method
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 9, September 2015,
Web Application Security. Vulnerabilities, Weakness and Countermeasures. Massimo Cotelli CISSP. Secure
Vulnerabilities, Weakness and Countermeasures Massimo Cotelli CISSP Secure : Goal of This Talk Security awareness purpose Know the Web Application vulnerabilities Understand the impacts and consequences
FINAL DoIT 11.03.2015 - v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES
Purpose: The Department of Information Technology (DoIT) is committed to developing secure applications. DoIT s System Development Methodology (SDM) and Application Development requirements ensure that
Lecture 11 Web Application Security (part 1)
Lecture 11 Web Application Security (part 1) Computer and Network Security 4th of January 2016 Computer Science and Engineering Department CSE Dep, ACS, UPB Lecture 11, Web Application Security (part 1)
Magento Security and Vulnerabilities. Roman Stepanov
Magento Security and Vulnerabilities Roman Stepanov http://ice.eltrino.com/ Table of contents Introduction Open Web Application Security Project OWASP TOP 10 List Common issues in Magento A1 Injection
Penetration Test Report
Penetration Test Report Acme Test Company ACMEIT System 26 th November 2010 Executive Summary Info-Assure Ltd was engaged by Acme Test Company to perform an IT Health Check (ITHC) on the ACMEIT System
ETHICAL HACKING 010101010101APPLICATIO 00100101010WIRELESS110 00NETWORK1100011000 101001010101011APPLICATION0 1100011010MOBILE0001010 10101MOBILE0001
001011 1100010110 0010110001 010110001 0110001011000 011000101100 010101010101APPLICATIO 0 010WIRELESS110001 10100MOBILE00010100111010 0010NETW110001100001 10101APPLICATION00010 00100101010WIRELESS110
HTTPParameter Pollution. ChrysostomosDaniel
HTTPParameter Pollution ChrysostomosDaniel Introduction Nowadays, many components from web applications are commonly run on the user s computer (such as Javascript), and not just on the application s provider
FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE
Purpose: This procedure identifies what is required to ensure the development of a secure application. Procedure: The five basic areas covered by this document include: Standards for Privacy and Security
Malware Analysis Quiz 6
Malware Analysis Quiz 6 1. Are these files packed? If so, which packer? The file is not packed, as running the command strings shelll reveals a number of interesting character sequences, such as: irc.ircnet.net
SECURITY ADVISORY. December 2008 Barracuda Load Balancer admin login Cross-site Scripting
SECURITY ADVISORY December 2008 Barracuda Load Balancer admin login Cross-site Scripting Discovered in December 2008 by FortConsult s Security Research Team/Jan Skovgren WARNING NOT FOR DISCLOSURE BEFORE
The Trivial Cisco IP Phones Compromise
Security analysis of the implications of deploying Cisco Systems SIP-based IP Phones model 7960 Ofir Arkin Founder The Sys-Security Group [email protected] http://www.sys-security.com September 2002
DFW INTERNATIONAL AIRPORT STANDARD OPERATING PROCEDURE (SOP)
Title: Functional Category: Information Technology Services Issuing Department: Information Technology Services Code Number: xx.xxx.xx Effective Date: xx/xx/2014 1.0 PURPOSE 1.1 To appropriately manage
OWASP and OWASP Top 10 (2007 Update) OWASP. The OWASP Foundation. Dave Wichers. The OWASP Foundation. OWASP Conferences Chair dave.wichers@owasp.
and Top 10 (2007 Update) Dave Wichers The Foundation Conferences Chair [email protected] COO, Aspect Security [email protected] Copyright 2007 - The Foundation This work is available
The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.
This sample report is published with prior consent of our client in view of the fact that the current release of this web application is three major releases ahead in its life cycle. Issues pointed out
Web Application Firewall on SonicWALL SRA
Web Application Firewall on SonicWALL SRA Document Scope This document describes how to configure and use the Web Application Firewall feature in SonicWALL SRA 6.0. This document contains the following
How To Protect A Web Application From Attack From A Trusted Environment
Standard: Version: Date: Requirement: Author: PCI Data Security Standard (PCI DSS) 1.2 October 2008 6.6 PCI Security Standards Council Information Supplement: Application Reviews and Web Application Firewalls
Sample Report. Security Test Plan. Prepared by Security Innovation
Sample Report Security Test Plan Prepared by Security Innovation Table of Contents 1.0 Executive Summary... 3 2.0 Introduction... 3 3.0 Strategy... 4 4.0 Deliverables... 4 5.0 Test Cases... 5 Automation...
Security Testing with Selenium
with Selenium Vidar Kongsli Montréal, October 25th, 2007 Versjon 1.0 Page 1 whois 127.0.0.1? Vidar Kongsli System architect & developer Head of security group Bekk Consulting Technology and Management
A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications. Slides by Connor Schnaith
A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications Slides by Connor Schnaith Cross-Site Request Forgery One-click attack, session riding Recorded since 2001 Fourth out of top 25 most
WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats
WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top
Security features of ZK Framework
1 Security features of ZK Framework This document provides a brief overview of security concerns related to JavaScript powered enterprise web application in general and how ZK built-in features secures
3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management
What is an? s Ten Most Critical Web Application Security Vulnerabilities Anthony LAI, CISSP, CISA Chapter Leader (Hong Kong) [email protected] Open Web Application Security Project http://www.owasp.org
ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST
ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST Performed Between Testing start date and end date By SSL247 Limited SSL247 Limited 63, Lisson Street Marylebone London
Installation and configuration guide
Installation and Configuration Guide Installation and configuration guide Adding X-Forwarded-For support to Forward and Reverse Proxy TMG Servers Published: May 2010 Applies to: Winfrasoft X-Forwarded-For
The Top Web Application Attacks: Are you vulnerable?
QM07 The Top Web Application Attacks: Are you vulnerable? John Burroughs, CISSP Sr Security Architect, Watchfire Solutions [email protected] Agenda Current State of Web Application Security Understanding
Web Application Firewall on SonicWALL SSL VPN
Web Application Firewall on SonicWALL SSL VPN Document Scope This document describes how to configure and use the Web Application Firewall feature in SonicWALL SSL VPN 5.0. This document contains the following
Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified
Standard: Data Security Standard (DSS) Requirement: 6.6 Date: February 2008 Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified Release date: 2008-04-15 General PCI
SAP: Session (Fixation) Attacks and Protections
www.taddong.com SAP: Session (Fixation) Attacks and Protections (in Web Applications) Raul Siles [email protected] April 15, 2011 VII OWASP Spain Chapter Meeting Copyright 2011 Taddong S.L. Todos los derechos
Common Security Vulnerabilities in Online Payment Systems
Common Security Vulnerabilities in Online Payment Systems Author- Hitesh Malviya(Information Security analyst) Qualifications: C!EH, EC!SA, MCITP, CCNA, MCP Current Position: CEO at HCF Infosec Limited
Cross Site Scripting in Joomla Acajoom Component
Whitepaper Cross Site Scripting in Joomla Acajoom Component Vandan Joshi December 2011 TABLE OF CONTENTS Abstract... 3 Introduction... 3 A Likely Scenario... 5 The Exploit... 9 The Impact... 12 Recommended
Web Application Report
Web Application Report This report includes important security information about your Web Application. Security Report This report was created by IBM Rational AppScan 8.5.0.1 11/14/2012 8:52:13 AM 11/14/2012
Thick Client Application Security
Thick Client Application Security Arindam Mandal ([email protected]) (http://www.paladion.net) January 2005 This paper discusses the critical vulnerabilities and corresponding risks in a two
Application Security Testing. Generic Test Strategy
Application Security Testing Generic Test Strategy Page 2 of 8 Contents 1 Introduction 3 1.1 Purpose: 3 1.2 Application Security Testing: 3 2 Audience 3 3 Test Strategy guidelines 3 3.1 Authentication
Passing PCI Compliance How to Address the Application Security Mandates
Passing PCI Compliance How to Address the Application Security Mandates The Payment Card Industry Data Security Standards includes several requirements that mandate security at the application layer. These
05.0 Application Development
Number 5.0 Policy Owner Information Security and Technology Policy Application Development Effective 01/01/2014 Last Revision 12/30/2013 Department of Innovation and Technology 5. Application Development
Web-Application Security
Web-Application Security Kristian Beilke Arbeitsgruppe Sichere Identität Fachbereich Mathematik und Informatik Freie Universität Berlin 29. Juni 2011 Overview Web Applications SQL Injection XSS Bad Practice
Detecting and Exploiting XSS with Xenotix XSS Exploit Framework
Detecting and Exploiting XSS with Xenotix XSS Exploit Framework [email protected] keralacyberforce.in Introduction Cross Site Scripting or XSS vulnerabilities have been reported and exploited since 1990s.
Application Layer Encryption: Protecting against Application Logic and Session Theft Attacks. Whitepaper
Application Layer Encryption: Protecting against Application Logic and Session Theft Attacks Whitepaper The security industry has extensively focused on protecting against malicious injection attacks like
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda 1. Introductions for new members (5 minutes) 2. Name of group 3. Current
Cross-site site Scripting Attacks on Android WebView
IJCSN International Journal of Computer Science and Network, Vol 2, Issue 2, April 2013 1 Cross-site site Scripting Attacks on Android WebView 1 Bhavani A B 1 Hyderabad, Andhra Pradesh-500050, India Abstract
Threat Modelling for Web Application Deployment. Ivan Ristic [email protected] (Thinking Stone)
Threat Modelling for Web Application Deployment Ivan Ristic [email protected] (Thinking Stone) Talk Overview 1. Introducing Threat Modelling 2. Real-world Example 3. Questions Who Am I? Developer /
QuickBooks Online: Security & Infrastructure
QuickBooks Online: Security & Infrastructure May 2014 Contents Introduction: QuickBooks Online Security and Infrastructure... 3 Security of Your Data... 3 Access Control... 3 Privacy... 4 Availability...
Web Application Security
E-SPIN PROFESSIONAL BOOK Vulnerability Management Web Application Security ALL THE PRACTICAL KNOW HOW AND HOW TO RELATED TO THE SUBJECT MATTERS. COMBATING THE WEB VULNERABILITY THREAT Editor s Summary
THREAT MODELLING FOR SQL SERVERS Designing a Secure Database in a Web Application
THREAT MODELLING FOR SQL SERVERS Designing a Secure Database in a Web Application E.Bertino 1, D.Bruschi 2, S.Franzoni 2, I.Nai-Fovino 2, S.Valtolina 2 1 CERIAS, Purdue University, West Lafayette, IN,
Essential IT Security Testing
Essential IT Security Testing Application Security Testing for System Testers By Andrew Muller Director of Ionize Who is this guy? IT Security consultant to the stars Member of OWASP Member of IT-012-04
Network Security Exercise #8
Computer and Communication Systems Lehrstuhl für Technische Informatik Network Security Exercise #8 Falko Dressler and Christoph Sommer Computer and Communication Systems Institute of Computer Science,
CSE598i - Web 2.0 Security OWASP Top 10: The Ten Most Critical Web Application Security Vulnerabilities
CSE598i - Web 2.0 Security OWASP Top 10: The Ten Most Critical Web Application Security Vulnerabilities Thomas Moyer Spring 2010 1 Web Applications What has changed with web applications? Traditional applications
Nuclear Regulatory Commission Computer Security Office Computer Security Standard
Nuclear Regulatory Commission Computer Security Office Computer Security Standard Office Instruction: Office Instruction Title: CSO-STD-1108 Web Application Standard Revision Number: 1.0 Effective Date:
OWASP TOP 10 ILIA ALSHANETSKY @ILIAA HTTPS://JOIND.IN/15741
OWASP TOP 10 ILIA ALSHANETSKY @ILIAA HTTPS://JOIND.IN/15741 ME, MYSELF & I PHP Core Developer Author of Guide to PHP Security Security Aficionado THE CONUNDRUM USABILITY SECURITY YOU CAN HAVE ONE ;-) OPEN
SECURITY TRENDS & VULNERABILITIES REVIEW 2015
SECURITY TRENDS & VULNERABILITIES REVIEW 2015 Contents 1. Introduction...3 2. Executive summary...4 3. Inputs...6 4. Statistics as of 2014. Comparative study of results obtained in 2013...7 4.1. Overall
Guidelines for Web applications protection with dedicated Web Application Firewall
Guidelines for Web applications protection with dedicated Web Application Firewall Prepared by: dr inŝ. Mariusz Stawowski, CISSP Bartosz Kryński, Imperva Certified Security Engineer INTRODUCTION Security
Attack Vector Detail Report Atlassian
Attack Vector Detail Report Atlassian Report As Of Tuesday, March 24, 2015 Prepared By Report Description Notes [email protected] The Attack Vector Details report provides details of vulnerability
Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual. Document Version 1.0
Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual Document Version 1.0 Table of Contents 1 SWAF... 4 1.1 SWAF Features... 4 2 Operations and User Manual... 7 2.1 SWAF Administrator
Session Management in Web Applications
Session Management in Web Applications Author: EUROSEC GmbH Chiffriertechnik & Sicherheit Tel: 06173 / 60850, www.eurosec.com EUROSEC GmbH Chiffriertechnik & Sicherheit, 2005 What is Web-based Session
Installation and configuration guide
Installation and Configuration Guide Installation and configuration guide Adding X-Username support to Forward and Reverse Proxy TMG Servers Published: December 2010 Applies to: Winfrasoft X-Username for
Advanced Web Security, Lab
Advanced Web Security, Lab Web Server Security: Attacking and Defending November 13, 2013 Read this earlier than one day before the lab! Note that you will not have any internet access during the lab,
Hack Proof Your Webapps
Hack Proof Your Webapps About ERM About the speaker Web Application Security Expert Enterprise Risk Management, Inc. Background Web Development and System Administration Florida International University
We protect you applications! No, you don t. Digicomp Hacking Day 2013 May 16 th 2013
We protect you applications! No, you don t Digicomp Hacking Day 2013 May 16 th 2013 Sven Vetsch Partner & CTO at Redguard AG www.redguard.ch Specialized in Application Security (Web, Web-Services, Mobile,
Data Breaches and Web Servers: The Giant Sucking Sound
Data Breaches and Web Servers: The Giant Sucking Sound Guy Helmer CTO, Palisade Systems, Inc. Lecturer, Iowa State University @ghelmer Session ID: DAS-204 Session Classification: Intermediate The Giant
ASL IT SECURITY BEGINNERS WEB HACKING AND EXPLOITATION
ASL IT SECURITY BEGINNERS WEB HACKING AND EXPLOITATION V 2.0 A S L I T S e c u r i t y P v t L t d. Page 1 Overview: Learn the various attacks like sql injections, cross site scripting, command execution
BASELINE SECURITY TEST PLAN FOR EDUCATIONAL WEB AND MOBILE APPLICATIONS
BASELINE SECURITY TEST PLAN FOR EDUCATIONAL WEB AND MOBILE APPLICATIONS Published by Tony Porterfield Feb 1, 2015. Overview The intent of this test plan is to evaluate a baseline set of data security practices
White Paper BMC Remedy Action Request System Security
White Paper BMC Remedy Action Request System Security June 2008 www.bmc.com Contacting BMC Software You can access the BMC Software website at http://www.bmc.com. From this website, you can obtain information
Bug Report. Date: March 19, 2011 Reporter: Chris Jarabek ([email protected])
Bug Report Date: March 19, 2011 Reporter: Chris Jarabek ([email protected]) Software: Kimai Version: 0.9.1.1205 Website: http://www.kimai.org Description: Kimai is a web based time-tracking application.
Attack and Penetration Testing 101
Attack and Penetration Testing 101 Presented by Paul Petefish [email protected] July 15, 2009 Copyright 2000-2009, Solutionary, Inc. All rights reserved. Version 2.2 Agenda Penetration Testing
Webmail Using the Hush Encryption Engine
Webmail Using the Hush Encryption Engine Introduction...2 Terms in this Document...2 Requirements...3 Architecture...3 Authentication...4 The Role of the Session...4 Steps...5 Private Key Retrieval...5
Swaddler: An Approach for the Anomaly-based Detection of State Violations in Web Applications
Swaddler: An Approach for the Anomaly-based Detection of State Violations in Web Applications Marco Cova, Davide Balzarotti, Viktoria Felmetsger, and Giovanni Vigna Department of Computer Science, University
Using EMC Unisphere in a Web Browsing Environment: Browser and Security Settings to Improve the Experience
Using EMC Unisphere in a Web Browsing Environment: Browser and Security Settings to Improve the Experience Applied Technology Abstract The Web-based approach to system management taken by EMC Unisphere
Evaluation of Penetration Testing Software. Research
Evaluation of Penetration Testing Software Research Penetration testing is an evaluation of system security by simulating a malicious attack, which, at the most fundamental level, consists of an intellectual
Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet
Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet March 8, 2012 Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director of Business Development
A Multi agent Scanner to Detect Stored XSS Vulnerabilities
A Multi agent Scanner to Detect Stored XSS Vulnerabilities E. Galán, A. Alcaide, A. Orfila, J. Blasco University Carlos III of Madrid, UC3M Leganés, Spain {edgalan,aalcaide,adiaz,jbalis}@inf.uc3m.es Abstract
HOD of Dept. of CSE & IT. Asst. Prof., Dept. Of CSE AIET, Lko, India. AIET, Lko, India
Volume 5, Issue 12, December 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Investigation
CS 558 Internet Systems and Technologies
CS 558 Internet Systems and Technologies Dimitris Deyannis [email protected] 881 Heat seeking Honeypots: Design and Experience Abstract Compromised Web servers are used to perform many malicious activities.
University of Wisconsin Platteville SE411. Senior Seminar. Web System Attacks. Maxwell Friederichs. April 18, 2013
University of Wisconsin Platteville SE411 Senior Seminar Web System Attacks Maxwell Friederichs April 18, 2013 Abstract 1 Data driven web applications are at the cutting edge of technology, and changing
Recommended Practice Case Study: Cross-Site Scripting. February 2007
Recommended Practice Case Study: Cross-Site Scripting February 2007 iii ACKNOWLEDGEMENT This document was developed for the U.S. Department of Homeland Security to provide guidance for control system cyber
Certified Secure Web Application Security Test Checklist
www.certifiedsecure.com [email protected] Tel.: +31 (0)70 310 13 40 Loire 128-A 2491 AJ The Hague The Netherlands Certified Secure Checklist About Certified Secure exists to encourage and fulfill
IJMIE Volume 2, Issue 9 ISSN: 2249-0558
Survey on Web Application Vulnerabilities Prevention Tools Student, Nilesh Khochare* Student,Satish Chalurkar* Professor, Dr.B.B.Meshram* Abstract There are many commercial software security assurance
Ethical Hacking as a Professional Penetration Testing Technique
Ethical Hacking as a Professional Penetration Testing Technique Rochester ISSA Chapter Rochester OWASP Chapter - Durkee Consulting, Inc. [email protected] 2 Background Founder of Durkee Consulting since 1996
