TRENDS IN WEB VULNERABILITIES
MICHEL CHAMBERLAND
TRENDS IN WEB VULNERABILITIES MICHEL CHAMBERLAND Introduction - - PowerPoint PPT Presentation
TRENDS IN WEB VULNERABILITIES MICHEL CHAMBERLAND Introduction Agenda Introduction Session Goals Presenter and Trustwave SpiderLabs background Analysis Overview Data Source Most frequently found SEVERE vulnerabilities
MICHEL CHAMBERLAND
– Session Goals – Presenter and Trustwave SpiderLabs background
– Data Source – Most frequently found SEVERE vulnerabilities – Most frequently found OVERALL vulnerabilities
– What are they? – How to fix them – Why you should care
Agenda
vulnerabilities that are commonly found by professional penetration testers
web applications.
your organization Session Goals
MCTS, Security+, etc.
resources About the Presenter
vulnerability About Trustwave SpiderLabs
SpiderLabs team over the last few years
frequently found severe vulnerabilities.
discussed in further details
explored Data Source
security assessments performed
specific organizations
Data Source
– Critical – High
Types of Severe Findings
resulted in a systems compromise
available to a member of the public with minimal effort
Critical Severity Findings
resulted in a systems compromise
available
attack using this exploit, but that vector is trivial
sensitive data or tangible assets, or (2) may significantly violate, harm, or impede the organization’s mission, reputation, or interest.
High Severity Findings
always result in a severe impact
– Allows an attacker to insert arbitrary commands into a database query or statement.
– Occurs when web applications do not properly validate user- supplied inputs before including them in dynamic web pages. Description
– Session hijacking – Can be used to virtually deface web applications – Social engineering (login prompts, fake updates, payment form, etc.) – Redirect users to another site – Tunneling and network discovery – Log user’s keystrokes
– Exfiltration or tampering of data – Get operating system level access – Escalate privileges Why they matter
– Don’t fix each instances individually
browser Mitigation
always result in a severe impact
vulnerabilities
– Valid session identifier is not required to access resources
– Authorization controls are not properly enforced, allowing unauthorized access to resources or functions
– Ability to view, delete or modify other user’s data Description
– Focused on UI
Why they matter
– Leverage existing frameworks
– Ensure a proper session identifier is associated with each request – Ensure the user’s role and permissions allow the requested action
Mitigation
– Having a weak password policy in place – Often associated with insecure password storage
– Processing requests that where not sourced from the application Description
policy and insecure password storage bad?
password hint compromised
days and made publicly available
customers
credit card data compromised
underground market
compromised
publicly until 2016
were compromised
and not salted
cracked
dark market in 2016
compromised
cracked
bad?
add/remove/confirm email, change security questions, add full privilege users to business accounts, etc.
victim’s domain
loyalty program
victim’s account
– Netgear Routers – Cisco Residential Gateway – Siemens Ruggedcom NMS – Huawei 3G Router – Ubiquiti Networking Products
administration of the device
power to ALL attached systems
– Victim issues requests against vulnerable site without knowing it – Often combined with other attacks (i.e.: spear phishing attacks) – Easy to find and trivial to exploit Why they matter
– Define a solid password policy – Ensure all application enforces that policy – Ensure passwords are properly salted and hashed (bcrypt)
– Use anti-forgery token – Leverage your development framework Mitigation
– Uppercase letters – Lowercase letters – Numbers – Non-alphanumeric characters Solid Password Policy
– Using weak ciphers with SSL/TLS (RC4, DES)
– Using a deprecated protocol for secure communications
– Allowing renegotiation of configuration for an established connection
– Tells a browser to remember to connect over TLS in the future Description
new replacement for WEP (WPA)
Weak Ciphers – RC4
(DESCHALL)
minutes
Weak Ciphers – DES
named POODLE (Padding Oracle On Downgraded Legacy Encryption)
connection such as ”secure” HTTP cookies, HTTP authorization headers, etc.
found to be vulnerable to the POODLE attack
by June of 2018 TLSv1
execute requests
condition (DoS attack) – SSL/TLS supports both client and server initiated as well as secure and insecure renegotiation – A client can initiate a secure renegotiation which uses around 15 times more resources on the server end – A tool as been published to make this attack simple SSL/TLS Renegotiation
certain amount of time (i.e.: 6 months)
redirection to HTTPS
redirection phase
interception, injection and tampering of traffic HTTP Strict Transport Security
environment
attackers
compliance requirements Why they matter
web server level
environment
header to the application’s responses. Mitigation
– Allowing browsers to save passwords and other sensitive information
– Allowing the same user to be authenticated in two different browser sessions
– Allowing a user session to be active for a long duration Description
– Given physical access, an attacker will be able to access the protected web application – When compromised over the network, an attacker may be able to retrieve the saved passwords from the browser
– Encourages account sharing
– Given physical access, an attacker may be able to access the protected web application – When compromised over the network, an attacker may be able to leverage an active session Why they matter
– Usually a simple code change
– Usually fixed at the application level
– Usually a configuration change at the application or web server level Mitigation
based around authentication and authorization vulnerabilities
too
trying to get to your data so fixing lower severity issues is critical
that could use more attention
– Upfront is cheaper than later – Security debt accumulates just like other technical debt – Invest in the security of your web applications
as well
have to be another news story and can stay ahead of the curve when new regulations for your industry are introduced