Security II - Server-Side Security
Security II - Server-Side Security
Stefano Calzavara
Universit`a Ca' Foscari Venezia
March 19, 2020
Stefano Calzavara Security II - Server-Side Security
1/24 Universit`a Ca' Foscari Venezia
Introduction
In this lecture, we will focus on three classes of problems which affect the server-side logic of the web application:
1 Access control issues: incorrect adoption of the authentication and authorization mechanisms
2 Code execution issues: bugs in the application logic which allow the attacker to execute code
3 File security issues: dangerous interactions between the web app and the underlying file system
We will not discuss database security, since it was already covered in the first module (Security I).
Stefano Calzavara Security II - Server-Side Security
2/24 Universit`a Ca' Foscari Venezia
Access Control
Access control vulnerabilities enable privilege escalation: 1 vertical: the attacker gets access to data and functionality of users with a more powerful role, e.g., administrators 2 horizontal: the attacker gets access to data and functionality of users with the same role, but different identity, e.g., another customer 3 context-aware: the attacker gets access to data and functionality which should only be available in a web application state different from the current one, e.g., bypassing intended security checks
Stefano Calzavara Security II - Server-Side Security
3/24 Universit`a Ca' Foscari Venezia
Access Control Flaw: Unprotected Functionality
Example: security-critical functionality is only linked from the admin profile and not from standard user profiles. Delete Including a secret in the URL is a sub-optimal solution:
the secret could be guessed / brute-forced by the attacker the secret could be leaked in other parts of the web application, for example in the robots.txt file
Stefano Calzavara Security II - Server-Side Security
4/24 Universit`a Ca' Foscari Venezia
Other Access Control Flaws
Parameter-based access control: access control is performed by means of parameters containing the role of the authenticated user. Similar issues arise when authorization information is stored in other parts of the client side, e.g., in cookies. Insecure Direct Object References: a web application uses user-supplied input to directly access objects (files, database records, etc.).
Stefano Calzavara Security II - Server-Side Security
5/24 Universit`a Ca' Foscari Venezia
................
................
In order to avoid copyright disputes, this page is only a partial summary.
To fulfill the demand for quickly locating and searching documents.
It is intelligent file search solution for home and business.
Related download
- cse127 introductionto security university of california
- cs 161 computer security prof david wagner
- web security computer security csc 405 kapravelos
- swe 781 secure software design and programming
- owasp path traversal cheat sheet
- dotdotpwn root me
- dumb web server ca
- s21 secure coding standards and procedures
- arbitrary file read to rce
- wordcamp uk 2014 how to secure your wordpress website
Related searches
- honda utv side by side for sale
- side by side in colorado denver
- used side by side 4x4
- cheapest side by side utv
- kawasaki side by side dealers near me
- used side by side craigslist
- server 2016 vs server 2019
- terminal server configuration server 2016
- datatables server side filter
- datatables server side paging
- datatables server side column search
- datatable server side pagination