词条 | Session poisoning |
释义 |
Session poisoning (also referred to as "session data pollution" and "session modification") is a method to exploit insufficient input validation within a server application. Typically a server application that is vulnerable to this type of exploit will copy user input into session variables. The underlying vulnerability is a state management problem: shared state, race condition, ambiguity in use or plain unprotected modifications of state values. Session poisoning has been demonstrated in server environments where different, non-malicious applications (scripts) share the same session states but where usage differ, causing ambiguity and race conditions. Session poisoning has been demonstrated in scenarios where attacker is able to introduce malicious scripts into the server environment, which is possible if attacker and victim share a web host. OriginsSession poisoning was first discussed as a (potentially new) vulnerability class in the Full disclosure mailing list.[1] Alla Bezroutchko inquired if "Session data pollution vulnerabilities in web applications" was a new problem in January 2006. However, this was an old vulnerability previously noted by others: "this is a classic state management issue" - Yvan Boily;[2] "This is not new" - /someone.[3] Earlier examples of these vulnerabilities can be found in major security resources/archives such as Bugtraq, e.g.
Session pollution has also been covered in some articles, such as PHP Session Security, Przemek Sobstel, 2007.[6] Attack examplesTrivial attack scenarioAn example code vulnerable to this problem is: Session("Login") = Request("login")Session("Username") = Request("username") Which is subject to trivial attacks such as vulnerable.asp?login=YES&username=Mary This problem could exist in software where
The problem is that Exploiting ambiguous or dual use of same session variableAlla Bezroutchko discusses a scenario where
A race condition was demonstrated, in which the reset scripts could be exploited to change the logged on user arbitrarily. Exploiting scripts allowing writes to arbitrary session variablesAlla Bezroutchko discusses examples observed in development forums, which allows writing to arbitrary session variables.[8] The first example is (in which $_GET["something"] is probably from a selection box or similar). Attack becomes vulnerable.php?something=SESSION_VAR_TO_POISON Session poisoning attacks enabled by php.ini: register_globals = on
Second example by /someone is[10] which is vulnerable if:
Attack becomes vulnerable.php?var=SESSION_VAR_TO_POISON Exploit utilizing a shared PHP server (e.g. shared web hosting)'unknown' of uw-team.org discusses a scenario where attacker and victim shares the same PHP server.[11] Attack is fairly easy:
This attack only requires that victim and attacker share the same PHP server. The attack is not dependent on victim and attacker having the same virtual hostname, as it is trivial for attacker to move the session identifier cookie from one cookie domain to another. See also
References1. ^{{cite web |url=http://archives.neohapsis.com/archives/fulldisclosure/2006-01/0414.html |title=Neohapsis Archives 0414}} 2. ^{{cite web |url=http://archives.neohapsis.com/archives/fulldisclosure/2006-01/0459.html |title=Neohapsis Archives 0459}} 3. ^{{cite web |url=http://archives.neohapsis.com/archives/fulldisclosure/2006-01/0423.html |title=Neohapsis Archives 0423}} 4. ^{{cite web |url=http://seclists.org/lists/bugtraq/2001/Jul/0569.html |title=Seclists Archives 0569}} 5. ^{{cite web |url=http://seclists.org/lists/bugtraq/2005/Sep/0193.html |title=Seclists Archives 0193}} 6. ^{{cite web |url=http://segfaultlabs.com/pdf/php-session-security.pdf |title=Segfault Labs |access-date=September 22, 2007}} 7. ^{{cite web |url=http://archives.neohapsis.com/archives/fulldisclosure/2006-01/0414.html |title=Neohapsis Archives 0414}} 8. ^{{cite web |url=http://archives.neohapsis.com/archives/fulldisclosure/2006-01/0423.html |title=Neohapsis Archives 0423}} 9. ^{{cite web |url=http://seclists.org/lists/bugtraq/2001/Jul/0569.html |title=Seclists Archives 0569}} 10. ^{{cite web |url=http://archives.neohapsis.com/archives/fulldisclosure/2006-01/0423.html |title=Neohapsis Archives 0423}} 11. ^{{cite web |url=http://seclists.org/lists/bugtraq/2005/Sep/0193.html |title=Seclists Archive 0193}} 1 : Web security exploits |
随便看 |
|
开放百科全书收录14589846条英语、德语、日语等多语种百科知识,基本涵盖了大多数领域的百科知识,是一部内容自由、开放的电子版国际百科全书。