Threat Center Security News Systemic Web security Vulnerability
Systemic Web security Vulnerability Print E-mail
Written by Rebecca Mints   
Friday, 20 June 2008 07:43

Flaw Allows Hackers to Manipulate the http: Verb to By-pass Otherwise Effective Security Controls

 

Fortify Software, the application vulnerability specialist, has issued a warning to its customers and other companies about a bug in Web authorisation technology.The problem, says Rob Rachwald, Fortify's director of product marketing, lies with the VBAAC (Verb-based access and authentication control) aspect of Web security technology.

 

"The flaw is unusual in being systemic and therefore not directed at any one vendor's products, and is essentially a bug in a security feature," he said, adding that the most popular J2EE container applications all have the flaw inherent in their authorisation procedures.

 

According to Rachwald, the flaw allows hackers to manipulate the http: verb to by-pass otherwise effective security controls.

 

"For example, a piece of http: code might seek to limit access to a given directory except for those users logged in with ADMIN rights. Exploiting the flaw means that, instead of blocking approaches not specified in a security rule, the code allows almost any method that is not specified," he said.

 

"Using this approach leaves the system open to infection by malware, or perhaps worse, by listing specific methods in the security rule, software developers end up opening the system a lot wider than they originally intended," he added.

 

The flaw, says Rachwald, can be prevented by programming the Web and application server system to disallow non-standard requests such as HEAD, as well as never serving the JSPs directly but placing all the JSP-INF files into a container (e.g. WEB-INF) and limiting calls to that container.

 

"Direct calls to JSPs should be avoided if at all possible. Developers should always invoke the request from the environment they are expected to be in and not from a dictionary collection of request data," he explained.

 

The flaw was discovered by Aspect Security, whose director of research, Darshan Dabirsiaghi, has penned a paper on the new types of flaws as they relate to VBAAC technology.

 

Source: http://www.itseccity.de/?url=/content/worldwidenews/productsnews/080620ˍworˍaktˍfortify.html

 

WTW Threat Level