MACE: Detecting Privilege Escalation Vulnerabilities in Web Applications

被引:32
作者
Monshizadeh, Maliheh [1 ]
Naldurg, Prasad [2 ]
Venkatakrishnan, V. N. [1 ]
机构
[1] Univ Illinois, Dept Comp Sci, Chicago, IL 60612 USA
[2] IBM Res India, Bangalore, Karnataka, India
来源
CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY | 2014年
基金
美国国家科学基金会;
关键词
Access Control; Web Security; Authorization;
D O I
10.1145/2660267.2660337
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We explore the problem of identifying unauthorized privilege escalation instances in a web application. These vulnerabilities are typically caused by missing or incorrect authorizations in the server side code of a web application. The problem of identifying these vulnerabilities is compounded by the lack of an access control policy specification in a typical web application, where the only supplied documentation is in fact its source code. This makes it challenging to infer missing checks that protect a web application's sensitive resources. To address this challenge, we develop a notion of authorization context consistency, which is satisfied when a web application consistently enforces its authorization checks across the code. We then present an approach based on program analysis to check for authorization state consistency in a web application. Our approach is implemented in a tool called MACE that uncovers vulnerabilities that could be exploited in the form of privilege escalation attacks. In particular, MACE is the first tool reported in the literature to identify a new class of web application vulnerabilities called Horizontal Privilege Escalation (HPE) vulnerabilities. MACE works on large codebases, and discovers serious, previously unknown, vulnerabilities in 5 out of 7 web applications tested. Without MACE, a comparable human-driven security audit would require weeks of effort in code inspection and testing.
引用
收藏
页码:690 / 701
页数:12
相关论文
共 50 条
  • [1] Position Paper: Why Are There So Many Vulnerabilities in Web Applications?
    Du, Wenliang
    Jayaraman, Karthick
    Tan, Xi
    Luo, Tongbo
    Chapin, Steve
    PROCEEDINGS OF THE 2011 NEW SECURITY PARADIGMS WORKSHOP (NSPW'11), 2011, : 83 - 93
  • [2] Patcher: An Online Service for Detecting, Viewing and Patching Web Application Vulnerabilities
    Yu, Fang
    Tung, Yi-Yang
    2014 47TH HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS), 2014, : 4878 - 4886
  • [3] Effective Solutions for Most Common Vulnerabilities in Web Applications
    Aljamea, Moudhi
    Iliopoulos, Costas S.
    Samiruzzaman, M.
    PROCEEDINGS OF SAI INTELLIGENT SYSTEMS CONFERENCE (INTELLISYS) 2016, VOL 2, 2018, 16 : 738 - 754
  • [4] PRACTICAL ELIMINATION OF EXTERNAL INTERACTION VULNERABILITIES IN WEB APPLICATIONS
    Miller, James
    Huynh, Toan
    JOURNAL OF WEB ENGINEERING, 2010, 9 (01): : 1 - 24
  • [5] Automated removal of cross site scripting vulnerabilities in web applications
    Shar, Lwin Khin
    Tan, Flee Beng Kuan
    INFORMATION AND SOFTWARE TECHNOLOGY, 2012, 54 (05) : 467 - 478
  • [6] Commix: automating evaluation and exploitation of command injection vulnerabilities in Web applications
    Stasinopoulos, Anastasios
    Ntantogian, Christoforos
    Xenakis, Christos
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2019, 18 (01) : 49 - 72
  • [7] Commix: automating evaluation and exploitation of command injection vulnerabilities in Web applications
    Anastasios Stasinopoulos
    Christoforos Ntantogian
    Christos Xenakis
    International Journal of Information Security, 2019, 18 : 49 - 72
  • [8] New biostatistics features for detecting web bot activity on web applications
    Rahman, Rizwan Ur
    Tomar, Deepak Singh
    COMPUTERS & SECURITY, 2020, 97
  • [9] Applications for Detecting XSS Attacks on Different Web Platforms
    Baykara, Muhammet
    Guclu, Sebahattin
    2018 6TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSIC AND SECURITY (ISDFS), 2018, : 287 - 292
  • [10] Toward Exploiting Access Control Vulnerabilities within MongoDB Backend Web Applications
    Wen, Shuo
    Xue, Yuan
    Xu, Jing
    Yang, Hongji
    Li, Xiaohong
    Song, Wenli
    Si, Guannan
    PROCEEDINGS 2016 IEEE 40TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS, VOL 1, 2016, : 143 - 153