MACE: Detecting Privilege Escalation Vulnerabilities in Web Applications

被引:32
作者
Monshizadeh, Maliheh [1 ]
Naldurg, Prasad [2 ]
Venkatakrishnan, V. N. [1 ]
机构
[1] Univ Illinois, Dept Comp Sci, Chicago, IL 60612 USA
[2] IBM Res India, Bangalore, Karnataka, India
来源
CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY | 2014年
基金
美国国家科学基金会;
关键词
Access Control; Web Security; Authorization;
D O I
10.1145/2660267.2660337
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We explore the problem of identifying unauthorized privilege escalation instances in a web application. These vulnerabilities are typically caused by missing or incorrect authorizations in the server side code of a web application. The problem of identifying these vulnerabilities is compounded by the lack of an access control policy specification in a typical web application, where the only supplied documentation is in fact its source code. This makes it challenging to infer missing checks that protect a web application's sensitive resources. To address this challenge, we develop a notion of authorization context consistency, which is satisfied when a web application consistently enforces its authorization checks across the code. We then present an approach based on program analysis to check for authorization state consistency in a web application. Our approach is implemented in a tool called MACE that uncovers vulnerabilities that could be exploited in the form of privilege escalation attacks. In particular, MACE is the first tool reported in the literature to identify a new class of web application vulnerabilities called Horizontal Privilege Escalation (HPE) vulnerabilities. MACE works on large codebases, and discovers serious, previously unknown, vulnerabilities in 5 out of 7 web applications tested. Without MACE, a comparable human-driven security audit would require weeks of effort in code inspection and testing.
引用
收藏
页码:690 / 701
页数:12
相关论文
共 50 条
  • [21] A Grey-Box Approach for Detecting Malicious User Interactions in Web Applications
    Ben Jaballah, Wafa
    Kheir, Nizar
    MIST'16: PROCEEDINGS OF THE INTERNATIONAL WORKSHOP ON MANAGING INSIDER SECURITY THREATS, 2016, : 1 - 12
  • [22] A Web Second-Order Vulnerabilities Detection Method
    Liu, Miao
    Wang, Bin
    IEEE ACCESS, 2018, 6 : 70983 - 70988
  • [23] A Practical Analysis of TLS Vulnerabilities in Korea Web Environment
    Jeong, Jongmin
    Kwon, Hyunsoo
    Shin, Hyungjune
    Hur, Junbeom
    INFORMATION SECURITY APPLICATIONS, WISA 2016, 2017, 10144 : 112 - 123
  • [24] Access Control Vulnerabilities Detection for Web Application Components
    Wang, Qian
    Sun, Jinan
    Wang, Chen
    Zhang, Shikun
    Xuanyuan, Sisi
    Zheng, Bin
    2020 IEEE 6TH INT CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY) / 6TH IEEE INT CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING, (HPSC) / 5TH IEEE INT CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2020, : 24 - 28
  • [25] AChecker: Statically Detecting Smart Contract Access Control Vulnerabilities
    Ghaleb, Asem
    Rubin, Julia
    Pattabiraman, Karthik
    2023 IEEE/ACM 45TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ICSE, 2023, : 945 - 956
  • [26] Access Control Architecture Separating Privilege by a Thread on a Web Server
    Matsumoto, Ryosuke
    Okabe, Yasuo
    2012 IEEE/IPSJ 12TH INTERNATIONAL SYMPOSIUM ON APPLICATIONS AND THE INTERNET (SAINT), 2012, : 178 - 183
  • [27] Deep learning trends and future perspectives of web security and vulnerabilities
    Chughtai, Muhammad Saad
    Bibi, Irfana
    Karim, Shahid
    Shah, Syed Wajid Ali
    Laghari, Asif Ali
    Khan, Abdullah Ayub
    JOURNAL OF HIGH SPEED NETWORKS, 2024, 30 (01) : 115 - 146
  • [28] UChecker: Automatically Detecting PHP-Based Unrestricted File Upload Vulnerabilities
    Huang, Jin
    Li, Yu
    Zhang, Junjie
    Dai, Rui
    2019 49TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN 2019), 2019, : 581 - 592
  • [29] A Secured Framework for Geographical Information Applications on Web
    Ibrahim, Mennatallah H.
    Hefny, Hesham A.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2014, 5 (02) : 21 - 25
  • [30] Research and implementation of Detecting Cross-Site Scripting Vulnerabilities Based on Crawler
    Zhen Wu
    Min Wang
    Sheng Wu
    PROCEEDINGS OF 2010 ASIA-PACIFIC YOUTH CONFERENCE ON COMMUNICATION, VOLS 1 AND 2, 2010, : 292 - +