MACE: Detecting Privilege Escalation Vulnerabilities in Web Applications

被引:32
作者
Monshizadeh, Maliheh [1 ]
Naldurg, Prasad [2 ]
Venkatakrishnan, V. N. [1 ]
机构
[1] Univ Illinois, Dept Comp Sci, Chicago, IL 60612 USA
[2] IBM Res India, Bangalore, Karnataka, India
来源
CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY | 2014年
基金
美国国家科学基金会;
关键词
Access Control; Web Security; Authorization;
D O I
10.1145/2660267.2660337
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We explore the problem of identifying unauthorized privilege escalation instances in a web application. These vulnerabilities are typically caused by missing or incorrect authorizations in the server side code of a web application. The problem of identifying these vulnerabilities is compounded by the lack of an access control policy specification in a typical web application, where the only supplied documentation is in fact its source code. This makes it challenging to infer missing checks that protect a web application's sensitive resources. To address this challenge, we develop a notion of authorization context consistency, which is satisfied when a web application consistently enforces its authorization checks across the code. We then present an approach based on program analysis to check for authorization state consistency in a web application. Our approach is implemented in a tool called MACE that uncovers vulnerabilities that could be exploited in the form of privilege escalation attacks. In particular, MACE is the first tool reported in the literature to identify a new class of web application vulnerabilities called Horizontal Privilege Escalation (HPE) vulnerabilities. MACE works on large codebases, and discovers serious, previously unknown, vulnerabilities in 5 out of 7 web applications tested. Without MACE, a comparable human-driven security audit would require weeks of effort in code inspection and testing.
引用
收藏
页码:690 / 701
页数:12
相关论文
共 50 条
  • [31] Towards a Lightweight, Hybrid Approach for Detecting DOM XSS Vulnerabilities with Machine Learning
    Melicher, William
    Fung, Clement
    Bauer, Lujo
    Jia, Limin
    PROCEEDINGS OF THE WORLD WIDE WEB CONFERENCE 2021 (WWW 2021), 2021, : 2684 - 2695
  • [32] TEXT-MINING AND PATTERN-MATCHING BASED PREDICTION MODELS FOR DETECTING VULNERABLE FILES IN WEB APPLICATIONS
    Gupta, Mukesh Kumar
    Govil, Mahesh Chandra
    Singh, Girdhari
    JOURNAL OF WEB ENGINEERING, 2018, 17 (1-2): : 28 - 44
  • [33] Hybrid Authentication and Authorization Model for Web based Applications
    Indu, I.
    Anand, P. M. Rubesh
    PROCEEDINGS OF THE 2016 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET), 2016, : 1187 - 1191
  • [34] Web-based authorization based on X.509 Privilege Management Infrastructure
    Forné, J
    Hinarejos, MF
    2003 IEEE PACIFIC RIM CONFERENCE ON COMMUNICATIONS, COMPUTERS, AND SIGNAL PROCESSING, VOLS 1 AND 2, CONFERENCE PROCEEDINGS, 2003, : 565 - 568
  • [35] DISOV: Discovering Second-Order Vulnerabilities Based on Web Application Property Graph
    Chen, Yu
    Pan, Zulie
    Chen, Yuanchao
    LI, Yuwei
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2023, E106A (02) : 133 - 145
  • [36] Detecting Malicious Web Requests Using an Enhanced TextCNN
    Yu, Lian
    Chen, Lihao
    Dong, Jingtao
    Li, Mengyuan
    Liu, Lijun
    Zhao, Bai
    Zhang, Chen
    2020 IEEE 44TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE (COMPSAC 2020), 2020, : 768 - 777
  • [37] DISOV: Discovering Second-Order Vulnerabilities Based on Web Application Property Graph
    Chen, Yu
    Pan, Zulie
    Chen, Yuanchao
    Li, Yuwei
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2022, E105 (08)
  • [38] A method for identifying Web applications
    Mario Kozina
    Marin Golub
    Stjepan Groš
    International Journal of Information Security, 2009, 8 : 455 - 467
  • [39] A method for identifying Web applications
    Kozina, Mario
    Golub, Marin
    Gros, Stjepan
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2009, 8 (06) : 455 - 467
  • [40] Security of Web Applications with short web service : a review Study
    Ajay, Anadi
    Jaiswal, Arunima
    Verma, Kritika
    2015 5TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING & COMMUNICATION TECHNOLOGIES ACCT 2015, 2015, : 569 - 574