Server capabilities
New server products to add features , such as
server-side Javascript , server plugins and database connectivity that increase
the overall complexity of the server software. While the webmaster looks at the
capabilities of a web server and visualizes all of the ways in which these
capabilities could be used to build a better Web site, the penetrator examines
each capability in terms of how it could be used to circumvent, defeat ,and
disable the security of the server as a whole.
Server - side includes are examples of server
features that are also a bonus to the penetrator. A server side include is a
sequence of commands that is embedded in an HTML document. When a web server
requests the document , the server scans the document for the embedded commands
and executes them.
The results of the common execution are used to
update the HTML document before it is sent to the browser. One of the commands,
exec, allows arbitrary operating system commands to be executed. This
capability is very powerful both for you and the penetrator. When server side
includes are enabled, a person with minimal web publishing capabilities gains
the extra privilege of being able to execute operating system commands.
The best way to avoid security
vulnerabilities with new server
Features is to access the capabilities provided by
each feature and determine which once pose acceptable security risks. Minimally,
you must consider the following to be risks:
]The feature can
be used to execute external programs or operating system commands
]The feature can
be used to read or write arbitrary files located on the server.
]The features
maintains client information on the browser using cookies or URL encoding.
The above risks only determine whether the features has the capability
to cause security problems it doesn't mean that he feature is necessarily
insecure. For example , CGI programs, ASP, and Live Wire applications are risky
according to all three risk indicators. Once you identify a feature as risky,
you have to determine whether secure applications can be built using the
features despite its inherent risks and whether the benefits provided by the
feature are worth taking a chance. In the case of CCI programs , ASP, and live
wire applications, the answer is usually yes.
CGI Programs
There is nothing inherently about CGI itself. However, CGI programs are
a prime source of server-side vulnerabilities . By deploying a CGI program, you
are allowing others to execute program is a potential tool with which to attack
your system. Any Security flaws in your CGI programs are directly and
continually Accessible, and penetrators are free to repeatedly probe and cajole
these flaws until they succeed in accomplishing there clandestine objectives.
Do flaws exist in CGI programs? you bet. Some flaws let attackers read
data that should otherwise be concealed. Other flaws let Hackers trash data
that is collected from web users. The most Devastating flaws let penetrators
remotely execute operating system commands and programs of their choosing.
How do flaws in CGI programs occur? How are they exploited? In many
cases , these flaws occur because of poor parameter checking and faulty
assumptions on the part of the programmer.
For example, consider the case where a CGI program invokes a search
program and passes it the value of a decoded query string. The programmer
assumes that the search program will simply search for whatever value is passed
. But when the query string passed, the following in executed:
search string ;
cat/etc/passwd
In this case, the CGI program returns much more than the search results
it appends the contents of your password file to the search results. The penetrator
can then use a password cracking program to find a password to find a password
that will let him or her log into your system.
You may wonder why anyone would develop CGI programs that would allow
such serious breaches of security. Some programmers don't know any better-they
are oblivious to the fact that their programs may be misused. Some are so
focused on developing their web applications that security is put on the back
burner-permanently.
However, the biggest problem, by jar , is that in most CGI programs,
security flaws are difficult to spot. In the cases where they are found, they
are often dismissed. "But no one would ever do that" is a common
justification for falling to remove an exploitable flaw.
Another facing CGI programmers is the fact that the odds are heavily
stacked against them.
The programmers must eliminate all possible security flaws in order to
make their CGI programs secure. The penetrator need only find a single
exploitable flaw in order to break into the Web Server.

No comments:
Post a Comment