@jwalsh

FAITH: Scanning of Rich Web Applications for Parameter Tampering Vulnerabilities

, , and . (2012)cite arxiv:1204.1216Comment: 10 pages, 2 tables, 3 figures.

Abstract

Modern HTML forms are designed to generate form controls dynamically and to submit them over AJAX; this is as a result of recent advances in Javascript programming techniques. Existing scanners are constrained by interacting only with traditional forms, and vulnerabilities are often left undetected even after scrutiny. In this paper, we demonstrate how we have overcome a number of client-side challenges that make automated fuzzing of form submissions difficult and unfaithful. We have built FAITH, a pragmatic scanner for uncovering parameter tampering vulnerabilities in real-world rich web applications. It is the first scanner that enables fuzzing in most kinds of form submissions while faithfully preserving the required user actions, HTML 5, AJAX, anti-CSRF tokens and dynamic form updates. The importance of this work is demonstrated by the severe vulnerabilities uncovered, including a way to bypass the most-trusted One-Time Password (OTP) in one of the largest multinational banks. These vulnerabilities cannot be detected by existing scanners.

Description

FAITH: Scanning of Rich Web Applications for Parameter Tampering Vulnerabilities

Links and resources

Tags

community

  • @jwalsh
  • @dblp
@jwalsh's tags highlighted