@jwalsh

FAITH: Scanning of Rich Web Applications for Parameter Tampering Vulnerabilities

, , und . (2012)cite arxiv:1204.1216Comment: 10 pages, 2 tables, 3 figures.

Zusammenfassung

Modern HTML forms are designed to generate form controls dynamically and to submit them over AJAX; this is as a result of recent advances in Javascript programming techniques. Existing scanners are constrained by interacting only with traditional forms, and vulnerabilities are often left undetected even after scrutiny. In this paper, we demonstrate how we have overcome a number of client-side challenges that make automated fuzzing of form submissions difficult and unfaithful. We have built FAITH, a pragmatic scanner for uncovering parameter tampering vulnerabilities in real-world rich web applications. It is the first scanner that enables fuzzing in most kinds of form submissions while faithfully preserving the required user actions, HTML 5, AJAX, anti-CSRF tokens and dynamic form updates. The importance of this work is demonstrated by the severe vulnerabilities uncovered, including a way to bypass the most-trusted One-Time Password (OTP) in one of the largest multinational banks. These vulnerabilities cannot be detected by existing scanners.

Beschreibung

FAITH: Scanning of Rich Web Applications for Parameter Tampering Vulnerabilities

Links und Ressourcen

Tags

Community

  • @jwalsh
  • @dblp
@jwalshs Tags hervorgehoben