19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Figure 14-2:<br />

Using<br />

Firefox Web<br />

Developer<br />

to reset<br />

form field<br />

lengths.<br />

Chapter 14: Websites and Applications<br />

URL manipulation<br />

An automated input attack manipulates a URL and sends it back to the<br />

server, telling the web application to do various things, such as redirect to<br />

third-party sites, load sensitive files off the server, and so on. Local file inclusion<br />

is one such vulnerability. This is when the web application accepts URLbased<br />

input and returns the specified file’s contents to the user. For example,<br />

in one situation, WebInspect sent something similar to the following request<br />

and returned the Linux server’s passwd file:<br />

https://www.your_web_app.com/onlineserv/Checkout.<br />

cgi?state=<br />

detail&language=english&imageSet=/../..//../..//../..//../<br />

..///etc/passwd<br />

The following links demonstrate another example of URL trickery called URL<br />

redirection:<br />

http://www.your_web_app.com/error.aspx?PURL=http://www.<br />

bad~site.com&ERROR=Path+’OPTIONS’+is+forbidden.<br />

http://www.your_web_app.com/exit.asp?URL=http://www.<br />

bad~site.com<br />

285

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!