11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 2: <strong>Threats</strong> <strong>and</strong> Countermeasures 23Arbitrary Code ExecutionIf an attacker can execute malicious code on your server, the attacker can eithercompromise server resources or mount further attacks against downstream systems.The risks posed by arbitrary code execution increase if the server process underwhich the attacker’s code runs is over-privileged. Common vulnerabilities includeweak IID configuration <strong>and</strong> unpatched servers that allow path traversal <strong>and</strong> bufferoverflow attacks, both of which can lead to arbitrary code execution.Countermeasures to help prevent arbitrary code execution include:● Configure IIS to reject URLs with “../” to prevent path traversal.● Lock down system comm<strong>and</strong>s <strong>and</strong> utilities with restricted ACLs.● Stay current with patches <strong>and</strong> updates to ensure that newly discovered bufferoverflows are speedily patched.Unauthorized AccessInadequate access controls could allow an unauthorized user to access restrictedinformation or perform restricted operations. Common vulnerabilities include weakIIS <strong>Web</strong> access controls, including <strong>Web</strong> permissions <strong>and</strong> weak NTFS permissions.Countermeasures to help prevent unauthorized access include:● Configure secure <strong>Web</strong> permissions.● Lock down files <strong>and</strong> folders with restricted NTFS permissions.● Use .NET Framework access control mechanisms within your ASP.NETapplications, including URL authorization <strong>and</strong> principal permission dem<strong>and</strong>s.<strong>Application</strong> <strong>Threats</strong> <strong>and</strong> CountermeasuresA good way to analyze application-level threats is to organize them by applicationvulnerability category. The various categories used in the subsequent sections of thischapter <strong>and</strong> throughout the guide, together with the main threats to your application,are summarized in Table 2.2.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!