11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 13: Building Secure Remoted Components 349<strong>Threats</strong> <strong>and</strong> CountermeasuresTo build secure solutions that use remoting technology, you need to know theassociated threats. The top threats to components that use remoting are:● Unauthorized access● Network eavesdropping● Parameter manipulation● SerializationFigure 13.2 shows these threats.UnauthorizedAccessParameterManipulationClientRemotingSerializationNetworkEavesdroppingFigure 13.2Main remoting threatUnauthorized AccessRemote components that provide sensitive or restricted information shouldauthenticate <strong>and</strong> authorize their callers to prevent unauthorized access. Weakauthentication <strong>and</strong> authorization can be exploited to gain unauthorized access tosensitive information <strong>and</strong> operations.VulnerabilitiesVulnerabilities that make your remoting solution susceptible to unauthorized accessinclude:● No application level authentication because a custom Windows service hostis used● No IPSec policies to restrict which computers can communicate with themiddle-tier application server that hosts the remote components● No role-based authorization● No file authorization to restrict access to remoting endpoints● Trusting IPrincipal objects passed from the client

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!