11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 16: Securing Your <strong>Web</strong> Server 425Arbitrary Code ExecutionCode execution attacks occur when an attacker runs malicious code on your servereither to compromise server resources or to mount additional attacks againstdownstream systems.VulnerabilitiesVulnerabilities that can lead to malicious code execution include:● Weak IIS configuration● Unpatched serversAttacksCommon code execution attacks include:● Path traversal●Buffer overflow leading to code injectionCountermeasuresCountermeasures include configuring IIS to reject URLs with “../” to prevent pathtraversal, locking down system comm<strong>and</strong>s <strong>and</strong> utilities with restrictive access controllists (ACLs), <strong>and</strong> installing new patches <strong>and</strong> updates.Elevation of PrivilegesElevation of privilege attacks occur when an attacker runs code by using a privilegedprocess account.VulnerabilitiesCommon vulnerabilities that make your <strong>Web</strong> server susceptible to elevation ofprivilege attacks include:● Over-privileged process accounts● Over-privileged service accountsCountermeasuresCountermeasures include running processes using least privileged accounts <strong>and</strong>using least privileged service <strong>and</strong> user accounts.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!