12.07.2015 Views

Dissecting Java Server Faces for Penetration Testing - SecNiche ...

Dissecting Java Server Faces for Penetration Testing - SecNiche ...

Dissecting Java Server Faces for Penetration Testing - SecNiche ...

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Figure 6: Fuzzing Request / Error in Last Blockattacks when collaboratively used with the JSESSIONID. As we have been discussing,ViewState implementation matters a lot. Now it has become possible tore encrypt the tampered ViewState and deliver it back to the server. EncryptingViewState and sending data over HTTPS are not the protection mechanismsagainst CSRF attacks. This has been widely misunderstood in the developercommunity.4.3.1 Implementing CSRF Protection - The Right WayStrong CSRF implementation in JSF can be implemented as• Applying Anti CSRF filters such as ”org.apache.catalina.filters.CsrfPreventionFilter”.The inbuilt class uses the ”java.util.Random” if explicitly specified by thedeveloper otherwise ”java.security.SecureRandom” will be used by default.One can also use OWASP CSRF Guard to integrate third party filters intoJSF.• If the ViewState session Id is to be used with every request then it mustbe strongly encrypted and an appropriate MAC should be applied in order13

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!