Toward Exploiting Access Control Vulnerabilities within MongoDB Backend Web Applications

作者: Shuo Wen , Yuan Xue , Jing Xu , Hongji Yang , Xiaohong Li

DOI: 10.1109/COMPSAC.2016.207

关键词: World Wide WebWeb applicationWeb pageWeb application securityWeb modelingData accessNoSQLData modelingSession (web analytics)Access controlDatabaseComputer science

摘要: Access control is an extremely important and error-prone practice during web application. The emergence of NoSQL databases the flexible data models they bring impose new challenges on implementation access within applications. This paper presents Scout, a novel methodology for discovering vulnerabilities in existing Meanwhile (1) features database can be addressed (2) neither application source code nor server-side session information from developers required. implements prototype which targets MongoDB backend By automatically protocol layer stack, Scout introduces operation model precisely representing actions performed application, as well inferring policies. shown to able identify comprehensive applications, generate detailed report facilitator manually fix identified vulnerabilities.

参考文章(23)
Christopher Kruegel, Viktoria Felmetsger, Ludovico Cavedon, Giovanni Vigna, Toward automated detection of logic vulnerabilities in web applications usenix security symposium. pp. 10- 10 ,(2010)
Marco Cova, Davide Balzarotti, Viktoria Felmetsger, Giovanni Vigna, Swaddler: an approach for the anomaly-based detection of state violations in web applications recent advances in intrusion detection. pp. 63- 86 ,(2007) , 10.1007/978-3-540-74320-0_4
Christos Kozyrakis, Nickolai Zeldovich, Michael Dalton, Nemesis: preventing authentication & access control vulnerabilities in web applications usenix security symposium. pp. 267- 282 ,(2009)
Divya Muthukumaran, Dan O'Keeffe, Christian Priebe, David Eyers, Brian Shand, Peter Pietzuch, FlowWatcher: Defending against Data Disclosure Vulnerabilities in Web Applications computer and communications security. pp. 603- 615 ,(2015) , 10.1145/2810103.2813639
Jeff Shute, Radek Vingralek, Bart Samwel, Ben Handy, Chad Whipkey, Eric Rollins, Mircea Oancea, Kyle Littlefield, David Menestrina, Stephan Ellner, John Cieslewicz, Ian Rae, Traian Stancescu, Himani Apte, F1 Proceedings of the VLDB Endowment. ,vol. 6, pp. 1068- 1079 ,(2013) , 10.14778/2536222.2536232
Davide Balzarotti, Marco Cova, Viktoria V. Felmetsger, Giovanni Vigna, Multi-module vulnerability analysis of web-based applications computer and communications security. pp. 25- 35 ,(2007) , 10.1145/1315245.1315250
Prithvi Bisht, Timothy Hinrichs, Nazari Skrupsky, V. N. Venkatakrishnan, WAPTEC Proceedings of the 18th ACM conference on Computer and communications security - CCS '11. pp. 575- 586 ,(2011) , 10.1145/2046707.2046774
Adam Doupé, Bryce Boe, Christopher Kruegel, Giovanni Vigna, Fear the EAR Proceedings of the 18th ACM conference on Computer and communications security - CCS '11. pp. 251- 262 ,(2011) , 10.1145/2046707.2046736
Pierre Payet, Adam Doupé, Christopher Kruegel, Giovanni Vigna, EARs in the wild: large-scale analysis of execution after redirect vulnerabilities acm symposium on applied computing. pp. 1792- 1799 ,(2013) , 10.1145/2480362.2480699
Xiaowei Li, Xujie Si, Yuan Xue, Automated black-box detection of access control vulnerabilities in web applications conference on data and application security and privacy. pp. 49- 60 ,(2014) , 10.1145/2557547.2557552