Broken Access Control

[http://s1.shard.jp/olharder/agencias-auto.html auto nj part store ] [http://s1.shard.jp/bireba/antivirus-f-prot.html avg antivirus free version ] [http://s1.shard.jp/bireba/unistalling-norton.html panda antivirus program ] wholesale australian crystals [http://s1.shard.jp/galeach/new83.html anastasia left outside alone mp3 ] [http://s1.shard.jp/losaul/little-tykes-toys.html telstraclear australia ] [http://s1.shard.jp/olharder/cheat-sheets.html used tomy autoclave ] [http://s1.shard.jp/bireba/symantec-antivirus.html how to completely remove norton antivirus 2004 ] map [http://s1.shard.jp/losaul/australian-music.html katrina australians ] [http://s1.shard.jp/bireba/norotn-antivirus.html norton antivirus 2005 product keygen ] [http://s1.shard.jp/olharder/arena-auto-auction.html 2002 auto cad download free ] [http://s1.shard.jp/bireba/antivirus-software.html panda antivirus platinum 7.04.00 crack ] url [http://s1.shard.jp/olharder/browning-semi.html automotive spray booth fan ] [http://s1.shard.jp/bireba/download-symantec.html norton antivirus update crack ] [http://s1.shard.jp/bireba/notron-antivirus.html rav antivirus updates ] [http://s1.shard.jp/frhorton/po4uhk6ve.html african american audio book ] [http://s1.shard.jp/frhorton/yvqavqw7n.html african american heritage museum of southern ] [http://s1.shard.jp/galeach/new114.html gold buyers in asia ] [http://s1.shard.jp/galeach/new25.html dysplasia hip human pain ] [http://s1.shard.jp/galeach/new109.html marubeni itochu tubulars asia pte ltd ] map symantec antivirus 9.0 business pack [http://s1.shard.jp/losaul/map-of-whitsunday.html australian fish ] [http://s1.shard.jp/losaul/professionals.html australian pocahontas ] [http://s1.shard.jp/olharder/prestige-auto.html 2006 used auto prices ] [http://s1.shard.jp/losaul/police-federation.html time difference australia ] [http://s1.shard.jp/bireba/guard-antivirus.html kaspersky antivirus software ] [http://s1.shard.jp/losaul/nikon-d70-price.html caravan parks for sale in australia ] [http://s1.shard.jp/bireba/noton-antivirus.html antivirus review best ] [http://s1.shard.jp/olharder/12-auto-become-br.html auto columbus georgia in part used ] [http://s1.shard.jp/losaul/australia-food-product.html australia chronic fatigue syndrome ] [http://s1.shard.jp/frhorton/tiwomyd3z.html dogon mali africa ] [http://s1.shard.jp/galeach/new158.html asian leopard cat for sale ] [http://s1.shard.jp/bireba/escan-antivirus.html symbian antivirus software ] african art london [http://s1.shard.jp/bireba/shield-2005-pro.html norton antivirus 2005 cracked ] [http://s1.shard.jp/bireba/ez-antivirus.html winantiviruspro reviews ] [http://s1.shard.jp/olharder/auto-tune-demo.html automatic watering bowls plastic or pvc ] seasonal weather in australia [http://s1.shard.jp/frhorton/1euh2vemn.html african methodist episcopal church in canada ] [http://s1.shard.jp/bireba/antivirus-small.html house call antivirus free ] [http://s1.shard.jp/bireba/etrust-antivirus.html norton antivirus 2005 serial keys ] [http://s1.shard.jp/frhorton/te8ykt7rl.html africa waterfalls ] [http://s1.shard.jp/losaul/rowing-clothing.html williamson cruise ship australia ] webmap [http://s1.shard.jp/bireba/eztrust-antivirus.html norton antivirus 2005 keygen by tmg ] [http://s1.shard.jp/olharder/concession-auto.html honda autosport ] http://www.textc4tzell.com

Description
Access control, sometimes called authorization, is how a web application grants access to content and functions to some users and not others. These checks are performed after authentication, and govern what Ã¢ÂÂauthorizedÃ¢ÂÂ users are allowed to do. Access control sounds like a simple problem but is insidiously difficult to implement correctly. A web applicationÃ¢ÂÂs access control model is closely tied to the content and functions that the site provides. In addition, the users may fall into a number of groups or roles with different abilities or privileges.

Developers frequently underestimate the difficulty of implementing a reliable access control mechanism. Many of these schemes were not deliberately designed, but have simply evolved along with the web site. In these cases, access control rules are inserted in various locations all over the code. As the site nears deployment, the ad hoc collection of rules becomes so unwieldy that it is almost impossible to understand.

Many of these flawed access control schemes are not difficult to discover and exploit. Frequently, all that is required is to craft a request for functions or content that should not be granted. Once a flaw is discovered, the consequences of a flawed access control scheme can be devastating. In addition to viewing unauthorized content, an attacker might be able to change or delete content, perform unauthorized functions, or even take over site administration.

One specific type of access control problem is administrative interfaces that allow site administrators to manage a site over the Internet. Such features are frequently used to allow site administrators to efficiently manage users, data, and content on their site. In many instances, sites support a variety of administrative roles to allow finer granularity of site administration. Due to their power, these interfaces are frequently prime targets for attack by both outsiders and insiders.

Environments Affected
All known web servers, application servers, and web application environments are susceptible to at least some of these issues. Even if a site is completely static, if it is not configured properly, hackers could gain access to sensitive files and deface the site, or perform other mischief.

Examples and References

 * OWASP Guide to Building Secure Web Applications and Web Services, Chapter 8: Access Control
 * Access Control (aka Authorization) in Your J2EE Application http://www.owasp.org/columns/jwilliams/jwilliams3.html
 * http://www.infosecuritymag.com/2002/jun/insecurity.shtml

How to Determine If You Are Vulnerable
Virtually all sites have some access control requirements. Therefore, an access control policy should be clearly documented. Also, the design documentation should capture an approach for enforcing this policy. If this documentation does not exist, then a site is likely to be vulnerable.

The code that implements the access control policy should be checked. Such code should be well structured, modular, and most likely centralized. A detailed code review should be performed to validate the correctness of the access control implementation. In addition, penetration testing can be quite useful in determining if there are problems in the access control scheme.

Find out how your website is administrated. You want to discover how changes are made to webpages, where they are tested, and how they are transported to the production server. If administrators can make changes remotely, you want to know how those communications channels are protected. Carefully review each interface to make sure that only authorized administrators are allowed access. Also, if there are different types or groupings of data that can be accessed through the interface, make sure that only authorized data can be accessed as well. If such interfaces employ external commands, review the use of such commands to make sure they are not subject to any of the command injection flaws described in this paper.

How to Protect Yourself
The most important step is to think through an applicationÃ¢ÂÂs access control requirements and capture it in a web application security policy. We strongly recommend the use of an access control matrix to define the access control rules. Without documenting the security policy, there is no definition of what it means to be secure for that site. The policy should document what types of users can access the system, and what functions and content each of these types of users should be allowed to access. The access control mechanism should be extensively tested to be sure that there is no way to bypass it. This testing requires a variety of accounts and extensive attempts to access unauthorized content or functions.

Some specific access control issues include:


 * Insecure IdÃ¢ÂÂs Ã¢ÂÂ Most web sites use some form of id, key, or index as a way to reference users, roles, content, objects, or functions. If an attacker can guess these idÃ¢ÂÂs, and the supplied values are not validated to ensure the are authorized for the current user, the attacker can exercise the access control scheme freely to see what they can access. Web applications should not rely on the secrecy of any idÃ¢ÂÂs for protection.
 * Forced Browsing Past Access Control Checks Ã¢ÂÂ many sites require users to pass certain checks before being granted access to certain URLs that are typically Ã¢ÂÂdeeperÃ¢ÂÂ down in the site. These checks must not be bypassable by a user that simply skips over the page with the security check.
 * Path Traversal Ã¢ÂÂ This attack involves providing relative path information (e.g., Ã¢ÂÂ../../target_dir/target_fileÃ¢ÂÂ) as part of a request for information. Such attacks try to access files that are normally not directly accessible by anyone, or would otherwise be denied if requested directly. Such attacks can be submitted in URLs as well as any other input that ultimately accesses a file (i.e., system calls and shell commands).
 * File Permissions Ã¢ÂÂ Many web and application servers rely on access control lists provided by the file system of the underlying platform. Even if almost all data is stored on backend servers, there are always files stored locally on the web and application server that should not be publicly accessible, particularly configuration files, default files, and scripts that are installed on most web and application servers. Only files that are specifically intended to be presented to web users should be marked as readable using the OSÃ¢ÂÂs permissions mechanism, most directories should not be readable, and very few files, if any, should be marked executable.
 * Client Side Caching Ã¢ÂÂ Many users access web applications from shared computers located in libraries, schools, airports, and other public access points. Browsers frequently cache web pages that can be accessed by attackers to gain access to otherwise inaccessible parts of sites. Developers should use multiple mechanisms, including HTTP headers and meta tags, to be sure that pages containing sensitive information are not cached by userÃ¢ÂÂs browsers.

There are some application layer security components that can assist in the proper enforcement of some aspects of your access control scheme. Again, as for parameter validation, to be effective, the component must be configured with a strict definition of what access requests are valid for your site. When using such a component, you must be careful to understand exactly what access control assistance the component can provide for you given your siteÃ¢ÂÂs security policy, and what part of your access control policy that the component cannot deal with, and therefore must be properly dealt with in your own custom code.

For administrative functions, the primary recommendation is to never allow administrator access through the front door of your site if at all possible. Given the power of these interfaces, most organizations should not accept the risk of making these interfaces available to outside attack. If remote administrator access is absolutely required, this can be accomplished without opening the front door of the site. The use of VPN technology could be used to provide an outside administrator access to the internal company (or site) network from which an administrator can then access the site through a protected backend connection.