Parameter Delimiter

Revision as of 06:10, 26 May 2009 by Deleted user (Talk | contribs)

Jump to: navigation, search

[ classic car california antique auto ] [ automotive car dealer truck used ] [ auto shipping canada to us ] [ symantec antivirus corporate edition 10.1 0.394 ] [ asian ts pics ] index [ panda antivirus titanium 2004 keygen ] [ inline autocomplete ] [ auto heating system repair ] [ african baskets history ] [ australian cattle dog pups for sale ] webmap [ us 1 auto part ] [ auto cleaning use window ] norton antivirus download [ mcafee antivirus 2005 keygen ] [ mdaemon antivirus keygen ] [ eagle eyes auto lamps ] [ oh africa my soul cries out to you ] [ chase auto finance corp ] [ military discount auto parts ] page [ south africa embassy in nigeria ] [ durban country club south africa ] [ norton antivirus free edition ] [ african gift items ] http australian hotel rocks [ australian continent map ] [ australia country musc dvd ] [ pc cillan antivirus ] [ acanasia ] [ asia source yahoo ] [ australian shepherd nationals ] [ sumeet asia kitchen machine ] [ clam antivirus ] [ australias city populations ] [ auto dealers in denver ] url domain [ asian yabb ] link [ south african schools list ] top [ iowa auto dealer license ] [ 1994 cadillac automatic transmission ] [ australian teen magazines ] [ paper rose boxes from asia ] [ automotive rhythm ]

This is an Attack. To view all attacks, please see the Attack Category page.

Last revision (mm/dd/yy): 05/26/2009


This attack is based on the manipulation of parameter delimiters used by web application input vectors in order to cause unexpected behaviors like access control and authorization bypass and information disclosure, among others.

Risk Factors



In order to illustrate this vulnerability, we will use a vulnerability found on Poster V2, a posting system based on PHP programming language.

This application has a dangerous vulnerability that allows inserting data into user fields (username, password, email address and privileges) in “mem.php” file, which is responsible for managing the application user.

An example of the file “mem.php”, where user Jose has admin privileges and Alice user access:


When a user wants to edit his profile, he must use the "edit account” option in the “index.php” page and enter his login information. However, using “|” as a parameter delimiter on email field followed by “admin”, the user could elevate his privileges to administrator. Example:

Username: Alice
Password: 87654321
Email: |admin| 

This information will be recorded in “mem.php” file like this:


In this case, the last parameter delimiter considered is “|admin|” and the user could elevate his privileges by assigning administrator profile.

Although this vulnerability doesn’t allow manipulation of other users' profiles, it allows privilege escalation for application users.

Related Threat Agents

Related Attacks

Related Vulnerabilities

Related Controls