D 14 2009 Dec 14 2009 Katharina Siorpaes · software that promotes understanding of web application...

15
1 Web Engineering Web Application Security Issues D 14 2009 © Copyright 2009 STI - INNSBRUCK www.sti-innsbruck.at Dec 14 2009 Katharina Siorpaes It is NOT Network Security It is securing: It is securing: 3 “Custom Code” that drives a web application 3 Libraries 3 Backend Systems 3 Web and Application servers Web Engineering

Transcript of D 14 2009 Dec 14 2009 Katharina Siorpaes · software that promotes understanding of web application...

Page 1: D 14 2009 Dec 14 2009 Katharina Siorpaes · software that promotes understanding of web application security. F if htt // ... security. 9The OWASP top ten represents a broad consensus

1

Web EngineeringWeb Application Security Issues

D 14 2009

© Copyright 2009 STI - INNSBRUCK www.sti-innsbruck.at

Dec 14 2009Katharina Siorpaes

• It is NOT Network Security• It is securing:• It is securing:

“Custom Code” that drives a web applicationLibrariesBackend SystemsWeb and Application servers

Web Engineering

Page 2: D 14 2009 Dec 14 2009 Katharina Siorpaes · software that promotes understanding of web application security. F if htt // ... security. 9The OWASP top ten represents a broad consensus

2

Application LayerAttacker sends attacks inside valid HTTP requests

Your custom code is trickedtaba

ses

cy S

yste

ms

b Se

rvic

esec

torie

san

Res

rcs

Bill

ing

tion

Laye

r

ccou

nts

Fina

nce

min

istr

atio

nns

actio

nsm

unic

atio

nle

dge

Mgm

tC

omm

erce

Func

tions

Your custom code is tricked into doing something it should not

Security requires software development expertise, not signatures

Network LayerFirewall, hardening, patching, IDS and SSL cannot detect or

Web Server

App Server

Dat

Lega

cW

eb Dir

Hum

a B

Custom Code

APPLICATIONATTACK

erAp

plic

at Ac FAd

mTr

anC

omm

Kno

wE-

CB

us.

Web Engineering

IDS, and SSL cannot detect or stop attacks inside HTTP requests.

Security relies on signature databasesFi

rew

all

Hardened OS

Fire

wal

l

Net

wor

k La

ye

Insider

How likely is a successful web applicationHow likely is a successful web application attack?Consequences?Web Application Security is just as important as Network Security

Web Engineering

Page 3: D 14 2009 Dec 14 2009 Katharina Siorpaes · software that promotes understanding of web application security. F if htt // ... security. 9The OWASP top ten represents a broad consensus

3

Need for Securing Web Sites/Applications

Defaced Sites Reported on the Internet

Defacement reasons

Application Vulnerability

Site owner authored (accidental/intentional)

Web Engineering 12/7/2007

Web Server Misconfiguration

Corporate Security

Internet

Web Engineering 12/7/2007

Server(Data)

Workstations(Green Segment)

Firewall!!!!!!!!!!!!

Wild Wild West

Page 4: D 14 2009 Dec 14 2009 Katharina Siorpaes · software that promotes understanding of web application security. F if htt // ... security. 9The OWASP top ten represents a broad consensus

4

Security at Network and Transport layer

Port 23Port 139

INTERNET

Port 21Port 80/8080

Securing traditionally was not enoughN t k C t l l iti t t ffi

Web Engineering

12/7/2007

Network Controls – legitimate trafficAbove 70% attacks at the application level

Web ApplicationA web application is generally

i d f ll ti f i t comprised of a collection of scripts , that reside on a web server and interact with a database and other sources of dynamic content.

Runs generally at port 80/8080

Attacks Undetected

Web Engineering 12/7/2007

Attacks UndetectedData as part of legitimate traffic on port 80/8080 go undetected.

Conventional Network devices and Firewalls cannot distinguish bad data from the genuine data

Page 5: D 14 2009 Dec 14 2009 Katharina Siorpaes · software that promotes understanding of web application security. F if htt // ... security. 9The OWASP top ten represents a broad consensus

5

Web Application Security

Refers to the combination of People, Processes and TechnologyProcesses and Technology

Identify, Measure and Manage the risks

Presented by Open source and

Web Engineering 12/7/2007

custom web applications

Risks identified in applications

A malicious user can log in without a valid account.An unauthorised user view, add, update, delete data.An authenticated user can Add/Update data as another user.A malicious user can upload malicious

t t

Web Engineering 12/7/2007

contents.A malicious user can steal user credentials.

Page 6: D 14 2009 Dec 14 2009 Katharina Siorpaes · software that promotes understanding of web application security. F if htt // ... security. 9The OWASP top ten represents a broad consensus

6

People Processes Technology

•Awareness •Training •Guidelines

•Secure Development

•Secure code Review

•Security Testing

•Secure •Application •Automated

Web Engineering

Secure Configuration

Application Firewalls

Automated Scanners

Web Application Security Standards

OWASP (Open Web Application Security Project)Security Project)WASC ( Web Application Security Consortium)

Web Engineering 12/7/2007

Page 7: D 14 2009 Dec 14 2009 Katharina Siorpaes · software that promotes understanding of web application security. F if htt // ... security. 9The OWASP top ten represents a broad consensus

7

OWASP

The Open Web Application Security Project The Open Web Application Security Project is a project dedicated to sharing knowledge and developing open source software that promotes understanding of web application security.

F i f htt //

Web Engineering 12/7/2007

For more info see http://www.owasp.org

OWASP Top 10

WASC

Is an international group of experts, titi d i ti l practitioners and organizational

representatives who produce open source and widely agreed upon best practice security standards for the world wide web.

http://www.webappsec.org

Web Engineering 12/7/2007

Web Hacking Incidents Database

Web Security Threat classification

Page 8: D 14 2009 Dec 14 2009 Katharina Siorpaes · software that promotes understanding of web application security. F if htt // ... security. 9The OWASP top ten represents a broad consensus

8

OWASP Top Ten Project

It Provides a minimum standard for web application security.security.

The OWASP top ten represents a broad consensus about what the most critical web applications vulnerabilities are.

Adopter

US Federal Trade commission US DOD VISA

Web Engineering 12/7/2007

US Federal Trade commission, US DOD , VISA

Other companies including Sprint, IBM etc..

OWASP Top Ten Most Critical Web Application Vulnerabilities

A1 - Unvalidated InputInformation from Web requests is not validated before being used by a Web application. Attackers can use these flaws to attack backend components through a Web application.

Web Engineering 12/7/2007

Page 9: D 14 2009 Dec 14 2009 Katharina Siorpaes · software that promotes understanding of web application security. F if htt // ... security. 9The OWASP top ten represents a broad consensus

9

OWASP Top Ten Most Critical Web Application Vulnerabilities

A2 -Broken Access ControlRestrictions on what authenticated users are allowed to do are not properly enforced. Attackers can exploit these flaws to access other users' accounts, view sensitive files, or use unauthorized functions.

Web Engineering 17

OWASP Top Ten Most Critical Web Application Vulnerabilities

A3 - Broken Authentication and Session ManagementAccount credentials and session tokens are not properly protected. Attackers that can compromise passwords, keys, session cookies, or other tokens can defeat authentication restrictions and assume other users' identities.

Web Engineering 18

Page 10: D 14 2009 Dec 14 2009 Katharina Siorpaes · software that promotes understanding of web application security. F if htt // ... security. 9The OWASP top ten represents a broad consensus

10

OWASP Top Ten Most Critical Web Application Vulnerabilities

A4 - Cross Site Scripting (XSS) FlawsThe Web application can be used as a mechanism to transport an attack to an end user's browser. A successful attack can disclose the end user's session token, attack the local machine, or spoof content to fool the user.

Web Engineering 19

OWASP Top Ten Most Critical Web Application Vulnerabilities

A5 - Buffer OverflowWeb application components in some languages that do not properly validate input can be crashed and, in some cases, used to take control of a process. These components can include CGI, libraries, drivers, and Web application server components.

Web Engineering 20

Page 11: D 14 2009 Dec 14 2009 Katharina Siorpaes · software that promotes understanding of web application security. F if htt // ... security. 9The OWASP top ten represents a broad consensus

11

OWASP Top Ten Most Critical Web Application Vulnerabilities

A6 - Injection FlawsWeb applications pass parameters when they access external systems or the local operating system. If an attacker can embed malicious commands in these parameters, the external system may execute those commands on behalf of the web application.

Web Engineering 21

OWASP Top Ten Most Critical Web Application Vulnerabilities

• A7 - Improper Error HandlingError conditions that occur during normal operation are not handled properly. If an attacker can cause errors to occur that the Web application does not handle, they can gain detailed system information, deny service, cause security mechanisms to fail, or crash the server.

Web Engineering 22

Page 12: D 14 2009 Dec 14 2009 Katharina Siorpaes · software that promotes understanding of web application security. F if htt // ... security. 9The OWASP top ten represents a broad consensus

12

OWASP Top Ten Most Critical Web Application Vulnerabilities

A8 - Insecure StorageWeb applications frequently use pp q ycryptographic functions to protect information and credentials. These functions and the code to integrate them have proven difficult to code properly, frequently resulting in weak protection.

Web Engineering 12/7/2007

OWASP Top Ten Most Critical Web Application Vulnerabilities

A9 - Denial of ServiceAttackers can consume Web application resources to a point where other legitimate users can no longer access or use the application. Attackers can also lock users out of their accounts or even cause the entire application to fail.

Web Engineering 24

Page 13: D 14 2009 Dec 14 2009 Katharina Siorpaes · software that promotes understanding of web application security. F if htt // ... security. 9The OWASP top ten represents a broad consensus

13

OWASP Top Ten Most Critical Web Application Vulnerabilities

A10 - Insecure Configuration ManagementHaving a strong server configuration standard is critical to a secure web application. These servers have many configuration options that affect security and are not secure out of the box.

Web Engineering 25

• Developers must:– Work with solution architects and systems administrators to ensure 

application security

– Contribute to security by:• Adopting good application security development practices

• Knowing where security vulnerabilities occur and how to avoid them

• Using secure programming techniques

Web Engineering

Page 14: D 14 2009 Dec 14 2009 Katharina Siorpaes · software that promotes understanding of web application security. F if htt // ... security. 9The OWASP top ten represents a broad consensus

14

• Security must be considered at:– All stages of a project

• Design

• Development 

• Deployment

– All layers• Network

• Host

• Application

Web Engineering

“Security is only as good as the weakest link”“Security is only as good as the weakest link”

OWASP Top Ten Project http://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project

UA Web Applications Best Practices http://confluence ltc arizona edu/confluence/display/WEBPRACTICES/Web+Ahttp://confluence.ltc.arizona.edu/confluence/display/WEBPRACTICES/Web+Application+Best+Practices

Web Application Security Consortium http://www.webappsec.org/

Microsoft Corporationhttp://www.microsoft.com/DOWNLOADS/details.aspx?familyid=84B3AA98‐A1E5‐4A74‐A56B‐7ADDBDED79CC&displaylang=en

UA Info Sec Office Webpage for Application Developer

Web Engineering

UA Info Sec Office Webpage for Application Developerhttp://security.arizona.edu/appdev

Page 15: D 14 2009 Dec 14 2009 Katharina Siorpaes · software that promotes understanding of web application security. F if htt // ... security. 9The OWASP top ten represents a broad consensus

15

Questions?

Web Engineering 29