Exploitation of Session Variables, Resource IDs and other Trusted Credentials |
Attack Pattern ID: 21 (Standard Attack Pattern Completeness: Complete) | Typical Severity: High | Status: Draft |
Summary
Attacks on session IDs and resource IDs take advantage of the fact that some software accepts user input without verifying its authenticity. For example, a message queueing system that allows service requesters to post messages to its queue through an open channel (such as anonymous FTP), authorization is done through checking group or role membership contained in the posted message. However, there is no proof that the message itself, the information in the message (such group or role membership), or indeed the process that wrote the message to the queue are authentic and authorized to do so.
Many server side processes are vulnerable to these attacks because the server to server communications have not been analyzed from a security perspective or the processes "trust" other systems because they are behind a firewall. In a similar way servers that use easy to guess or spoofable schemes for representing digital identity can also be vulnerable. Such systems frequently use schemes without cryptography and digital signatures (or with broken cryptography). Session IDs may be guessed due to insufficient randomness, poor protection (passed in the clear), lack of integrity (unsigned), or improperly correlation with access control policy enforcement points.
Exposed configuration and properties files that contain system passwords, database connection strings, and such may also give an attacker an edge to identify these identifiers.
The net result is that spoofing and impersonation is possible leading to an attacker's ability to break authentication, authorization, and audit controls on the system.
Attack Execution Flow
Survey the application for Indicators of Susceptibility:
Using a variety of methods, until one is found that applies to the target system. the attacker probes for credentials, session tokens, or entry points that bypass credentials altogether.
Attack Step Techniques
ID Attack Step Technique Description Environments 1 Spider all available pages
env-Web2 Attack known bad interfaces
env-Web env-CommProtocol env-ClientServer env-LocalIndicators
ID type Indicator Description Environments 1 Positive Session IDs are used
env-Web env-Peer2Peer env-ClientServer env-CommProtocol2 Positive Open access points exist that use no user IDs or passwords, but determine authorization based on message content
env-Web env-Peer2Peer env-CommProtocol env-ClientServer env-LocalOutcomes
ID type Outcome Description 1 Success Session IDs are identifiable2 Success Open channels are availableSecurity Controls
ID type Security Control Description 1 Detective Monitor velocity of page fetching in web logs. Humans who view a page and select a link from it will click far slower and far less regularly than tools. Tools make requests very quickly and the requests are typically spaced apart regularly (e.g. 0.8 seconds between them).2 Detective Create links on some pages that are visually hidden from web browsers. Using IFRAMES, images, or other HTML techniques, the links can be hidden from web browsing humans, but visible to spiders and programs. A request for the page, then, becomes a good predictor of an automated tool probing the application.3 Preventative Actively monitor the application and either deny or redirect requests from origins that appear to be automated.4 Detective Monitor velocity of feature activations (non-web software). Humans who activate features (click buttons, request actions, invoke APIs, etc.) will do so far slower and far less regularly than tools. Tools make requests very quickly and the requests are typically spaced apart regularly (e.g. 0.8 seconds between them).
Fetch samples:
An attacker fetches many samples of a session ID. This may be through legitimate access (logging in, legitimate connections, etc) or just systematic probing.
Attack Step Techniques
ID Attack Step Technique Description Environments 1 An attacker makes many anonymous connections and records the session IDs assigned.
env-Web env-Peer2Peer env-CommProtocol env-ClientServer2 An attacker makes authorized connections and records the session tokens or credentials issued.
env-Web env-Peer2Peer env-CommProtocol env-ClientServer3 An attacker gains access to (legitimately or illegitimately) a nearby system (e.g., in the same operations network, DMZ, or local network) and makes a connections from it, attempting to gain the same privileges as a trusted system.
env-Peer2Peer env-CommProtocol env-ClientServerIndicators
ID type Indicator Description Environments 1 Positive Trust in the system is based on IP address, MAC address, network locality, or other general network characteristic.
env-CommProtocol env-ClientServer env-Peer2Peer2 Positive Web applications use session IDs
env-Web3 Positive Network systems issue session IDs or connection IDs
env-CommProtocol env-ClientServer env-Peer2PeerOutcomes
ID type Outcome Description 1 Success Systems or applications grant trust based on logical or physical network locality.2 Success Session identifiers successfully spoofed3 Failure No session IDs can be found or exploitedSecurity Controls
ID type Security Control Description 1 Detective Monitor logs for unusual amounts of invalid sessions.2 Detective Monitor logs for unusual amounts of invalid connections or invalid requests from unauthorized hosts.
Impersonate:
An attacker can use successful experiments to impersonate an authorized user or system
Security Controls
ID type Security Control Description 1 Detective Analyze logs for users or systems that are connecting from unexpected sources.2 Detective Analyze logs for users or systems successfully requesting or performing unexpected actions.3 Corrective If heuristics are sufficiently reliable, disconnect hosts or users that appear to be unauthorized impersonations.Spoofing:
Bad data can be injected into the system by an attacker.
Outcomes
ID type Outcome Description 1 Success Unauthorized data is injected into an application.Security Controls
ID type Security Control Description 1 Detective Apply heuristic evaluation to input data. This can include validating source addresses, user names, ACLs or other data that indicates authorization. This need not be done inline at the time the data is processed, but can be done after the processing has occurred to detect attack.2 Corrective Apply transaction-based logic to systems whose initial authorization cannot be better controlled. Roll back transactions that are subsequently determined to be fraudulent or illegitimate.
Description
Thin client applications like web applications are particularly vulnerable to session ID attacks. Since the server has very little control over the client, but still must track sessions, data, and objects on the server side, cookies and other mechanisms have been used to pass the key to the session data between the client and server. When these session keys are compromised it is trivial for an attacker to impersonate a user's session in effect, have the same capabilities as the authorized user. There are two main ways for an attacker to exploit session IDs.
A brute force attack involves an attacker repeatedly attempting to query the system with a spoofed session header in the HTTP request. A web server that uses a short session ID can be easily spoofed by trying many possible combinations so the parameters session-ID= 1234 has few possible combinations, and an attacker can retry several hundred or thousand request with little to no issue on their side.
The second method is interception, where a tool such as wireshark is used to sniff the wire and pull off any unprotected session identifiers. The attacker can then use these variables and access the application.
Skill or Knowledge Level: Low
To achieve a direct connection with the weak or non-existent server session access control, and pose as an authorized user
Ability to deploy software on network. Ability to communicate synchronously or asynchronously with server
Design: utilize strong federated identity such as SAML to encrypt and sign identity tokens in transit.
Implementation: Use industry standards session key generation mechanisms that utilize high amount of entropy to generate the session key. Many standard web and application servers will perform this task on your behalf.
Implementation: If the session identifier is used for authentication, such as in the so-called single sign on use cases, then ensure that it is protected at the same level of assurance as authentication tokens.
Implementation: If the web or application server supports it, then encrypting and/or signing the session ID (such as cookie) can protect the ID if intercepted.
Design: Use strong session identifiers that are protected in transit and at rest.
Implementation: Utilize a session timeout for all sessions, for example 20 minutes. If the user does not explicitly logout, the server terminates their session after this period of inactivity. If the user logs back in then a new session key is generated.
Implementation: Verify of authenticity of all session IDs at runtime.
Malicious input delivered through standard service calls, e.g. FTP or posting a message to a message queue.
Varies with instantiation of attack pattern. The main goal is so spoof or impersonate a legitimate user.
Enables attacker to impersonate another user and access commands and data (and log behavior to audit logs) on their behalf.
CWE-ID | Weakness Name | Weakness Relationship Type |
---|---|---|
290 | Authentication Bypass by Spoofing | Targeted |
302 | Authentication Bypass by Assumed-Immutable Data | Targeted |
346 | Origin Validation Error | Targeted |
539 | Information Leak Through Persistent Cookies | Secondary |
6 | J2EE Misconfiguration: Insufficient Session-ID Length | Targeted |
384 | Session Fixation | Secondary |
664 | Improper Control of a Resource Through its Lifetime | Targeted |
602 | Client-Side Enforcement of Server-Side Security | Targeted |
642 | External Control of Critical State Data | Targeted |
Nature | Type | ID | Name | Description | View(s) this relationship pertains to |
---|---|---|---|---|---|
ChildOf | Category | 225 | Exploitation of Authentication | Mechanism of Attack (primary)1000 | |
PeerOf | Attack Pattern | 12 | Choosing a Message/Channel Identifier on a Public/Multicast Channel | Mechanism of Attack1000 | |
ParentOf | Attack Pattern | 31 | Accessing/Intercepting/Modifying HTTP Cookies | Mechanism of Attack (primary)1000 | |
ParentOf | Attack Pattern | 60 | Reusing Session IDs (aka Session Replay) | Mechanism of Attack (primary)1000 | |
ParentOf | Attack Pattern | 61 | Session Fixation | Mechanism of Attack (primary)1000 | |
ParentOf | Attack Pattern | 62 | Cross Site Request Forgery (aka Session Riding) | Mechanism of Attack (primary)1000 | |
ParentOf | Attack Pattern | 102 | Session Sidejacking | Mechanism of Attack (primary)1000 | |
ParentOf | Attack Pattern | 196 | Session Credential Falsification through Forging | Mechanism of Attack (primary)1000 |
Submissions | ||||
---|---|---|---|---|
Submitter | Organization | Date | ||
G. Hoglund and G. McGraw. Exploiting Software: How to Break Code. Addison-Wesley, February 2004. | Cigital, Inc | 2007-01-01 |
Modifications | |||||
---|---|---|---|---|---|
Modifier | Organization | Date | Comments | ||
Gunnar Peterson | Cigital, Inc | 2007-02-28 | Fleshed out content to CAPEC schema from the original descriptions in "Exploiting Software" | ||
Sean Barnum | Cigital, Inc | 2007-03-10 | Review and revise | ||
Richard Struse | VOXEM, Inc | 2007-03-26 | Review and feedback leading to changes in Description | ||
Sean Barnum | Cigital, Inc | 2007-04-13 | Modified pattern content according to review and feedback | ||
Paco Hope | Cigital, Inc. | 2007-10-20 | Added extended Attack Execution Flow |