Manipulating Opaque Client-based Data Tokens
Attack Pattern ID: 39 (Standard Attack Pattern Completeness: Complete)Typical Severity: MediumStatus: Draft
+ Description

Summary

In circumstances where an application holds important data client-side in tokens (cookies, URLs, data files, and so forth) that data can be manipulated. If client or server-side application components reinterpret that data as authentication tokens or data (such as store item pricing or wallet information) then even opaquely manipulating that data may bear fruit for an Attacker. In this pattern an attacker undermines the assumption that client side tokens have been adequately protected from tampering through use of encryption or obfuscation.

Attack Execution Flow

Explore
  1. Enumerate information passed to client side:

    The attacker identifies the parameters used as part of tokens to take business or security decisions

    Attack Step Techniques

    IDAttack Step Technique DescriptionEnvironments
    -1

    Use WebScarab to reveal hidden fields while browsing.

    env-Web
    1

    Use a sniffer to capture packets

    env-ClientServer env-Peer2Peer env-CommProtocol
    2

    View source of web page to find hidden fields

    env-Web
    3

    Examine URL to see if any opaque tokens are in it

    env-Web
    4

    Disassemble or decompile client-side application

    env-ClientServer env-Peer2Peer
    5

    Use debugging tools such as File Monitor, Registry Monitor, Debuggers, etc.

    env-ClientServer env-Peer2Peer

    Indicators

    IDtypeIndicator DescriptionEnvironments
    1Positive

    Opaque hidden form fields in a web page

    env-Web
    2Positive

    Opaque session tokens/tickets

    env-Web env-Peer2Peer env-ClientServer env-CommProtocol
    3Positive

    Opaque protocol fields

    env-ClientServer env-Peer2Peer env-CommProtocol
    4Positive

    Opaque Resource Locator

    env-Web env-Peer2Peer env-ClientServer env-CommProtocol

    Outcomes

    IDtypeOutcome Description
    1Success
    At least one opaque client-side token found
    2Failure
    No opaque client-side tokens found
  2. Determine protection mechanism for opaque token:

    The attacker determines the protection mechanism used to protect the confidentiality and integrity of these data tokens. They may may be obfuscated or a full blown encryption may be used.

    Attack Step Techniques

    IDAttack Step Technique DescriptionEnvironments
    1

    Look for signs of well-known character encodings

    env-Web env-ClientServer env-Peer2Peer env-CommProtocol
    2

    Look for cryptographic signatures

    env-Web env-ClientServer env-Peer2Peer env-CommProtocol
    3

    Look for delimiters or other indicators of structure

    env-Web env-ClientServer env-Peer2Peer env-CommProtocol

    Indicators

    IDtypeIndicator DescriptionEnvironments
    1Positive

    Standard signatures of well-known encodings detected

    env-Web env-ClientServer env-Peer2Peer env-CommProtocol
    2Positive

    Token or structural block's length being multiple of well-known block size of a cryptographic algorithm

    env-Web env-ClientServer env-Peer2Peer env-CommProtocol
    3Positive

    Clear structural boundaries or delimiters

    env-Web env-ClientServer env-Peer2Peer env-CommProtocol
    4Negative

    Failure outcome in previous step

    env-Web env-ClientServer env-Peer2Peer env-CommProtocol

    Outcomes

    IDtypeOutcome Description
    1Success
    Protection/encoding scheme identified
    2Failure
    No information about protection/encoding scheme could not be determined
Experiment
  1. Modify parameter/token values:

    Trying each parameter in turn, the attacker modifies the values

    Attack Step Techniques

    IDAttack Step Technique DescriptionEnvironments
    1

    Modify tokens logically

    env-Web env-ClientServer env-Peer2Peer env-CommProtocol
    2

    Modify tokens arithmetically

    env-Web env-ClientServer env-Peer2Peer env-CommProtocol
    3

    Modify tokens bitwise

    env-Web env-ClientServer env-Peer2Peer env-CommProtocol
    4

    Modify structural components of tokens

    env-Web env-ClientServer env-Peer2Peer env-CommProtocol
    5

    Modify order of parameters/tokens

    env-Web env-ClientServer env-Peer2Peer env-CommProtocol

    Indicators

    IDtypeIndicator DescriptionEnvironments
    1Positive

    Success outcome in first step.

    env-Web env-ClientServer env-Peer2Peer env-CommProtocol
    2Negative

    Failure outcome in first step

    env-Web env-ClientServer env-Peer2Peer env-CommProtocol
  2. Cycle through values for each parameter.:

    Depending on the nature of the application, the attacker now cycles through values of each parameter and observes the effects of this modification in the data returned by the server

    Attack Step Techniques

    IDAttack Step Technique DescriptionEnvironments
    1

    Use network-level packet injection tools such as netcat

    env-Web env-ClientServer env-Peer2Peer env-CommProtocol
    2

    Use application-level data modification tools such as Tamper Data, WebScarab, TamperIE, etc.

    env-Web
    3

    Use modified client (modified by reverse engineering)

    env-ClientServer env-Peer2Peer env-CommProtocol
    4

    Use debugging tools to modify data in client

    env-ClientServer env-Peer2Peer

    Indicators

    IDtypeIndicator DescriptionEnvironments
    1Positive

    Success outcome in first step

    env-Web env-ClientServer env-Peer2Peer env-CommProtocol
    2Negative

    Failure outcome in first step

    env-Web env-ClientServer env-Peer2Peer env-CommProtocol

    Outcomes

    IDtypeOutcome Description
    1Success
    Subversion of security controls on server
    2Failure
    Client token reset by server
    3Inconclusive
    Detailed error message describing problem with token, received from server

    Security Controls

    IDtypeSecurity Control Description
    1Detective
    Unexpected/invalid token/parameter value in application logs on server
    2Corrective
    Reset session upon receipt of unexpected/invalid token/parameter value
+ Attack Prerequisites

An attacker already has some access to the system or can steal the client based data tokens from another user who has access to the system.

For an Attacker to viably execute this attack, some data (later interpreted by the application) must be held client-side in a way that can be manipulated without detection. This means that the data or tokens are not CRCd as part of their value or through a separate meta-data store elsewhere.

+ Typical Likelihood of Exploit

Likelihood: Very High

+ Methods of Attack
  • Modification of Resources
+ Examples-Instances

Description

With certain price watching websites, that aggregate products available prices, the user can buy items through whichever vendors has product availability, the best price, or other differentiator. Once a user selects an item, the site must broker the purchase of that item with the vendor. Because vendors sell the same product through different channel partners at different prices, token exchange between price watching sites and selling vendors will often contain pricing information. With some price watching sites, manipulating URL-data (which is encrypted) even opaquely yields different prices charged by the fulfilling vendor. If the manipulated price turns out higher, the Attacker can cancel purchase. If the Attacker succeeded in manipulating the token and creating a lower price, he/she proceeds.

Description

Upon successful authentication user is granted an encrypted authentication cookie by the server and it is stored on the client. One piece of information stored in the authentication cookie reflects the access level of the user (e.g. "u" for user). The authentication cookie is encrypted using the Electronic Code Book (ECB) mode, that naively encrypts each of the plaintext blocks to each of the ciphertext blocks separately. An attacker knows the structure of the cookie and can figure out what bits (encrypted) store the information relating to the access level of the user. An attacker modifies the authentication cookie and effectively substitutes "u" for "a" by flipping some of the corresponding bits of ciphertext (trial and error). Once the correct "flip" is found, when the system is accessed, the attacker is granted administrative privileges in the system. Note that in this case an attacker did not have to figure out the exact encryption algorithm or find the secret key, but merely exploit the weakness inherent in using the ECB encryption mode.

Description

Archangel Weblog 0.90.02 allows remote attackers to bypass authentication by setting the ba_admin cookie to 1.

Related Vulnerabilities

CVE-2006-0944

+ Attacker Skills or Knowledge Required

Skill or Knowledge Level: Medium

If the client site token is obfuscated.

Skill or Knowledge Level: High

If the client site token is encrypted.

+ Resources Required

The Attacker needs no special hardware-based resources in order to conduct this attack. Software plugins, such as Tamper Data for Firefox, may help in manipulating URL- or cookie-based data.

+ Probing Techniques

Tamper with the client side data token and observe the effects it has on interaction with the system.

This attack is in and of itself a trial-and-error-based probing technique.

+ Solutions and Mitigations

One solution to this problem is to protect encrypted data with a CRC of some sort. If knowing who last manipulated the data is important, then using a cryptographic "message authentication code" (or hMAC) is prescribed. However, this guidance is not a panecea. In particular, any value created by (and therefore encrypted by) the client, which itself is a "malicous" value, all the protective cryptography in the world can't make the value 'correct' again. Put simply, if the client has control over the whole process of generating and encoding the value--then simply protecting its integrity doesn't help.

Make sure to protect client side authentication tokens for confidentiality (encryption) and integrity (signed hash)

Make sure that all session tokens use a good source of randomness

Perform validation on the server side to make sure that client side data tokens are consistent with what is expected.

+ Attack Motivation-Consequences
  • Data Modification
  • Privilege Escalation
+ Related Weaknesses
CWE-IDWeakness NameWeakness Relationship Type
353Failure to Add Integrity Check ValueTargeted
285Improper Access Control (Authorization)Secondary
302Authentication Bypass by Assumed-Immutable DataTargeted
472External Control of Assumed-Immutable Web ParameterTargeted
565Reliance on Cookies without Validation and Integrity CheckingTargeted
315Plaintext Storage in a CookieTargeted
539Information Leak Through Persistent CookiesTargeted
384Session FixationSecondary
233Parameter ProblemsSecondary
+ Related Attack Patterns
NatureTypeIDNameDescriptionView(s) this relationship pertains toView\(s\)
ChildOfAttack PatternAttack Pattern22Exploiting Trust in Client (aka Make the Client Invisible) 
Mechanism of Attack1000
ChildOfCategoryCategory223Probabilistic Techniques 
Mechanism of Attack (primary)1000
ParentOfAttack PatternAttack Pattern31Accessing/Intercepting/Modifying HTTP Cookies 
Mechanism of Attack1000
+ Relevant Security Requirements

Sensitive information stored client side must be integrity checked upon return before use

+ Related Security Principles
  • Reluctance to Trust

  • Never Assuming that your Secrets are Safe

  • Least Privilege

  • Complete Mediation

+ Related Guidelines
  • Never Use Unvalidated Input as Part of a Directive to any Internal Component

+ Purposes
  • Penetration
  • Exploitation
+ CIA Impact
Confidentiality Impact: HighIntegrity Impact: HighAvailability Impact: Low
+ Technical Context
Architectural Paradigms
All
Frameworks
All
Platforms
All
Languages
All
+ Content History
Submissions
SubmitterOrganizationDateComments
John StevenCigital, Inc2007-02-10Initial core pattern content
Modifications
ModifierOrganizationDateComments
Chiradeep B. ChhayaCigital, Inc2007-02-23Fleshed out pattern with extra content
Eugene LebanidzeCigital, Inc2007-02-27Added new examples and other content
Richard StruseVOXEM, Inc2007-03-26Review and feedback leading to changes in Solutions and Related Attack Patterns
Sean BarnumCigital, Inc2007-04-13Modified pattern content according to review and feedback
Amit SethiCigital, Inc.2007-10-29Added extended Attack Execution Flow