CAPEC-1: Accessing Functionality Not Properly Constrained by ACLs

Accessing Functionality Not Properly Constrained by ACLs

状态:Draft

Typical_Severify: High

攻击可能性:High

描述

In applications, particularly web applications, access to functionality is mitigated by an authorization framework. This framework maps Access Control Lists (ACLs) to elements of the application's functionality; particularly URL's for web apps. In the case that the administrator failed to specify an ACL for a particular element, an attacker may be able to access it with impunity. An attacker with the ability to access functionality not properly constrained by ACLs can obtain sensitive information and possibly compromise the entire application. Such an attacker can access resources that must be available only to users at a higher privilege level, can access management sections of the application, or can run queries for data that they otherwise not supposed to.

相关攻击模式

ChildOf: CAPEC-122 |Privilege Abuse

ParentOf: CAPEC-17 | Using Malicious Files

ParentOf: CAPEC-58 | Restful Privilege Elevation

Execution Flow Attack Setp

Setp 1 Explore

[Survey] The attacker surveys the target application, possibly as a valid and authenticated user

Setp 2 Explore

[Identify Functionality] At each step, the attacker notes the resource or functionality access mechanism invoked upon performing specific actions

Setp 3 Experiment

[Iterate over access capabilities] Possibly as a valid user, the attacker then tries to access each of the noted access mechanisms directly in order to perform functions not constrained by the ACLs.

前置条件

The application must be navigable in a manner that associates elements (subsections) of the application with ACLs.

The various resources, or individual URLs, must be somehow discoverable by the attacker

The administrator must have forgotten to associate an ACL or has associated an inappropriately permissive ACL with a particular navigable resource.

所需技能

Level Low

In order to discover unrestricted resources, the attacker does not need special tools or skills. He only has to observe the resources or access mechanisms invoked as each action is performed and then try and access those access mechanisms directly.

所需资源

None: No specialized resources are required to execute this type of attack.

后果

Scope Impact Likelihood
Confidentiality Access Control Authorization Gain Privileges

缓解措施

{'p': ['In a J2EE setting, administrators can associate a role that is impossible for the authenticator to grant users, such as "NoAccess", with all Servlets to which access is guarded by a limited number of servlets visible to, and accessible by, the user.', 'Having done so, any direct access to those protected Servlets will be prohibited by the web container.', 'In a more general setting, the administrator must mark every resource besides the ones supposed to be exposed to the user as accessible by a role impossible for the user to assume. The default security setting must be to deny access and then grant access only to those resources intended by business logic.']}

实例

Implementing the Model-View-Controller (MVC) within Java EE's Servlet paradigm using a "Single front controller" pattern that demands that brokered HTTP requests be authenticated before hand-offs to other Action Servlets.

If no security-constraint is placed on those Action Servlets, such that positively no one can access them, the front controller can be subverted.

相关CWE

285 | 授权机制不恰当

732 | 关键资源的不正确权限授予

276 | 缺省权限不正确

693 | 保护机制失效

721 | OWASP Top Ten 2007 A10目录 - 未能限制URL访问

434 | 危险类型文件的不加限制上传

内容历史记录

提交

2014-06-23 | CAPEC Content Team | The MITRE Corporation

修改

2017-05-01 | CAPEC Content Team | The MITRE Corporation

Updated Attack_Pattern, References

2017-08-04 | CAPEC Content Team | The MITRE Corporation

Updated Attack_Pattern, Description Summary