Table 8. Misuse case #557.
Name Tamper With DB
Summary A crook manipulates the web query submitted from a search form,
to update or delete information or to reveal information that should not be
publicly available.
Date 2001.02.23
Author David Jones
Basic Path 1. The crook provides some values to a product web form (e.g. the use case
Register Account) and submits.
2. The system displays the result matching the query.
3. The crook alters the submitted URL, introducing an error in the query and
resubmits the query.
4. The query fails and the system displays the database error message
to the crook, revealing more about the database structure.
5. The crook further alters the query, for instance adding a nested query
to reveal secret data or update or delete data, and submits.
6. The system executes the altered query, changing the database or revealing
content that should have been secret.
Alternative Paths ap1. In step 3 or 5, the crook does not alter the URL in the address window,
but introduces errors or nested queries directly into form input fields.
Mitigation Points mp1. In step 4, the exact database error message is not revealed to the client.
This will not entirely prevent the misuse, but the crook will have a much
harder time guessing table and field names in step 5.
mp2. In step 6, the system does not execute the altered query because all queries
submitted from forms are explicitly checked in accordance with what could be
expected from that form. This prevents the misuse case.
Triggers t1. Always true
Preconditions The crook is able to search for products, either because this function is publicly
available, or by having registered as a customer.
Mitigation Guarantee crook is unable to access the database in an unauthorized manner through a
publicly available web form (cf mp2).
Related Business Rules The services of the e-shop shall be available to customers over the internet.
Stakeholder and Threats st1. E-shop: Loss of data if deleted. Potential loss of revenue if customers are
unable to Order Product, or if prices have been altered. Badwill resulting from this.
st2. Customers: potentially losing money (at least temporarily) if crook has malignantly
increased product prices. Unable to order if data lacking, wasting time.
Potential Misuser Profile Skilled. Knowledge of databases and query language, at least able to understand
published exploits on cracker web sites.
lect values which define the similarity tables. Proper processes to identify and validate
them will be modelled and assessed with empirical investigation.
References
1. A. Raman and S. Muegge, An integrated approach to security in software development
methodologies, Proc. of Canadian Conference on Electrical and Computer Engineering.
2008, pp. 002011-002014
2. C. Lai, Java Insecurity: Accounting for Subtleties That Can Compromise Code, IEEE Soft-
ware, IEEE Computer Society, 2008, pp. 13-19
3. C. Riesbeck and R. Schank, Inside Case-Based Reasoning, Riesbeck/Schank, 1989
4. D. Ahmad and I. Arce, Vulnerability Bazaar, IEEE Security and Privacy, IEEE Computer
Society, 2007, pp. 69-73
5. D. Byers and N. Shahmehri, Design of a Process for Software Security, Proc. of the The
Second International Conference on Availability, Reliability and Security (ARES), IEEE
Computer Society, 2007, pp. 301-309.
6. D. Xu and K. N. Kendall, Threat-Driven Modeling and erification of Secure Software Using
Aspect-Oriented Petri Nets, IEEE Transactions on Software Engineering, IEEE Press, 2006,
pp. 265-278
135