4.3 Thwart SOAP Attachment Attacks
The best mitigation would be to have a SOAP
message interceptor that scans incoming SOAP
request for the presence of an attachment. Then
extract and scan attachment for the presence of virus
signature before being given to a web service. We
used open source ClamAV antivirus to scan
attachments. To prevent inclusion of extra
attachments, mitigation would be to ensure that all
attachments are signed. If any attachment referred
from SOAP message is not found to be signed then
it’s probably an instance of an attachment insertion
attack.
Table 1: Summary of Attacks and Mitigation Schemes.
Attack on/through
Newly
mentioned
Mitigation by
others
Mitigation
by us
XML Injection
No Yes Yes
1
XSS Injection No Yes Yes
XML Re-Writing No Yes Yes
2
Header
manipulation
No No Yes
SOAP
Attachments
No Yes Yes
3
Frankenstein
Message
Yes - -
WS-Security Yes - -
WS-Trust Yes - -
1
Our proposed solution also highlights mechanism to
automate the process of hardened schema generation.
2
We have shown the check that makes sure that the
signed nodes do not reside within a dummy node.
3
We have specifically described the use of open source
antivirus ClamAV for SOAP attachment scanning.
5 FUTURE WORK
Many of the attacks discussed above are direct
consequence of lack of thorough validation. The
XML Injection and Header Manipulation attacks can
be mitigated if we have strong validation logic in
place which in turn depends on quality of schema.
Our future work will focus on materializing efficient
schema hardening algorithm.
6 CONCLUSIONS
Table 1 highlights our contribution. In this paper, we
have shown injection based attacks. We have also
introduced Frankenstein message attack and attacks
on WS-Security and WS-Trust standards. We have
suggested mitigation techniques for subset of these
attacks. From the attacks discussed, it is apparent
that the mere use of security primitives does not
always evade all possible attacks. Use of these
security and other standards in a mature way can
supress new kind of attacks. Also, we have
introduced self-adaptive schema hardening
algorithm to automate the process of hardened
schema generation.
REFERENCES
Lindstrom, P., 2004. “Attacking and Defending Web
Services”, Spire Research Report.
Vorobiev, A., 2006. “Security Attack Ontology for Web
Services”, IEEE Proceedings of the Second
International Conference on Semantics, Knowledge,
and Grid.
Gruschka, N., 2009. “Vulnerable Cloud: SOAP Message
Security Validation Revisited”, IEEE International
Conference on Web Services.
Negm, W., 2004. “Anatomy of a Web Services Attack”,
Forum Systems.
McIntosh, M. and Austel, P., 2005. “XML signature
element wrapping attacks and countermeasures”, In
Workshop on Secure Web Services.
Gajek, S., Jensen, M., Liao, L., and Schwenk, J., 2009.
"Analysis of signature wrapping attacks and
countermeasures", In IEEE International Conference
on Web Services.
Jensen, M., Gruschka, N., Herkenhoner, R., Luttenberger,
N., 2007. “SOA and Web Services: New
Technologies, New Standards – New Attacks”, Fifth
European Conference on Web Services.
Gruschka, N., and Luttenberger, N., 2006. “Protecting
Web Services from DoS Attacks by SOAP Message
Validation", In Proceedings of IFIP International
Federation for Information Processing, pp 171–182.
Orrin, S., "The SOA/XML Threat Model and New
XML/SOA/Web 2.0 Attacks & Threats", Intel
Corporation.
Bidou, R., 2009. “Attacks on Web Services”, OWASP.
Testing for XML Injection (OWASP-DV-008), [online],
Available: http://www.owasp.org/index.php/Testing
_for_XML_Injection_(OWASP-DV-008) “Web
Services Security: SOAP Message Security 1.0”,
OASIS Security Standard, March 2004.
“WS-SecureConversation 1.3”, OASIS Standard, March
2007.
“WS-Trust 1.3”, OASIS Standard, March 2007.
Understanding WS-Security, [online], Available: http://
msdn.microsoft.com/en-us/library/ms977327.aspx
"Web Services Security: SOAP Messages with
Attachments (SwA) Profile 1.1", OASIS Standard, Feb
2006.
ClamAV Anti-Virus, [online], Available: http://
www.clamav.net/
SECRYPT 2010 - International Conference on Security and Cryptography
504