may been enabled, and some functionality may be
disabled to speed up the development process.
The attack vector V6 (Sensitive Data Exposure)
are may analyze via prism of the next case. Most of
the web pages do not protect important data such as
the bank cards and other user data for authentication.
Hackers may steal or modify such unprotected data
are to be used for their own purposes. The simplest
example - the transfer of data over HTTP. The fact
that data transmitted over HTTP protocol being not
encrypted, and the passage of data through the
person’s computer to the server, all data will be
transferred from a router or a home office router,
ISP router, the router on the channel, hosting
provider’s data center router and so on. At each of
these nodes of hidden malware can exist, for
example, sniffer program that reads all the traffic
and sends to the attacker, who can view the personal
data and credit card data. Such data shall be transmit
only over HTTPS, which is be read as the
corresponding inscription in the address bar of your
browser.
The vulnerability V7 (Missing Function Level
Access Control) concerns the issues of the lack of
availability of proper access to the requested object.
The most web applications check the access rights
before displaying the data in the User Interface. But,
web applications must do the control checks for an
access on the server when requesting any method.
After all, there are still a lot of support service
requests, which often sent in the background
asynchronously using AJAX technology. If the
query parameters are not sufficiently carefully
checked, the hackers will be forge a request to
access the data without proper authorization.
- Default Accounts and Passwords. Weak
passwords may be detect by brute force, which uses
special dictionaries, or default password that comes
from the vendor is not change to new one.
To understand how vulnerability scanner
analyzes the attack vector V8 (Cross-site Request
Forgery - CSRF or XSRF) we should consider the
mechanism of this attack implementation. Firstly,
the CSRF/XSRF attack vector allows an attacker to
perform actions on behalf of the victim on the server
without additional checking and testing. For
example, in a payment system to transfer funds to
another account, for instance, there is a web page of
the form:
bank.com/transfer.asp?operation_amount=4400
&account=558246557 where "operation_amount" is
the amount of money to transfer and
"operation_account" is account number, where
money must been sent.
If the victim visits a site created by the attacker,
an attacker sends a request to the page mentioned
above of the payment system. As a result, the money
goes to the account of the attacker, then, are likely to
been quickly converted to Bitcoin, or translated into
another irrevocable payment system where money
cannot be returned. It is assumed that the victim
should have been pre-authenticate to the payment
system and must be opened an active session (for
example, payment system page is open in another
browser tab).
For understanding V9 type of vulnerability
(Using Components with Known as vulnerabilities)
we consider the following. Often, web-applications
have written by using special libraries and
frameworks, which are supply by third parties. In the
most cases, these components are made by open
sources, which means that anyone can have access to
the code (see and use), he can study the source code
for vulnerabilities and can find them including the
finding the errors in the code. In addition, often
vulnerabilities are found in the low levels system
components, such as database server, web-server,
and finally in the operating system components up to
its core. It is important to use the latest versions of
the components and monitor for known
vulnerabilities appearing on famous sites (like
securityfocus.com).
The attack vector V10 (Invalidated Redirect and
Forwards) works with the problems of redirection.
Web-based applications frequently redirect the user
from one page to another. In this process may be
improperly verifiable parameters that indicate the
final destination of the redirect page, which can be
discover. Without proper checks, an attacker can use
these pages to redirect the victim to a fake website
that, may have very similar or indistinguishable
interface, but can steal credentials, sensitive private
data and etc. This type of vulnerability, as well as
many others listed above, is a type of incoming data
validation errors (input validation).
The vulnerabilities mentioned above can met
very often and the methods of their identifying and
alerting for vulnerability scanners become very
critical. We can notice that the most of the attacks
depend on human detection and the adding of the
intelligent components to the scanner's logic may
become the beneficial element in security analysis.
The above types of attacks can be eliminated
only by intelligent security systems that are
combined with some types of vulnerability scanners
(Nurmyshev S, et el., 2016).
Seventh International Symposium on Business Modeling and Software Design
202