Web security vulnerability endangers mass of applications

1 min read

A bug in web authorisation technology could compromise security systems used with a very wide range of applications, warns application vulnerability specialist Fortify Software.

The problem, says Rob Rachwald, Fortify’s director of product marketing, lies with the VBAAC (verb-based access and authentication control) aspect of web security technology. “The flaw is unusual in being systemic, and not directed at any one vendor’s products,” says Rachwald. “It is essentially a bug in a security feature.” Worryingly, he adds that the most popular J2EE container applications all have the flaw inherent in their authorisation procedures. According to Rachwald, the flaw allows hackers to manipulate the http: verb to bypass otherwise effective security controls. “For example, a piece of http code might seek to limit access to a given directory except for those users logged in with Admin rights. Exploiting the flaw means that, instead of blocking approaches not specified in a security rule, the code allows almost any method that is not specified,” he says. “Using this approach leaves the system open to infection by malware, or perhaps worse, by listing specific methods in the security rule, software developers end up opening the system a lot wider than they originally intended,” he warns. The flaw, says Rachwald, can be prevented by programming the web and application server system to disallow non-standard requests, such as Head, as well as never serving the JSPs directly, but placing all the JSP-INF files into a container (e.g. Web-INF) and limiting calls to that container. “Direct calls to JSPs should be avoided if at all possible. Developers should always invoke the request from the environment they are expected to be in and not from a dictionary collection of request data,” explains Rachwald. The flaw was discovered by Aspect Security, whose director of research, Arshan Dabirsiaghi, has penned a paper on the new types of flaws as they relate to VBAAC technology.