Bugtraq mailing list archives

Proposal for standardizing a set of security guidelines for web applications


From: dan () LIGHTCORE COM (Dan)
Date: Fri, 16 Jun 2000 07:36:14 -0700


Title: Proposal for standardizing a set of security guidelines for web applications
Author: Dan N. (dannydude at cyberdude dot com)
Date: 06/16/10

Introduction:

        Recently, I was disappointed to find out how many important and known companies still have a very weak security 
model (I am not even talking about Microsoft here). I will discuss two real examples later on. We all know that the 
security of a service is as strong as "the weakest link in the chain". I figured that so many vendors and services 
would be aware of this, but unfortunately, I found out that they don't care, and if someone reports it to them, they 
either deny it or just let the vulnerability exist. In my opinion, there are two kinds of vulnerabilities. The ones 
that are so basic and ridiculous that they shouldn't be happening, and the ones that exist due the complexity and power 
of the software. I would like to get your attention focused on one specific problem, which is of course a "ridiculous" 
issue, namely companies offering web based services with no referer checking, cookie placement and/or session timeouts. 
While I know this is not a new issue, it is still a big issue and this should be
 some food for thought.

Examples:

        A few days ago, I found out that a register.com ip checked out a domain name I just setup. Since no one could 
known about the domain name, and my webserver logs referers, I decided to follow the referer since I would like to know 
where on their site my new domain was linked. I ended up finding out that this link brings me to their webbased ISP 
administration software. After doing some tests with some of my domain names, I found out that I was able to change 
anything from contact info to dns settings. I asked a friend of mine to do the same thing with his domains hosted by 
register.com, and he was able to do the same thing. This means that anyone, knowing how the site's url structure is 
setup, can change ANY domain setting for any domain hosted by register.com We all know how many domains they host , and 
this could have been a serious disaster. This is where the first mistake was made. The referer should have been 
rewritten by some sort of cgi proxy, or just not allow links to be followed from the web
based administration system. Second, they should have restricted access to this system based on ip's, so outsiders 
could not even get to the system. Another serious mistake they made was that they did not use any means of timing out 
sessions. If you try hotmail for example, when you become idle or leave the site, you can not do anything till you 
authenticate yourself again. The referer I had in my webserver log files was more than a day old! Another mistake they 
made was the url encoding. The url basically consisted of a SessionID (which didn't seem to matter what it was), a 
trouble ticket ID,domain name in clear text (!) followed by two numbers, both "1" without quotes. Simply changing the 
domain name from the referer to any domain I wanted to edit would allow me to actually change things. The url should 
have been more cryptic, especially the domain name part. Now think of what could have happened if someone else found 
out about this. They could have changed the MX records of many businesses so whoever has 
bad intensions can intercept ALL email for those companies and then redirect it back to the original MX server. It 
couldn't be easier to do corporate espionage and blackmail them. There are more things you can do that are worse (such 
as changing the dns settings of all the domains, or of register.com itself) causing many websites to fail. Remember, 
they have over a million members (according to their latest claims). Of course, as soon as I found out about this 
problem I contacted register.com. There is something else I would like to see change (and if I remember correctly, RFP 
discussed this in his new policy). When I tried to contact them, most of the times, their automated phone system would 
hang up on me after several minutes. I asked some other people to try to get a hold of them, but they had no luck 
either. I am not sure if this was a temporary glitch or what. So I decided to try to contact them by email. After a 
while I received an email saying they do not read email at all and to use the webbased for
m. (Great, now internet companies will start refusing to even read e-mail??). Browsing their site for another email 
address ended up in no results either. And I was not interested in sending an email to Sales. I tried using the 
webbased form, but they do not even have an entry for a "bug report", so I selected another topic. After entering a 
detailed description, the program tells me that I should try to delete some parts of my test. I never have had this 
many problems trying to contact a company with important information. A friend ended up calling for me, and they were 
basically laughing at him, wondering why register.com should care. Mysteriously, after my friend hung up (after 30 
minutes), the problem was fixed. So much for the respect I had for register.com.

        Yesterday, I discovered a similar problem with a known company that hosts websites for free. They also offered 
email and allowed you to check email using a known webbased program. Using the referer, it would allow you to read & 
manage any mail (I tried this on my own email account). I did not bother getting into details with this one since I did 
not have the time and I was pretty sure that if I could do it, anyone can. I will check out later if this was 
misconfiguration on the host's side, or a flaw in the program.

        This is not something I personally experienced, but just look at the domain hijacking that was going by 
exploiting some sort of vulnerability or security check at Network Solutions.

Conclusion:

        It is time to write some sort of security guidelines paper (if no one has already) and somehow convince 
companies that develop webbased products to use these. Many companies depend on outsourced services, and in most cases, 
there is a webbased interface to manage those outsourced services. I personally wish to see that after a paper like 
that has been written, that it could be used to hold the software companies responsible when a breach of security 
happens that could have been prevented by following the guidelines. The paper would basically be a check list, written 
from suggestions by security experts. Making this paper a standard could prevent many problems. Software companies 
could then sell their software while claiming that the software follows these particular guidelines. Companies that 
want to purchase such software could start looking for software that meet these standards to have some additional 
security. While I realize that this paper could not stop every problem, it could stop many of the
 "dumb" vulnerabilities and would be a good step in the right direction. Please remember that this article describes 
some of my recent experiences, an opinion, and a possible solution. Hopefully this article will trigger enough interest 
to prove why such a paper would be a good, or not a good idea at all.

Note: This article was written in a hurry while I had some time, it may contain some errors, please feel free to 
correct them if they are significant.

_____________________________________________________________
Lightcore.com!


Current thread: