WebApp Sec mailing list archives
Re: Security Assessment on J2EE Environments
From: "Jeff Williams @ Aspect" <jeff.williams () aspectsecurity com>
Date: Wed, 19 Mar 2003 19:38:50 -0500
I haven't found any resources with exactly what you are looking for. There are lots of papers about JVM security models, applet security, and Java security class libraries. But you're looking for information about finding flaws in a custom J2EE application. I think the reason that you can't find this information is because most websites have implemented their own security -- so it's difficult to generalize about flaws. Struts, for example, is a framework that takes quite a bit of customization to work. There are just too many ways for developers to blow it. So you'll have to rely on a more general description and tailor it for your review. You might start with the information in the OWASP "top ten" paper. The goal of your test should be to validate that the app doesn't contain any of the top ten (and the additional items listed in the conclusion). We've seen serious problems in J2EE apps with access control, session management, authentication flaws, cryptography, etc... Also, it sounds like you are focusing on an external penetration test. If it's possible, you should consider a security code review to find the problems. Reviewers should check the code for the top ten verify the design. Pretty soon, you'll have validated the top ten with a much higher degree of completeness than a penetration test. There's nothing magical about J2EE security. Most J2EE applications contain security holes. Sure they're not susceptible to buffer overflows. And if they use PreparedStatements, they are less likely to have SQL injection holes. But the rest of the top ten holes are common. Check out OWASP's WebGoat if you want to practice on a J2EE web app that's full of holes. --Jeff Jeff Williams Aspect Security, Inc. http://www.aspectsecurity.com ----- Original Message ----- From: Iggeres Bet To: webappsec () securityfocus com Sent: Wednesday, March 19, 2003 10:02 AM Subject: Security Assessment on J2EE Environments Dear List, I am currently working on a Security Assessment on a J2EE project. The Assessment is based uniquely on the HTTP view of the application. It doesn't matter here if the software is buggy BUT not exploitable using the HTTP protocol. The project is based in all the keywords and buzzwords around: jsp, servlets, apache, tomcat, weblogic, oracle, struts, coocon, xml, etc, etc. The problem we found is the lack of online information about concrete security problems seen in these environments. In this particular case the application is so closed (and the project development team has a high professional quality) that our assessment is now focalized to: - Command Injection: in the SQL queries the application uses PreparedStatement and do some verification before. - Struts things (seeing all the actions we can execute and pass to java objects). - Logic problems. We have successfully inserted our own html tags inside some form fields in the application because we found a problem in the html parser trusted in the project to check that kind of errors. So, here are the questions: - There is some online resource about concrete information on security issues on this framework beyond the specific vunerabilities reported? - Is J2EE and all the Monster Components behind it, a milestone from a Security perspective? Thank You All Iggeres ___________________________________________________ Yahoo! Messenger - Nueva versión GRATIS Super Webcam, voz, caritas animadas, y más... http://messenger.yahoo.es
Current thread:
- Security Assessment on J2EE Environments Iggeres Bet (Mar 19)
- Re: Security Assessment on J2EE Environments Jeff Williams @ Aspect (Mar 20)
- Re: Security Assessment on J2EE Environments Iggeres Bet (Mar 20)
- <Possible follow-ups>
- Re: Security Assessment on J2EE Environments bugtraq (Mar 19)
- RE: Security Assessment on J2EE Environments McLean, Michael R (Mar 19)
- Guidlines for Testing Web Applications Lecia McCalla (Mar 20)
- Re: Guidlines for Testing Web Applications dan cuthbert (Mar 20)
- Guidlines for Testing Web Applications Lecia McCalla (Mar 20)
- Security Assessment on J2EE Environments Gary Gwin (Mar 20)
- Re: Security Assessment on J2EE Environments Jeff Williams @ Aspect (Mar 20)