Although perimeter security controls are well publicized, there are many suppliers who can offer them in different countries and these devices can fit into all types of budgets, there are still security problems in custom applications developed within companies that are not so easily solved. This week we were dealing with an incident relating to unauthorized access and information leakage of a web application. When we analyzed the logs of the IPS, we find the following:
This pattern is repeated continuously with a number of web pages that make up the application. All request were successfully served. I made the following questions:
We found other repeated pattern of packets, which turned out to be the root cause of the incident: Someone with interactive access to the server could upload a modified servlet, which the attacker invoked in the HTTP request and then it was possible to modify and retrieve information from the application. The lessons learned from the case are as follows:
-- Manuel Humberto Santander Peláez | http://twitter.com/manuelsantander | http://manuel.santander.name | msantand at isc dot sans dot org |
Manuel Humberto Santander Pelaacuteez 194 Posts ISC Handler Apr 22nd 2011 |
Thread locked Subscribe |
Apr 22nd 2011 9 years ago |
"It is clear that security measures can never be an obstacle to achieving business goals, but keep in mind that business goals can be seriously affected by the fault or negligence in the implementation of information security controls."
I hear that a lot but I don't think it is 100% accurate. Security requirements SHOULD prevent specific instances of bad design. That requires that the other business units be more flexible in their approaches to achieving the "business goals". If the other units are allowed to claim "it is an emergency right now and we will fix the security later" ... then EVERYTHING will become an "emergency" and "later" will never appear. Security is not difficult. But laziness is always easier. |
Anonymous |
Quote |
Apr 22nd 2011 9 years ago |
Sign Up for Free or Log In to start participating in the conversation!