CAPEC-21: Exploitation of Trusted Identifiers

Meta Stable 严重程度: High 攻击可能性: High

CAPEC版本: 3.9

更新日期: 2023-01-24

攻击模式描述

执行流程

步骤 1 Explore

[Survey the application for Indicators of Susceptibility] Using a variety of methods, until one is found that applies to the target, the adversary probes for cookies, session tokens, or entry points that bypass identifiers altogether.

技术:
  • Spider all available pages
  • Attack known bad interfaces
  • Search outward-facing configuration and properties files for identifiers.
步骤 2 Experiment

[Fetch samples] The adversary fetches many samples of identifiers. This may be through legitimate access (logging in, legitimate connections, etc.) or via systematic probing.

技术:
  • An adversary makes many anonymous connections and records the session IDs assigned.
  • An adversary makes authorized connections and records the session tokens or credentials issued.
  • An adversary gains access to (legitimately or illegitimately) a nearby system (e.g., in the same operations network, DMZ, or local network) and makes a connection from it, attempting to gain the same privileges as a trusted system.
步骤 3 Exploit

[Impersonate] An adversary can use successful experiments or authentications to impersonate an authorized user or system or to laterally move within a system or application

步骤 4 Exploit

[Spoofing] Malicious data can be injected into the target system or into a victim user's system by an adversary. The adversary can also pose as a legitimate user to perform social engineering attacks.

步骤 5 Exploit

[Data Exfiltration] The adversary can obtain sensitive data contained within the system or application.

前提条件

  • Server software must rely on weak identifier proof and/or verification schemes.
  • Identifiers must have long lifetimes and potential for reusability.
  • Server software must allow concurrent sessions to exist.

所需技能

Low To achieve a direct connection with the weak or non-existent server session access control, and pose as an authorized user

所需资源

  • Ability to deploy software on network.
  • Ability to communicate synchronously or asynchronously with server.

后果影响

影响范围: Confidentiality Access Control Authentication

技术影响: Gain Privileges

影响范围: Confidentiality

技术影响: Read Data

影响范围: Integrity

技术影响: Modify Data

缓解措施

Design: utilize strong federated identity such as SAML to encrypt and sign identity tokens in transit.

Implementation: Use industry standards session key generation mechanisms that utilize high amount of entropy to generate the session key. Many standard web and application servers will perform this task on your behalf.

Implementation: If the identifier is used for authentication, such as in the so-called single sign on use cases, then ensure that it is protected at the same level of assurance as authentication tokens.

Implementation: If the web or application server supports it, then encrypting and/or signing the identifier (such as cookie) can protect the ID if intercepted.

Design: Use strong session identifiers that are protected in transit and at rest.

Implementation: Utilize a session timeout for all sessions, for example 20 minutes. If the user does not explicitly logout, the server terminates their session after this period of inactivity. If the user logs back in then a new session key is generated.

Implementation: Verify authenticity of all identifiers at runtime.

示例实例

For example, in a message queuing system that allows service requesters to post messages to its queue through an open channel (such as anonymous FTP), authorization is done through checking group or role membership contained in the posted message. However, there is no proof that the message itself, the information in the message (such group or role membership), or the process that wrote the message to the queue is authentic and authorized to do so.

分类映射

分类名称 条目ID 条目名称
ATTACK 1134 Access Token Manipulation
ATTACK 1528 Steal Application Access Token
ATTACK 1539 Steal Web Session Cookie
关键信息

CAPEC ID: CAPEC-21

抽象级别: Meta

状态: Stable

典型严重程度: High

攻击可能性: High