CAPEC-87: Forceful Browsing

Standard Draft 严重程度: High 攻击可能性: High

CAPEC版本: 3.9

更新日期: 2023-01-24

攻击模式描述

An attacker employs forceful browsing (direct URL entry) to access portions of a website that are otherwise unreachable. Usually, a front controller or similar design pattern is employed to protect access to portions of a web application. Forceful browsing enables an attacker to access information, perform privileged operations and otherwise reach sections of the web application that have been improperly protected.

执行流程

步骤 1 Explore

[Spider] Using an automated tool, an attacker follows all public links on a web site. They record all the links they find.

技术:
  • Use a spidering tool to follow and record all links.
  • Use a proxy tool to record all links visited during a manual traversal of the web application.
步骤 2 Experiment

[Attempt well-known or guessable resource locations] Using an automated tool, an attacker requests a variety of well-known URLs that correspond to administrative, debugging, or other useful internal actions. They record all the positive responses from the server.

技术:
  • Use a spidering tool to follow and record attempts on well-known URLs.
  • Use a proxy tool to record all links visited during a manual traversal of attempts on well-known URLs.
步骤 3 Exploit

[Use unauthorized resources] By visiting the unprotected resource, the attacker makes use of unauthorized functionality.

技术:
  • Access unprotected functions and execute them.
步骤 4 Exploit

[View unauthorized data] The attacker discovers and views unprotected sensitive data.

技术:
  • Direct request of protected pages that directly access database back-ends. (e.g., list.jsp, accounts.jsp, status.jsp, etc.)

前提条件

  • The forcibly browseable pages or accessible resources must be discoverable and improperly protected.

所需技能

Low Forcibly browseable pages can be discovered by using a number of automated tools. Doing the same manually is tedious but by no means difficult.

所需资源

  • None: No specialized resources are required to execute this type of attack. A directory listing is helpful, but not a requirement.

后果影响

影响范围: Confidentiality

技术影响: Read Data

影响范围: Confidentiality Access Control Authorization

技术影响: Bypass Protection Mechanism

缓解措施

Authenticate request to every resource. In addition, every page or resource must ensure that the request it is handling has been made in an authorized context.

Forceful browsing can also be made difficult to a large extent by not hard-coding names of application pages or resources. This way, the attacker cannot figure out, from the application alone, the resources available from the present context.

分类映射

分类名称 条目ID 条目名称
WASC 34 Predictable Resource Location
OWASP Attacks - Forced browsing
关键信息

CAPEC ID: CAPEC-87

抽象级别: Standard

状态: Draft

典型严重程度: High

攻击可能性: High

相关攻击模式