CAPEC-93: Log Injection-Tampering-Forging

Detailed Draft 严重程度: High 攻击可能性: High

CAPEC版本: 3.9

更新日期: 2023-01-24

攻击模式描述

This attack targets the log files of the target host. The attacker injects, manipulates or forges malicious log entries in the log file, allowing them to mislead a log audit, cover traces of attack, or perform other malicious actions. The target host is not properly controlling log access. As a result tainted data is resulting in the log files leading to a failure in accountability, non-repudiation and incident forensics capability.

执行流程

步骤 1 Explore

[Determine Application's Log File Format] The first step is exploratory meaning the attacker observes the system. The attacker looks for action and data that are likely to be logged. The attacker may be familiar with the log format of the system.

技术:
  • Determine logging utility being used by application (e.g. log4j)
  • Gain access to application's source code to determine log file formats.
  • Install or obtain access to instance of application and observe its log file format.
步骤 2 Exploit

[Manipulate Log Files] The attacker alters the log contents either directly through manipulation or forging or indirectly through injection of specially crafted input that the target software will write to the logs. This type of attack typically follows another attack and is used to try to cover the traces of the previous attack.

技术:

前提条件

  • The target host is logging the action and data of the user.
  • The target host insufficiently protects access to the logs or logging mechanisms.

所需技能

Low This attack can be as simple as adding extra characters to the logged data (e.g. username). Adding entries is typically easier than removing entries.
Medium A more sophisticated attack can try to defeat the input validation mechanism.

后果影响

影响范围: Integrity

技术影响: Modify Data

缓解措施

Carefully control access to physical log files.

Do not allow tainted data to be written in the log file without prior input validation. An allowlist may be used to properly validate the data.

Use synchronization to control the flow of execution.

Use static analysis tools to identify log forging vulnerabilities.

Avoid viewing logs with tools that may interpret control characters in the file, such as command-line shells.

示例实例

Dave Nielsen and Patrick Breitenbach PayPal Web Services (aka PHP Toolkit) 0.50, and possibly earlier versions, allows remote attackers to enter false payment entries into the log file via HTTP POST requests to ipn_success.php. See also: CVE-2006-0201

关键信息

CAPEC ID: CAPEC-93

抽象级别: Detailed

状态: Draft

典型严重程度: High

攻击可能性: High

相关攻击模式