计算机科学 ›› 2024, Vol. 51 ›› Issue (9): 416-424.doi: 10.11896/jsjkx.230900075
• 信息安全 • 上一篇
任家东1,2, 李尚洋1, 任蓉1, 张炳1,2, 王倩1
REN Jiadong1,2, LI Shangyang1, REN Rong1, ZHANG Bing1,2, WANG Qian1
摘要: 攻击者通常利用Web应用程序的访问控制漏洞实现对系统的非授权访问、信息窃取等恶意行为。针对Web应用程序的访问控制漏洞的检测问题,现有方法由于页面覆盖率低、检测过程开销大等问题,因此漏报率过高且效率低下。为此,基于动态分析,提出了一种基于站点地图的Web访问控制漏洞检测方法。该方法首先为不同角色下的用户分别建立各自的站点地图,并形成不同角色的完整站点地图,再通过对其分析生成Web应用程序预期访问控制策略,构建非法测试用例进行动态访问并分析执行结果实现对未授权访问、越权访问等类型访问控制漏洞的检测。最后,在7个真实开源Web应用程序中对所提方法进行验证,结果表明该方法能有效降低开销,其页面覆盖率达到90%以上;发现了10个真实漏洞,准确率达到了100%。
中图分类号:
[1]Beijing Rising Information Technology Co.,Ltd.2020 China Cyber Security Report[J].Journal of Information Security Research,2021,7(2):102-109. [2]OWASP.Open Web Application Security Project 2021[DB/OL].http://www.owasp.org.cn/OWASP-CHINA/owasp-project/2021-owasp-top-10/. [3]DEEPA G,SANTHI P.Securing Web Applications from Injection and Logic Vulnerabilities:Approaches and Challenges[J].Information and Software Technology,2016,74(4):160-180. [4]ZHANG B,LI J,REN J,et al.Efficiency and Effectiveness ofWeb Application Vulnerability Detection Approaches:A Review[J].ACM Computing Surveys(CSUR),2022,54(9):1-35. [5]SUN F,XU L,SU Z.Static Detection of Access Control Vulne-rabilities in Web Applications[C]//Proceedings of the 20th USENIX Conference on Security.Berkeley,CA,USA:USENIX Association,2011:45-78. [6]GAUTHIER F,MERLO E.Fast Detection of Access ControlVulnerabilities in PHP Applications[C]//19th Working Confe-rence on Reverse Engineering.Kingston:IEEE,2012:281-290. [7]PAN K,WANG Q.Static Detection of Access Control Vulnerabilities in Vue Applications[J].Journal of Physics:Conference Series,2020,1646(1):12-21. [8]MONSHIZADEH M,NALDURG P,VENKATAKRISHNANV N.MACE:Detecting Privilege Escalation Vulnerabilities in Web Applications[J].Bone,2014,47(Suppl 1):690-701. [9]LE H T,NGUYEN C D,BRIAND L,et al.Automated Inference of Access Control Policies for Web Applications[J].ACM Transactions on Software Engineering and Methodology,2015,24(3):27-37. [10]LI X,YUAN X.LogicScope:Automatic Discovery of Logic Vulnerabilities within Web Applications[C]//Acm Sigsac Sympo-sium on Information.Hangzhou,China,2013,2013(5):481-486. [11]LI X,SI X,YUAN X.Automated Black-box Detection of Access Control Vulnerabilities in Web Applications[C]//ACM Conference on Data & Application Security & Privacy.ACM,San Antonio,Te-xas,USA,2014,2014(3):49-60. [12]DEEPA G,THILAGAM P S,PRASEED A,et al.DetLogic:ABlack-box Approach for Detecting Logic Vulnerabilities in Web applications[J].Journal of Network & Computer Applications,2018,109(5):89-109. [13]LI X,YUAN X.BLOCK:A Black-box Approach for Detection of State Violation Attacks Towards Web Applications[C]//Computer Security Applications Conference.ACM,Orlando,Florida,USA,2011:247-256. [14]REN J,WU M,ZHANG B,et al.DetAC:Approach to Detect Access Control Vulnerability in Web application Based on Sitemap Model with Global Information Representation[J].International Journal of Software Engineering and Knowledge Engineering,2023,33(9):1327-1354. [15]KUSHNIR M,FAVRE O,RENNHARD M,et al.Automated blackbox detection of HTTP GET request-based access control vulnerabilities in web applications[C]//ICISSP 2021.SciTePress,2021:204-216. [16]LE H T,SHAR L K,BIANCULLI D,et al.Automated reverse engineering of role-based access control policies of web applications[J].Journal of Systems and Software,2022,184:111109. [17]LIU X,JIANG W,ZHANG Y.A survey of access control mo-dels[J].IEEE Communications Surveys & Tutorials,2016,18(1):829-856. [18]ZHANG Y,XIE T,LIU Y,et al.A Survey on Role-based Access Control Models[J].Journal of Computer Science and Technology,2021,36(3):439-466. [19]LIU J X,MA S M,QI H L.Research and implementation of access-rights control in web systems[J].Computer Engineering and Design,2008,10:2550-2553. [20]YANG J,SHEN X,CHEN W,et al.A Model Study on Collaborative Learning and Exploration of RBAC Roles[J].Wireless Communications and Mobile Computing,2021,2021(5):1-9. [21]LI X,SI X,YUAN X.Automated Black-box Detection of Access Control Vulnerabilities in Web Applications[C]//ACM Confe-rence on Data & Application Security & Privacy.ACM,San Antonio,Texas,USA,2014,2014(3):49-60. [22]MONSHIZADEH M,NALDURG P,VENKATAKRISHNANV N.MACE:Detecting Privilege Escalation Vulnerabilities in Web Applications[J].Bone,2014,47(Suppl 1):690-701. [23]XIA Z J,PENG G J,HU H F.Detection of ac cess control vulnerabilities in Web applications based on privilege verification graph[J].Computer Engineering and Applications,2018,54(12):63-68. |
|