论文标题
通过API规范处理自动检测访问控制漏洞
Automatic detection of access control vulnerabilities via API specification processing
论文作者
论文摘要
客观的。不安全的直接对象参考(IDOR)或损坏的对象级别授权(BOLA)是现代应用程序的访问控制漏洞的关键类型之一。结果,攻击者可以绕过授权检查,导致信息泄漏,帐户收购。我们的主要研究目标是通过提供算法和工具来帮助应用程序安全架构师优化安全设计和测试过程,该算法和工具允许自动分析系统API规范并生成可能的漏洞列表,并准备将攻击向量用作安全性非功能性要求。方法。我们对研究和会议论文,漏洞赏金计划报告和其他灰色文献来源进行了多次审查,以概述针对父子脆弱性的攻击模式。这些攻击是在这些组之间进一步分析的集体中收集的。端点属性和攻击技术包括一组攻击。执行组功能和现有OpenAPI规范之间的映射以实现自动发现潜在脆弱端点的工具。结果和实际相关性。在这项工作中,我们基于文献综述,实际病例分析并得出IDOR/BOLA攻击组的IDOR/BOLA攻击技术进行系统化。我们提出了一种基于OpenAPI规格属性来描述IDOR/BOLA攻击的方法。我们根据OpenAPI规范处理开发了潜在的IDOR/BOLA漏洞检测算法。我们使用Python实施了新颖的算法并进行了评估。结果表明算法是弹性的,可以在实践中用于检测潜在的IDOR/BOLA漏洞。
Objective. Insecure Direct Object Reference (IDOR) or Broken Object Level Authorization (BOLA) are one of the critical type of access control vulnerabilities for modern applications. As a result, an attacker can bypass authorization checks leading to information leakage, account takeover. Our main research goal was to help an application security architect to optimize security design and testing process by giving an algorithm and tool that allows to automatically analyze system API specifications and generate list of possible vulnerabilities and attack vector ready to be used as security non-functional requirements. Method. We conducted a multivocal review of research and conference papers, bug bounty program reports and other grey sources of literature to outline patterns of attacks against IDOR vulnerability. These attacks are collected in groups proceeding with further analysis common attributes between these groups and what features compose the group. Endpoint properties and attack techniques comprise a group of attacks. Mapping between group features and existing OpenAPI specifications is performed to implement a tool for automatic discovery of potentially vulnerable endpoints. Results and practical relevance. In this work, we provide systematization of IDOR/BOLA attack techniques based on literature review, real cases analysis and derive IDOR/BOLA attack groups. We proposed an approach to describe IDOR/BOLA attacks based on OpenAPI specifications properties. We develop an algorithm of potential IDOR/BOLA vulnerabilities detection based on OpenAPI specification processing. We implemented our novel algorithm using Python and evaluated it. The results show that algorithm is resilient and can be used in practice to detect potential IDOR/BOLA vulnerabilities.