Retired Cryptocloud forum
Retired Cryptocloud forum
Retired Cryptocloud forum
Would you like to react to this message? Create an account in a few clicks or log in to continue.
Retired Cryptocloud forum

forum moved to permanent home at cryptocloud.org!
 
HomeHome  SearchSearch  Latest imagesLatest images  RegisterRegister  Log in  
Search
 
 

Display results as :
 
Rechercher Advanced Search
Keywords
delay
Latest topics
» time to move to our new home
Tricksy SQL injection via nasty .pdfs {Dark Reading} EmptyThu Jan 24, 2013 4:54 am by wearehidden

» time to move to our new home
Tricksy SQL injection via nasty .pdfs {Dark Reading} EmptyThu Jan 24, 2013 4:53 am by wearehidden

» time to move to our new home
Tricksy SQL injection via nasty .pdfs {Dark Reading} EmptyThu Jan 24, 2013 4:53 am by wearehidden

» time to move to our new home
Tricksy SQL injection via nasty .pdfs {Dark Reading} EmptyThu Jan 24, 2013 4:53 am by wearehidden

» LA Server performing better lately
Tricksy SQL injection via nasty .pdfs {Dark Reading} EmptyWed Jan 02, 2013 2:19 pm by Apococrypto

» ubuntu 12.04 openvpn timeout
Tricksy SQL injection via nasty .pdfs {Dark Reading} EmptySun Dec 30, 2012 10:23 pm by Pattern_Juggled

» The knowledge base for canceling an account is outdated (please cancel my account)
Tricksy SQL injection via nasty .pdfs {Dark Reading} EmptySun Dec 30, 2012 10:09 pm by Pattern_Juggled

» Beta announcement of new Cryptocloud forum
Tricksy SQL injection via nasty .pdfs {Dark Reading} EmptySun Dec 30, 2012 9:54 pm by Pattern_Juggled

» Crytpo Cloud password authentication issue problem again
Tricksy SQL injection via nasty .pdfs {Dark Reading} EmptyFri Dec 28, 2012 3:59 pm by Pattern_Juggled

April 2024
MonTueWedThuFriSatSun
1234567
891011121314
15161718192021
22232425262728
2930     
CalendarCalendar
Affiliates
free forum


 

 Tricksy SQL injection via nasty .pdfs {Dark Reading}

Go down 
AuthorMessage
Pattern_Juggled
Admin
Pattern_Juggled


Posts : 57
Join date : 2012-08-04

Tricksy SQL injection via nasty .pdfs {Dark Reading} Empty
PostSubject: Tricksy SQL injection via nasty .pdfs {Dark Reading}   Tricksy SQL injection via nasty .pdfs {Dark Reading} EmptyThu Aug 09, 2012 12:15 pm

Quote :
Serving Up Malicious PDFs Through SQL Injection
Websites serving binary file content are exposed to malicious payloads and data extraction through SQL injection -- even when the database is secure

Aug 09, 2012
By Ericka Chickowski, Contributing Writer


These days SQL injection vulnerabilities may seem like a dime a dozen, but creative penetration testers and attackers continue to come up with new ways to take advantage of this vulnerability class that developers persist in allowing to linger like a bad cold. Last month at BSides Las Vegas, a pair of researchers from FishNet Security demonstrated that type of creativity with a new SQL injection attack technique against websites that serve up binary file content like PDFs from dynamically built URLs.

Their methods give attackers the means to stealthily extract data and serve up hidden malware by attacking SQL injection vulnerabilities on these types of sites -- even if the back-end database serving up content to the Web application is hardened in every other way.

The technique they developed was precipitated by a real-world penetration test and code review conducted by Shawn Asmus and Kristov Widak, security consultants for FishNet Security, against a customer Web application that was designed to retrieve stored PDFs within a database and return them as a Web page. Asmus and Widak found that through a SQL vulnerability and some pretty big configuration problems -- passwords stored that were hashed but not salted, wide-open table permissions, and the like -- attacks starting with the SQL injection yielded the ability to not only extract data from the database, but also write to it.

"So [there was] major ownage," Asmus said. "We could execute XP command shell, upload a Webshell to the Webserver, get root access and all that."

Following that penetration test, though, Asmus said he felt his "Spidey sense" tingle about applications similar to that one that returned binary files like PDFs. The question he and Widak posed to themselves was how SQL injection could be used against such applications even when configuration mistakes weren't made.

"We wondered, 'What if the Web server was hardened? What if those tables were read-only? What could an attacker really get away with or do to make the application respond in a way he or she wanted?'" Asmus says.

The answer was, quite a lot. SQL injection-prone sites returning PDFs could be a treasure trove for attackers, particularly due to the forgiving nature of PDF syntax, Widak said.

"You can mangle all kinds of stuff and still get it to render in your reader," he says, explaining that if an attacker is able to inject things into the PDF data stream, and the syntax allows rendering anyhow, there are a number of opportunities to do harm.

The three main ways Asmus and Widak found that a PDF could be manipulated with the technique were to inject JavaScript into a PDF, to inject static text or hidden text into the PDF content stream -- including the results of database queries, and finally the attacker could also replace the whole PDF being returned with a brand new maliciously crafted PDF. During the presentation, they demonstrated how techniques like these could use JavaScript to pop up the calculator application or redirect to a unique website when PDFs were rendered by a test application.

The impact of these attack scenarios is that a hacker could perform data exfiltration through social engineering or simply deliver malicious payloads through the application vulnerable to SQL injection.

"So the root cause is still the same -- you've got SQL injection in your website and you need to fix it -- but the impact is what may be different," Asmus warns.

Though the attacks were against Microsoft SQL databases, the technique would be adaptable to other database syntaxes, Asmus and Widak said. They also believe that it could be used against Web applications that deliver other content types beyond PDF. At the show they announced a tool to help spot these kind of vulnerabilities, called SQL Squirrel.

"Currently all of the attacks that the tool is performing are based on returning a PDF," Widak said. "In the future we'll be looking to extend that to other kinds of content types as well."
Back to top Go down
http://2600.com
 
Tricksy SQL injection via nasty .pdfs {Dark Reading}
Back to top 
Page 1 of 1
 Similar topics
-
» News flash: if you're pwned, you're pwned {Dark Reading}

Permissions in this forum:You cannot reply to topics in this forum
Retired Cryptocloud forum :: Cryptocloud.org :: General Discussion-
Jump to: