信息安全研究 ›› 2019, Vol. 5 ›› Issue (3): 248-252.

• 学术论文 • 上一篇    下一篇

一种越权漏洞攻击方法实例研究

赵川,徐雁飞   

  1. 江苏省电子信息产品质量监督检验研究院
  • 收稿日期:2019-03-12 出版日期:2020-03-15 发布日期:2019-03-12
  • 通讯作者: 赵川
  • 作者简介:赵川 1989,本科,工程师,主要研究方向为网络安全、风险评估、渗透测试. ishamrock@163.com 徐雁飞 1991,硕士研究生,工程师,主要研究方向为网络安全、软件测试、数据分析. 1274998390@qq.com

An Example Research of an Over-AuthorityVulnerability Attack Method

  • Received:2019-03-12 Online:2020-03-15 Published:2019-03-12

摘要: 越权漏洞是Web应用系统中一种常见的漏洞类型,被OWASP评为Top10风险,漏洞往往会导致敏感信息的泄露或数据被非法篡改.针对某省市个人社保经办系统,给出了一种攻击方法实例,采用渗透测试方法,从用户冒用、数据截取、报文修改及自动化扒取4个方面深入介绍了攻击流程、漏洞利用结果,分析了与其他漏洞之间的关联性关系及可能造成的风险.最后对漏洞原理进行说明,给出了几种漏洞防护策略.研究证明了越权漏洞在互联网大数据时代可能造成的严重后果,也反映了作为网络系统运营方保护其重要信息系统网络安全的迫切性与必要性.关键词越权;信息泄露;大数据;渗透测试;访问控制

关键词: 越权, 信息泄露, 大数据, 渗透测试, 访问控制

Abstract: Override vulnerability is a common type of vulnerability in web application system. It is evaluated as one of the Top 10 risks by OWASP. The vulnerability often lead to leakage of sensitive information or illegal tampering of data. An example of an attack method is given for a personal social security management system of a province and a city. The penetration test method is used. The attack process and the vulnerability exploitation results is introduced from four aspects: user fraudulent use, data interception, message modification and automated capture. The relationship with the other vulnerabilities and the risk is analized. Finally, the principle of vunerability is explained, and several vulnerability protection strategies are provided. The research shows that the ultraauthority vulnerability may cause serious consequences in the era of big data in the internet. And it also reflected the urgency and necessity for protecting the network security of the important information system as the network system operator.

Key words: over-authority, information leakage, big data, penetration testing, access control