Commix: Detecting and exploiting command injection flaws
نویسندگان
چکیده
Command injections are prevalent to any application independently of its operating system that hosts the application or the programming language that the application itself is developed.The impact of command injection attacks ranges from loss of data confidentiality and integrity to unauthorized remote access to the system that hosts the vulnerable application. A prime example of a real, infamous command injection vulnerability that clearly depicts the threats of this type of code injection was the recently discovered Shellshock bug.Despite the prevalence and the high impact of the command injection attacks, little attention has been given by the research community to this type of code injection. In particular, we have observed that although there are many software tools to detect and exploit other types of code injections such as SQL injections or Cross Site Scripting, to the best of our knowledge there is no dedicated and specialized software application that detects and exploits automatically command injection attacks. This paper attempts to fill this gap by proposing an open source tool that automates the process of detecting and exploiting command injection flaws on web applications, named as commix, (COMMand Injection eXploitation).This tool supports a plethora of functionalities, in order to cover several exploitation scenarios. Moreover, Commix is capable ofdetecting, with high success rate, whether a web application is vulnerable to command injection attacks. Finally, during the evaluation of the tool we have detected several 0-day vulnerabilities in applications. Overall, the contributions of this work are: a) We provide a comprehensive analysis and categorization of command injection attacks; b) We present and analyze our open source tool that automates the process of detecting and exploiting command injection vulnerabilities; c) We will reveal(during presentation) several 0-day command injection vulnerabilities that Commix detected on various web based applications from home services (embedded devices) to web servers.
منابع مشابه
SECURE PROGRAMMING CONCEPTS IN SELECTED C++ AND JavaTM TEXTBOOKS
Creating secure software applications and writing secure programs are difficult affairs. Secure programs are well designed software applications which meet specified requirements. Well designed software is reliable in its availability and accessibility. The paper’s problem is whether the textbooks used in instruction of beginning programming students directly and actively discuss secure program...
متن کاملDetecting Sql Injections from Web Applications
Most of the published attacks in the National Vulnerability database from the year 2007 to till date are on web attacks, statistically there are total 10134 CVEs published. Among them 1479 are sql injection flaws and 1569 are cross site scripting flaws and millions of attacks are not yet published. Very recent sql injection and cross site scripting attacks are on most famous websites such as No...
متن کاملSecurely Web-based Application for Construction Material Testing
The main aim of this paper was to develop and evaluate securely web-based application for construction material testing using object-oriented technology and parameterized queries for SQL command queries. The SQL queries for the web application of construction material testing were modified by adjusting their codes which included connection strings, authorization bypass and execute commands. Det...
متن کاملSecurely Web-based Application for Construction Material Testing
The main aim of this paper was to develop and evaluate securely web-based application for construction material testing using object-oriented technology and parameterized queries for SQL command queries. The SQL queries for the web application of construction material testing were modified by adjusting their codes which included connection strings, authorization bypass and execute commands. Det...
متن کاملDetecting Design Flaws via Metrics in Object-Oriented Systems
The industry is nowadays confronted with large-scale monolithic and inflexible object-oriented software. Because of their high business value, these legacy systems must be reengineered. One of the important issues in reengineering is the detection and location of the design flaws, which prevent an efficient maintenance and further development of the system. In this paper we present a metrics-ba...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2015