Introduction
A well-known, never out of fashion and highly impact vulnerability is the Path Traversal. This technique is also known as dot-dot-slash attack (../) or as a directory traversal, and it consists in exploiting an insufficient security validation/sanitization of user input, which is used by the application to build pathnames to retrieve files or directories from the file system that is located underneath a restricted parent directory.
By manipulating the values through special characters an attacker can cause the pathname to resolve to a location that is outside of the restricted directory.
In OWASP terms, a path traversal attack falls under the category A5 of the top 10 (2017): Broken Access Control, so as one of top 10 issues of 2017 we should give it a special attention.
In this blog post we will explore an example of web.config exfiltration via path traversal using Burp Suite Intruder Tool.
Previous posts about path traversal:
How to prevent Path Traversal in .NET
From Path Traversal to Source Code in Asp.NET MVC Applications
By manipulating the values through special characters an attacker can cause the pathname to resolve to a location that is outside of the restricted directory.
In OWASP terms, a path traversal attack falls under the category A5 of the top 10 (2017): Broken Access Control, so as one of top 10 issues of 2017 we should give it a special attention.
In this blog post we will explore an example of web.config exfiltration via path traversal using Burp Suite Intruder Tool.
Previous posts about path traversal:
How to prevent Path Traversal in .NET
From Path Traversal to Source Code in Asp.NET MVC Applications
Testing Step-by-Step
First, get a copy of Burp Suite Community Edition, a useful testing tool that provides many automated and semi-automated features to improve security testing performances.
In particular, Burp Intruder feature can be very useful to exploit path traversal vulnerabilities.
In particular, Burp Intruder feature can be very useful to exploit path traversal vulnerabilities.
Suppose there's a DotNet web application vulnerable to path traversal. In order to exploit the issue the attacker can try to download the whole source code of the application by following this tutorial.
Once the attacker finds a server endpoint that might be vulnerable to Path Traversal, it's possible to send it to Burp Intruder as shown in the following screenshot.
On the Intruder tab, the target has been set with the request that it will be used to manipulate in order to find the web.config file.
Make sure that the payload is correctly injected in the right attribute position, if not, perform a "Clear §" action, then select the attribute to fuzz and click on "Add §" button.
- go to the "Payloads" sub-tab;
- select from dropdown list "Payload type" the value "Simple List";
- in the panel "Payload Options" click on "Load..." button and select the fuzzing path traversal file (as shown in following screenshot).
Next step is to add a Payload Processing rule in order to match and replace the placeholder "{FILE}" with the filename we want to exfiltrate (in our example "web.config"), so click on "Add button".
In the paylod processing rule modal, add the Match for string "{FILE}" and the Replace for string "web.config", as shown in following screenshot:
In order to improve the probability of a successful attack, it is possible to add a Grep-Match value (if known), in order to easily identify a positive response.
Remove all already existing rules:
Then add a new Grep-Match rule for "<configuration>" string, that indicates web.config file has been found.
Finally, it's suggested to tune the Request Engine options basing on web server limitations (anti-throttling, firewall system, etc) in order to avoid false negative results, for example increasing retry delay.
Let's launch the attack.
No comments:
Post a Comment