quartz/content/notes/ass01-security-audit.md
2022-09-08 12:38:14 +12:00

2.6 KiB

title aliases tags
ass01-security-audit
assignment
comp210

Jet Hughes - 9474308

Summary of system

  • function
  • technology

Flaws

Password policy

  • must have at least 5 characters and one digit.
    • not suffiecient

SQL Injection

  • can log in to admin using username: " 'or 1=1;--"
  • we are able to extract data which is displayed as the users username
  • we can extract the data from the data base using this "username"
    • ' union select group_concat(username||':'||password||':'||name||':'||credit_card_number||':'||credit_card_expiry||':'||credit_card_cvv) from user as name;--
    • I was able to crack 48 of the 101 passwords using the rockyou wordlist. I'm sure It would not be difficult to crack more.
  • you cant also update the data. E.g., set the price of all products to zero using this as a username in the login box
    • '; update PRODUCT set UNIT_PRICE = 0 where 1=1;--

Javascript Injection

  • It ispossible to perform a javascript injection as the users name is displayed in the website. and prodcut information is displayed in the view catalogue page
  • I was able to create an account and log in using the username ''''. However when I did log in the username wasn't displayed in the browser, and alert didn't show. I also repeated the process with the user name '''' which also didn't run
  • You was able to update a product name to be a script which would then run on others systems
    • e.g. '; update PRODUCT set DESCRIPTION = '' where PRODUCT_ID = 67696;--
  • this could be used to export JSESSIONIDs of other users. Which would allow the attack to access their account (while the other user is logged in).
  • It could also be used to present the user with a legitamate seeming message encouraging them to open a malicious link.

Path traversal

  • You can access the welcome page simply using the path /catalogue/welcome.jsp. This will load the welcome page with the username null. However it is unclear whether this is a security issue as curently the welcome page offers no functionality.
  • I dont think there are any path traversal flaws in this website. This is because there isn't any urls which contain queries or parameters relating to sensitive pages.

Network-Level security

  • when a user logs in a post request to the server transmits the username and unhashed password to the server. This informaiton is susceptible to a man in the middle attack or other kinds of interception. Hopefully the website uses http. example payload

Other