9
A Seminar on Insecure Indexing Insecure Indexing Department of I.T. Rajasthan Institute of Engineering & Technology, Jaipur Presented By: Yogendra Presented By: Yogendra Singh Singh

Insecure indexing

Embed Size (px)

DESCRIPTION

 

Citation preview

Page 1: Insecure indexing

A Seminar on

Insecure IndexingInsecure IndexingDepartment of I.T.

Rajasthan Institute of Engineering & Technology, Jaipur

Presented By: Yogendra SinghPresented By: Yogendra Singh

Page 2: Insecure indexing

What is Indexing?

Why is it important?

Page 3: Insecure indexing

Indexing mechanisms used to speed up access to desired data.E.g., author catalog in library

Search Key - attribute to set of attributes used to look up records in a file.

An index file consists of records (called index entries) of the form.

Index files are typically much smaller than the original file

Page 4: Insecure indexing

Insecure Indexing is a threat to the data confidentiality of the web-site.

Indexing web-site contents via a process that has access to files which are not supposed to be publicly accessible has the potential of leaking information about the existence of such files, and about their content. 

Page 5: Insecure indexing

 In the process of indexing, such information is collected and stored by the indexing process, which can later be retrieved by a determined attacker, typically through a series of queries to the search engine.

The attacker does not thwart the security model of the search engine.

Page 6: Insecure indexing

•  Locate the search facility manually, and using the above technique and the search facility, construct a list of all indexed files. Compare that to a list of all visible sitesIf there are indexed files which are not visible, then the site is vulnerable. This is black box method.

• If there's access to the host itself , then a test can consist of adding a new file to an indexable folder, with unique content , and then querying the search engine for this string . If the string is found, then the site is vulnerable .

Page 7: Insecure indexing

Suppose the attacker suspects that vendor X is about to publish a security advisory on their website. Also suppose that the attacker knows that part of the publishing process, the file is uploaded to the website few days (or weeks) before the advisory is published. The file resides on the web server, yet it is not linked from anyplace. Further suppose that the file name is unpredictable. Assuming that the site operates a search engine that *locally* indexes server *files*, and that it has recently indexed the site (so it encountered the advisory file as well), the attacker can now guess a word or two that are likely to appear in an advisory (e.g. maybe "Vendor X advisory X-Adv-07-"), and with luck, the search engine will display a URL to the unpublished advisory. And if the site is really insecure, the URL will be downloadable by the attacker.

Page 8: Insecure indexing

Local search engines that use file-level access may pose a security hazard (insecure indexing) due to their access to resources which are not accessible to remote users. By indexing those resources, the search engine creates a channel through which data may be leaked to remote users.

crawling style indexing should be preferred over direct file indexing. 

Page 9: Insecure indexing

Thank You!