- The Guide to Finding and Reporting Web Vulnerabilities
- About the Author
- About the Tech Reviewer
- Foreword
- Introduction
- Who This Book Is For
- What Is In This Book
- Happy Hacking!
- 1 Picking a Bug Bounty Program
- 2 Sustaining Your Success
- 3 How the Internet Works
- 4 Environmental Setup and Traffic Interception
- 5 Web Hacking Reconnaissance
- 6 Cross-Site Scripting
- 7 Open Redirects
- 8 Clickjacking
- 9 Cross-Site Request Forgery
- 10 Insecure Direct Object References
- 11 SQL Injection
- 12 Race Conditions
- 13 Server-Side Request Forgery
- 14 Insecure Deserialization
- 15 XML External Entity
- 16 Template Injection
- 17 Application Logic Errors and Broken Access Control
- 18 Remote Code Execution
- 19 Same-Origin Policy Vulnerabilities
- 20 Single-Sign-On Security Issues
- 21 Information Disclosure
- 22 Conducting Code Reviews
- 23 Hacking Android Apps
- 24 API Hacking
- 25 Automatic Vulnerability Discovery Using Fuzzers
17 Application Logic Errors and Broken Access Control
Application logic errors and broken access control vulnerabilities are quite different from those we’ve discussed so far. Most of the vulnerabilities covered in previous chapters are caused by faulty input validation: they happen when polluted user input is processed without proper sanitization. These malicious inputs are syntactically different from normal user input and are designed to manipulate application logic and cause damage to the application or its users.
应用程序逻辑错误和破坏访问控制漏洞与我们到目前为止所讨论的那些漏洞非常不同。前几章涵盖的大多数漏洞都是由于输入验证错误造成的:它们发生在未经适当清理的污染用户输入被处理时。这些恶意输入与正常用户输入在语法上有所不同,旨在操纵应用程序逻辑并对应用程序或其用户造成损害。
On the other hand, application logic errors and broken access control issues are often triggered by perfectly valid HTTP requests containing no illegal or malformed character sequences. Still, these requests are crafted intentionally to misuse the application’s logic for malicious purposes or circumvent the application’s access control.
另一方面,应用程序逻辑错误和破损的访问控制问题通常由完全有效的 HTTP 请求触发,不包含任何非法或格式错误的字符序列。然而,这些请求是有意制作出来的,以恶意目的滥用应用程序的逻辑或规避应用程序的访问控制。
Application logic errors are logic flaws in an application. Sometimes attackers can exploit them to cause harm to the organization, the application, or its users. Broken access control occurs when sensitive resources or functionality are not properly protected. To find these vulnerabilities, you cannot simply rely on your technical knowledge. Instead, you need to use your creativity and intuition to bypass restrictions set by the developers. This chapter explains these vulnerabilities, how they manifest in applications, and how you can test for them.
应用程序逻辑错误是应用程序中的逻辑缺陷。有时攻击者可以利用它们来对组织、应用程序或其用户造成伤害。破损的访问控制是指没有正确保护敏感资源或功能。要发现这些漏洞,您不能仅仅依赖您的技术知识。相反,您需要使用您的创造力和直觉来绕过开发人员设置的限制。本章介绍这些漏洞在应用程序中的表现,以及您如何测试它们。
如果你对这篇内容有疑问,欢迎到本站社区发帖提问 参与讨论,获取更多帮助,或者扫码二维码加入 Web 技术交流群。
绑定邮箱获取回复消息
由于您还没有绑定你的真实邮箱,如果其他用户或者作者回复了您的评论,将不能在第一时间通知您!
发布评论