...
首页> 外文期刊>International Journal of Information Security >Commix: automating evaluation and exploitation of command injection vulnerabilities in Web applications
【24h】

Commix: automating evaluation and exploitation of command injection vulnerabilities in Web applications

机译:Commix:在Web应用程序中自动化评估和开发命令注入漏洞

获取原文
获取原文并翻译 | 示例
           

摘要

Despite the prevalence and the high impact of command injection attacks, little attention has been given by the research community to this type of code injections. Although there are many software tools to detect and exploit other types of code injections, such as SQL injections or cross-site scripting, there is no dedicated and specialized software that detects and exploits, automatically, command injection vulnerabilities. This paper proposes an open-source tool that automates the process of detecting and exploiting command injection flaws on Web applications, named as COMMand Injection eXploiter (Commix). We present and elaborate on the software architecture and detection engine of Commix as well its extra functionalities that greatly facilitate penetration testers and security researchers in the detection and exploitation of command injection vulnerabilities. Moreover, based on the knowledge and the practical experience gained from the development of Commix, we propose and analyze new identified techniques that perform side-channel exploitation for command injections allowing an attacker to indirectly deduce the output of the executed command (i.e., also known as blind command injections). Furthermore, we evaluate the detection capabilities of Commix, by performing experiments against various applications. The experimental results show that Commix presents high detection accuracy, while at the same time false positives are eliminated. Finally and more importantly, we analyze several 0-day command injection vulnerabilities that Commix detected in real-world applications. Despite its short release time, Commix has been embraced by the security community and comes preinstalled in many security-oriented operating systems including the well-known Kali Linux.
机译:尽管指挥注入攻击的普遍存在和高影响力,但研究界对这种类型的代码注入很少关注。虽然有许多软件工具来检测和利用其他类型的代码注入,例如SQL注入或跨站点脚本,但没有专用和专业的软件,可自动检测和利用,自动命令注入漏洞。本文提出了一个开源工具,可自动化Web应用程序上的检测和利用命令注入漏洞的过程,命名为命令注入exproiter(Commix)。我们在Commix的软件架构和检测引擎中展示并详细介绍了它的额外功能,这极大地促进了渗透测试仪和安全研究人员,检测和开发指挥注射漏洞。此外,根据知识和从Commix的开发中获得的实践经验,我们提出并分析了对命令注射的侧通道开发的新识别技术,允许攻击者间接推断执行命令的输出(即,也知道作为盲指挥注射)。此外,我们通过对各种应用进行实验来评估Commix的检测能力。实验结果表明,Commix呈现出高的检测精度,同时消除了误报。最后,更重要的是,我们分析了在现实世界应用中检测到的几天命令注射漏洞。尽管它短暂的发布时间,Commix已被安全社区接受,并且在许多安全的操作系统中预先安装,包括着名的Kali Linux。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号