As this story goes to press, just a few days remain in eWeek's OpenHack 4 security test.
As this story goes to press, just a few days remain in eWeeks OpenHack 4 security test. No one has accomplished any of the four remaining hack challenges, but a vulnerability has been spotted in site code.
The number of attacks on the www.openhack.com site has dropped off significantly from the beginning days of the test: Only about 5,000 new attacks were recorded in the past week by the IntruVert Networks Inc. intrusion detection system monitoring the test site.
Only one OpenHack challengea cross-site scripting attackhas been successfully accomplished so far. The person who levied that attackJeremy Poteet, chief technology officer at IT consultancy Technology Partners Inc.has since discovered on the Oracle Corp. OpenHack application a very clever, though as yet unproven, way to hijack session information in a rare combination of circumstances. (For OpenHack test methodology, go to www.eweek.com/openhack.)
Using a modification of his cross-site scripting attack, Poteet was able to log in as himself and then submit a hand-crafted URL string that modified the user identification parameter to replace his user ID with a different ID string. The vulnerability gave him an idea for how a more complex attack might be carried out.
Oracle application security checks prevent this switch from happening when the replacement user ID already exists in the database. However, if the user ID doesnt exist, an attacker could set his or her user ID session variable to the new user ID.
This user ID switch is blocked from reaching the database and so is nonpersistent and affects only the current session variables. This session information automatically expires after a few minutes. To get around that, Poteet proposed writing a custom program to maintain the session by refreshing a Web page every few minutes.
All this effort is in the hope that a user will come along and create a new account on the server, using the same user ID Poteet had chosen.
With the right software, luck and timing, we think this attack could work. If so, an attacker using Poteets hack would be logged in as that subsequent user and could view that users records, including any credit card data entered.
The application vulnerability Poteet spotted was the result of a bug in the original reference application code we developed. However, the bug appears not to have survived the application rewrite Microsoft Corp. did to convert the eWeek Labs-written reference code into Active Server Pages .Net.
The OpenHack site was scheduled to go offline at midnight PST on Nov. 8. This week, well be posting at www.eweek.com/openhack intrusion detection reports, system logs and, most important, OpenHack application source code from Microsoft and Oracle. In addition, look for a complete wrap-up of OpenHack 4and an analysis of what the results mean for enterprise securityin the Dec. 2 issue of eWeek.
West Coast Technical Director Timothy Dyck is at firstname.lastname@example.org.
Timothy Dyck is a Senior Analyst with eWEEK Labs. He has been testing and reviewing application server, database and middleware products and technologies for eWEEK since 1996. Prior to joining eWEEK, he worked at the LAN and WAN network operations center for a large telecommunications firm, in operating systems and development tools technical marketing for a large software company and in the IT department at a government agency. He has an honors bachelors degree of mathematics in computer science from the University of Waterloo in Waterloo, Ontario, Canada, and a masters of arts degree in journalism from the University of Western Ontario in London, Ontario, Canada.