Getting your Trinity Audio player ready...
|
The National Security Agency (NSA) has collaborated with various U.S. and international cyber agencies to issue a Cybersecurity Advisory (CSA) titled “Preventing Web Application Access Control Abuse.” This advisory serves as a warning, highlighting vulnerabilities in web applications and application programming interfaces (APIs) that malicious actors could exploit. Such exploitation can lead to unauthorised manipulation and access to sensitive data.
The potential consequences of these abuses are significant, as they could compromise the security of web applications and cloud-based services utilised by critical entities such as National Security Systems (NSS), the Department of Defense (DoD), and the Defense Industrial Base (DIB).
The Australian Cyber Security Centre (ACSC), U.S. Cybersecurity and Infrastructure Security Agency (CISA), and NSA have teamed up to provide comprehensive guidance to vendors, designers, developers, and consumer organisations on how to address insecure direct object reference (IDOR) vulnerabilities in web applications.
Neal Ziring, NSA Cybersecurity Technical Director, emphasised proactively tackling these frequently exploited vulnerabilities. Mitigating such vulnerabilities becomes challenging once the software is operational within a customer network. Hence, developers should remain vigilant and implement the checks outlined in the advisory to effectively reduce the prevalence of these flaws on a broader scale.
IDOR vulnerabilities represent access control weaknesses found in web applications, providing malicious actors with the ability to manipulate, delete, or gain unauthorised access to sensitive data.
The exploitation of such vulnerabilities can have far-reaching consequences, affecting various types of web applications, regardless of their deployment, including on-premises software installed locally within organisations, software as a Service (SaaS) used for cloud-based applications, infrastructure as a Service (IaaS) utilised for cloud-based computing resources, as well as private cloud models exclusive to an organisation’s infrastructure.
Therefore, developers and organisations must be vigilant in identifying and addressing these vulnerabilities to safeguard sensitive data and ensure the security of their web applications.
The report provides in-depth technical information regarding IDOR vulnerabilities. It offers suggested measures for individuals involved in web application development, usage, management, and administration, even for those applications intended for internal purposes.
As per the advisory, vulnerable applications or APIs permit direct access to objects (e.g., database records) using an identifier (e.g., ID number, name, or key) without adequately verifying the user’s authentication or authorisation. ACSC, CISA, and NSA advise organisations to adhere to the mitigation strategies outlined in this CSA to prevent the exploitation of IDOR vulnerabilities and safeguard sensitive data within their systems.
Furthermore, the CSA offers valuable mitigations tailored for end-user organisations to bolster the security of their web applications comprehensively. These measures are essential to ensure a robust defence against potential threats.
First, end-user organisations are encouraged to proactively select web applications that strongly commit to secure-by-design and secure-by-default principles. Secondly, the timely application of software patches for web applications is emphasised as a critical action. Swiftly addressing known security vulnerabilities through patching can safeguard against potential threats and ensure that the application remains resilient against emerging risks.
Another essential mitigation recommended in the CSA is regular penetration testing and vulnerability scanning on web applications. These proactive assessments serve as security measures, ensuring that applications are thoroughly scrutinised for potential weaknesses, including IDOR and other vulnerabilities.
Such examinations enable organisations to promptly identify and rectify vulnerabilities before malicious actors exploit them.