Major Websites Vulnerable to their Own Back-End Servers

  /     /     /  
Publicated : 22/11/2024   Category : security


Major Websites Vulnerable to their Own Back-End Servers


DoD, other websites found with back-end server flaws and misconfigurations that could give attackers an entryway to internal networks, researcher will demonstrate at Black Hat USA next month.



A UK researcher hacked his way through the public websites of the US Department of Defense and several major commercial organizations via some  not-so visible weaknesses and vulnerabilities that netted him a grand total of $30,000 in bug bounty rewards.
James Kettle, head of research at PortSwigger Web Security, used homegrown hacking tools to find holes in certain public websites and to then drop payloads of malformed Web requests and phony headers on those sites in order to work his way into the backend servers – and in some cases, gain access to the internal network of the organization.
Back-end servers are the oft-forgotten pieces of the website infrastructure: they can include Web caching, Web analytics, proxy, and load-balancing servers, for instance.
People are basically just plopping down really complex servers to do caching, analytics, and loads of fancy complex functionality in front of their Web server without much thought as to whether these features might carry risks, says Kettle, who next month at Black Hat USA in Las Vegas will reveal the details of the hacks in his
Cracking The Lens: Targeting Https Hidden Attack-Surface
 presentation there.
I found that a large number of these systems are really easy to exploit because they are built to stay out sight, he says. So when people have a penetration test or an audit, they dont think the infrastructure around the app matters very much: Its not going to get targeted because nobody looks at it.  
But as Kettle found in his research, when these servers surrounding a Web application have even minor flaws in them, an attacker can burrow more deeply from the public website into the organizations internal network.
Even as a security tester, you may well miss out on how many different systems your packets are going through and what effect they are having, he says. He says you can actually mine information from analytics systems, for example, that can be useful for hacking into the internals of the organization.
Kettle hacked into at least 70 servers, some of which were located at some very high-profile brand name websites, which he would not disclose prior to Black Hat. He used a homegrown hacking tool to send a payload to a large number of websites within a 10-minute window. That tool allowed him to earn $18,000 in bug bounty money in a few hours time, he says, via HackerOnes program. He will share details about the payloads during his Black Hat talk.
He also plans to demonstrate and release a free, open-source tool he created called Collaborator Everywhere, a Burp Suite extension that works like a penetration test and is focused on individual websites. That tool netted him some $15,000 in bug bounties during his research. In addition, he will release another free tool he built, a Web-based tool that audits the attack surface of clients that connect to it, he says.
Findings
Misconfigured servers were the among the most common security issues he discovered. Someone hadnt set up a server front-end correctly and as a result, I was able to take complete control over their systems, he says. In one case, someone wrote good code for the front-end that had a bug in it.
Among the software vulnerabilities he found were Server Side Request Forgery (SSRF), a bug that allows an attacker to send a malicious Web request to reach internal or other back-end servers.
In a bizarre twist, Kettle also inadvertently hacked his own ISP while conducting his research against one of his target websites. My own ISP routed it [the payload] into its own system and got exploited by it, which was quite shocking, he says. I wasnt authorized to hack the ISP, so I kind of panicked.
He says he was able to remediate and smooth things over with the UK ISP, which he declined to name, and once they were apprised of his research, they werent too angry, he says.
In another case, he sent a payload to an extremely well-known company website that allowed him to reach a back-end server that left its internal network accessible. I would be able to reconfigure that server to whatever I wanted as an attacker, he says, giving him complete control over most of that companys public websites.
People need to treat this like an attack surface. They need to realize shiny features in back-end analytics can come with security holes, he says.
The other problem, Kettle says, is that internal networks he was able to reach were left wide open with little security.
Most of the networks I broke into had access to insane stuff, admin panels with no authentication, no login and password, he says. If you design your network well enough, then someone who breaks into the DMZ shouldnt have access to that … If you [an attacker] get inside of the network, youre absolutely trusted and the network, vulnerable, he says.
Best Defense
Kettle says a well-architected Web infrastructure has multiple distinct networks, as well as a sandbox for the website back-end in order to keep it separated from the internal network so it is protected  from outsiders. He says organizations often either dont realize or dont bother to segment their Web infrastructure. If youre using things like load-balancing, caching, proxy, reverse-proxy and such, they should only have access to a DMZ … network.
The good news is that the majority of the vulnerabilities Kettle discovered have since been fixed, and in many cases were remedied quickly, he says. One exception is a critical flaw in DoDs website that is taking longer to patch, he says.

Black Hat USA returns to the fabulous Mandalay Bay in Las Vegas, Nevada, July 22-27, 2017. Click for information on the
conference schedule
 and
to register.

Last News

▸ 7 arrested, 3 more charged in StubHub cyber fraud ring. ◂
Discovered: 23/12/2024
Category: security

▸ Nigerian scammers now turning into mediocre malware pushers. ◂
Discovered: 23/12/2024
Category: security

▸ Beware EMV may not fully protect against skilled thieves. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Major Websites Vulnerable to their Own Back-End Servers