Name |
Using Leading 'Ghost' Character Sequences to Bypass Input Filters |
|
Likelyhood of attack |
Typical severity |
Medium |
Medium |
|
Summary |
Some APIs will strip certain leading characters from a string of parameters. An adversary can intentionally introduce leading "ghost" characters (extra characters that don't affect the validity of the request at the API layer) that enable the input to pass the filters and therefore process the adversary's input. This occurs when the targeted API will accept input data in several syntactic forms and interpret it in the equivalent semantic way, while the filter does not take into account the full spectrum of the syntactic forms acceptable to the targeted API. |
Prerequisites |
The targeted API must ignore the leading ghost characters that are used to get past the filters for the semantics to be the same. |
Execution Flow |
Step |
Phase |
Description |
Techniques |
1 |
Explore |
[Survey the application for user-controllable inputs] Using a browser, an automated tool or by inspecting the application, an adversary records all entry points to the application. |
- Use a spidering tool to follow and record all links and analyze the web pages to find entry points. Make special note of any links that include parameters in the URL.
- Use a proxy tool to record all user input entry points visited during a manual traversal of the web application.
- Use a browser to manually explore the website and analyze how it is constructed. Many browsers' plugins are available to facilitate the analysis or automate the discovery.
- Manually inspect the application to find entry points.
|
2 |
Experiment |
[Probe entry points to locate vulnerabilities] The adversary uses the entry points gathered in the "Explore" phase as a target list and injects various leading 'Ghost' character sequences to determine how to application filters them. |
- Add additional characters to common sequences such as "../" to see how the application will filter them.
- Try repeating special characters (?, @, #, *, etc.) at the beginning of user input to see how the application filters these out.
|
3 |
Exploit |
[Bypass input filtering] Using what the adversary learned about how the application filters input data, they craft specific input data that bypasses the filter. This can lead to directory traversal attacks, arbitrary shell command execution, corruption of files, etc. |
|
|
Solutions | Use an allowlist rather than a denylist input validation. Canonicalize all data prior to validation. Take an iterative approach to input validation (defense in depth). |
Related Weaknesses |
CWE ID
|
Description
|
CWE-20 |
Improper Input Validation |
CWE-41 |
Improper Resolution of Path Equivalence |
CWE-74 |
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') |
CWE-172 |
Encoding Error |
CWE-173 |
Improper Handling of Alternate Encoding |
CWE-179 |
Incorrect Behavior Order: Early Validation |
CWE-180 |
Incorrect Behavior Order: Validate Before Canonicalize |
CWE-181 |
Incorrect Behavior Order: Validate Before Filter |
CWE-183 |
Permissive List of Allowed Inputs |
CWE-184 |
Incomplete List of Disallowed Inputs |
CWE-697 |
Incorrect Comparison |
CWE-707 |
Improper Neutralization |
|
Related CAPECS |
CAPEC ID
|
Description
|
CAPEC-267 |
An adversary leverages the possibility to encode potentially harmful input or content used by applications such that the applications are ineffective at validating this encoding standard. |
|