Dark Mode
Capec-51 Detail
Poison Web Service Registry
Detailed Software Likelihood: High Typical Severity: Very High
Parents: 203
Threats: T62 T68 T297
SOA and Web Services often use a registry to perform look up, get schema information, and metadata about services. A poisoned registry can redirect (think phishing for servers) the service requester to a malicious service provider, provide incorrect information in schema or metadata, and delete information about service provider interfaces.
WS-Addressing is used to virtualize services, provide return addresses and other routing information, however, unless the WS-Addressing headers are protected they are vulnerable to rewriting. Content in a registry is deployed by the service provider. The registry in an SOA or Web Services system can be accessed by the service requester via UDDI or other protocol.
| External ID | Source | Link | Description |
|---|---|---|---|
| CAPEC-51 | capec | https://capec.mitre.org/data/definitions/51.html | |
| CWE-285 | cwe | http://cwe.mitre.org/data/definitions/285.html | |
| CWE-74 | cwe | http://cwe.mitre.org/data/definitions/74.html | |
| CWE-693 | cwe | http://cwe.mitre.org/data/definitions/693.html |
Explore
-
Find a target SOA or Web Service: The adversary must first indentify a target SOA or Web Service.
Experiment
-
Determine desired outcome: Because poisoning a web service registry can have different outcomes, the adversary must decide how they wish to effect the webservice.
-
Determine if a malicious service needs to be created: If the adversary wishes to redirect requests or responses, they will need to create a malicious service to redirect to.
| Techniques |
|---|
| An adversary can perform a denial of service attack on a web service. |
| An adversary can redirect requests or responses to a malicious service. |
| Techniques |
|---|
| Create a service to that requests are sent to in addition to the legitimate service and simply record the requests. |
| Create a service that will give malicious responses to a service provider. |
| Act as a malicious service provider and respond to requests in an arbitrary way. |
Exploit
-
Poison Web Service Registry: Based on the desired outcome, poison the web service registry. This is done by altering the data at rest in the registry or uploading malicious content by spoofing a service provider.
| Techniques |
|---|
| Intercept and change WS-Adressing headers to route to a malicious service or service provider. |
| Provide incorrect information in schema or metadata to cause a denial of service. |
| Delete information about service procider interfaces to cause a denial of service. |
- The attacker must be able to write to resources or redirect access to the service registry.
- Capability to directly or indirectly modify registry resources
| Low |
|---|
| To identify and execute against an over-privileged system interface |
| Integrity | Availability | Confidentiality |
|---|---|---|
| Execute Unauthorized Commands (Run Arbitrary Code) | Execute Unauthorized Commands (Run Arbitrary Code) | Execute Unauthorized Commands (Run Arbitrary Code) |
| Modify Data | Read Data |
- WS-Addressing provides location and metadata about the service endpoints. An extremely hard to detect attack is an attacker who updates the WS-Addressing header, leaves the standard service request and service provider addressing and header information intact, but adds an additional WS-Addressing Replyto header. In this case the attacker is able to send a copy (like a cc in mail) of every result the service provider generates. So every query to the bank account service, would generate a reply message of the transaction status to both the authorized service requester and an attacker service. This would be extremely hard to detect at runtime. http://example.com/Message http://valid.example/validClient http://evilsite/evilClient http://validfaults.example/ErrorHandler In this example "evilsite" is an additional reply to address with full access to all the messages that the authorized (validClient) has access to. Since this is registered with ReplyTo header it will not generate a Soap fault.