Dark Mode

Settings

Capec-53 Detail

Postfix, Null Terminate, and Backslash

Detailed Software Likelihood: High Typical Severity: High

Parents: 267

Threats: T62 T290 T291

Description

If a string is passed through a filter of some kind, then a terminal NULL may not be valid. Using alternate representation of NULL allows an adversary to embed the NULL mid-string while postfixing the proper data so that the filter is avoided. One example is a filter that looks for a trailing slash character. If a string insertion is possible, but the slash must exist, an alternate encoding of NULL in mid-string may be used.

Not present

External ID Source Link Description
CAPEC-53 capec https://capec.mitre.org/data/definitions/53.html
CWE-158 cwe http://cwe.mitre.org/data/definitions/158.html
CWE-172 cwe http://cwe.mitre.org/data/definitions/172.html
CWE-173 cwe http://cwe.mitre.org/data/definitions/173.html
CWE-74 cwe http://cwe.mitre.org/data/definitions/74.html
CWE-20 cwe http://cwe.mitre.org/data/definitions/20.html
CWE-697 cwe http://cwe.mitre.org/data/definitions/697.html
CWE-707 cwe http://cwe.mitre.org/data/definitions/707.html
REF-1 reference_from_CAPEC G. Hoglund, G. McGraw, Exploiting Software: How to Break Code, 2004--02, Addison-Wesley
Explore
  1. Survey the application for user-controllable inputs: Using a browser, an automated tool or by inspecting the application, an adversary records all entry points to the application.

  2. Techniques
    Use a spidering tool to follow and record all links and analyze the web pages to find entry points. Make special note of any links that include parameters in the URL.
    Use a proxy tool to record all user input entry points visited during a manual traversal of the web application.
    Use a browser to manually explore the website and analyze how it is constructed. Many browsers' plugins are available to facilitate the analysis or automate the discovery.
    Manually inspect the application to find entry points.
Experiment
  1. Probe entry points to locate vulnerabilities: The adversary uses the entry points gathered in the "Explore" phase as a target list and injects postfix null byte(s) followed by a backslash to observe how the application handles them as input. The adversary is looking for areas where user input is placed in the middle of a string, and the null byte causes the application to stop processing the string at the end of the user input.

  2. Techniques
    Try different encodings for null such as \0 or %00 followed by an encoding for the backslash character.
Exploit
  1. Remove data after null byte(s): After determined entry points that are vulnerable, the adversary places a null byte(s) followed by a backslash such that they bypass an input filter and remove data after the null byte(s) in a way that is beneficial to them.

  2. Techniques
    If the input is a directory as part of a longer file path, add a null byte(s) followed by a backslash at the end of the input to try to traverse to the given directory.
  1. Null terminators are not properly handled by the filter.

Not present

Medium
An adversary needs to understand alternate encodings, what the filter looks for and the data format acceptable to the target API
Integrity Authorization Access Control Confidentiality
Modify Data Gain Privileges Gain Privileges Read Data
Gain Privileges
  1. A rather simple injection is possible in a URL: http://getAccessHostname/sekbin/helpwin.gas.bat?mode=&draw;=x&file;=x&module;=&locale;=[insert relative path here][%00][%5C]&chapter;= This attack has appeared with regularity in the wild. There are many variations of this kind of attack. Spending a short amount of time injecting against Web applications will usually result in a new exploit being discovered.