Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Proxies Add a Protective Shield: Page 12 of 22

Cookie tampering: Our Web session IDs are tracked via cookies. By changing the value of the session ID, we could access other users' sessions. The test site used sequential session IDs, making it easy to guess valid values. Our application also uses a cookie to hold the user name of the logged in user; by changing the cookie value, we could change our login identity.

Cross-site scripting: JavaScript was inserted/appended into various query parameters in an attempt to have the JavaScript executed in the browser.

Server headers exposed: The server header (often referred to as a "banner") tells the attacker what version of Web server you are running--and, therefore, what vulnerabilities it might contain. PHP also adds an additional 'X-Powered-By: PHP/4.x' header. Partial failure means the product removed/replaced the standard server header but left the non-standard PHP header.

IIS ASP chunked encoding buffer overflow: (CAN-2002-0079) The ASP handler on IIS contains a buffer overflow on the handling of chunked post requests, letting us run arbitrary code or render the IIS ASP handler unusable.

IIS IDA handler leakage: (CAN-2000-0071) We made a simple request for "/.ida" in order to view any diagnostic error messages.