Skip to main content

2020 | OriginalPaper | Buchkapitel

Quantitative Assessment of Remote Code Execution Vulnerability in Web Apps

verfasst von : Md Maruf Hassan, Umam Mustain, Sabira Khatun, Mohamad Shaiful Abdul Karim, Nazia Nishat, Mostafijur Rahman

Erschienen in: InECCE2019

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

With the exponentially increasing use of online tools, applications that are being made for day to day purpose by small and large industries, the threat of exploitation is also increasing. Remote Code Execution (RCE) is one of the topmost critical and serious web applications vulnerability of this era and one of the major concerns among cyber threats, which can exploit web servers through their functionalities and using their scripts/files. RCE is an application layer vulnerability caused by careless coding practice which leads to a huge security breach that may bring unwanted resource loss or damages. An attacker may execute malicious code and take complete control of the targeted system with the privileges of an authentic user with this vulnerability. Attackers can attempt to advance their privileges after gaining access to the system. Remote Code Execution can lead to a full compromise of the vulnerable web application as well as the web server. This chapter highlights the concern and risk needed to put under consideration caused by RCE vulnerability of a system. Moreover, this study and its findings will help application developers and its stakeholders to understand the risk of data compromise and unauthorized access to the system. An exploitation algorithm is proposed to identify RCE vulnerability in web application. Then based on it, around 1011 web applications were taken under consideration and experiments were conducted by following manual double blinded penetration testing strategy. The experiments show that more than 12% of web application were found vulnerable to RCE. This study also explicitly listed the critical factors of Remote Code Execution vulnerability and improper input handling. The experimental results are promising to motivate developers to focus on security enhancement through proper and safe input handling.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
8.
Zurück zum Zitat Hassan MM, Bhuyian T, Sohel MK, Sharif MH, Biswas S (2018) SAISAN: an automated local file inclusion vulnerability detection model. Int J Eng Technol 7:4 Hassan MM, Bhuyian T, Sohel MK, Sharif MH, Biswas S (2018) SAISAN: an automated local file inclusion vulnerability detection model. Int J Eng Technol 7:4
9.
Zurück zum Zitat Huluka D, Popov O (2012) Root cause analysis of session management and broken authentication vulnerabilities. World congress on internet security (WorldCIS-2012), Guelph, ON, pp 82–86 Huluka D, Popov O (2012) Root cause analysis of session management and broken authentication vulnerabilities. World congress on internet security (WorldCIS-2012), Guelph, ON, pp 82–86
13.
Zurück zum Zitat Gupta BB, Arachchilage NAG, Psannis KE (2017) Defending against phishing attacks: taxonomy of methods, current issues and future directions. Telecommun Syst 67:247–267 Gupta BB, Arachchilage NAG, Psannis KE (2017) Defending against phishing attacks: taxonomy of methods, current issues and future directions. Telecommun Syst 67:247–267
14.
Zurück zum Zitat Sommestad T, Holm H, Ekstedt M (2012) Estimates of success rates of remote arbitrary code execution attacks. Inf Manage Comput Secur 20:107–122 Sommestad T, Holm H, Ekstedt M (2012) Estimates of success rates of remote arbitrary code execution attacks. Inf Manage Comput Secur 20:107–122
19.
Zurück zum Zitat Krejcie RV, Morgan DW (1970) Determining sample size for research activities. Educa Psychol Meas 30:607–610 Krejcie RV, Morgan DW (1970) Determining sample size for research activities. Educa Psychol Meas 30:607–610
20.
Zurück zum Zitat Stefinko Y, Piskozub A, Banakh R (2016) Manual and automated penetration testing. Benefits and drawbacks. Modern tendency. 2016 13th International Conference on Modern Problems of Radio Engineering, Telecommunications and Computer Science (TCSET). https://doi.org/10.1109/tcset.2016.7452095 Stefinko Y, Piskozub A, Banakh R (2016) Manual and automated penetration testing. Benefits and drawbacks. Modern tendency. 2016 13th International Conference on Modern Problems of Radio Engineering, Telecommunications and Computer Science (TCSET). https://​doi.​org/​10.​1109/​tcset.​2016.​7452095
Metadaten
Titel
Quantitative Assessment of Remote Code Execution Vulnerability in Web Apps
verfasst von
Md Maruf Hassan
Umam Mustain
Sabira Khatun
Mohamad Shaiful Abdul Karim
Nazia Nishat
Mostafijur Rahman
Copyright-Jahr
2020
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-15-2317-5_53