Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

HTTP parameter pollution

From Wikipedia, the free encyclopedia
Web security vulnerability
HTTP
Request methods
Header fields
Response status codes
Security access control methods
Security vulnerabilities

HTTP Parameter Pollution (HPP) is aweb applicationvulnerability exploited by injecting encodedquery stringdelimiters in already existingparameters. The vulnerability occurs if user input is not correctly encoded for output by a web application.[1] This vulnerability allows the injection of parameters into web application-created URLs. It was first brought forth to the public in 2009 by Stefano di Paola and Luca Carettoni, in the conferenceOWASP EU09 Poland.[1] The impact of such vulnerability varies, and it can range from "simple annoyance" to complete disruption of the intended behavior of a web application. Overriding HTTP parameters to alter a web application's behavior, bypassing input and access validation checkpoints, as well as other indirect vulnerabilities, are possible consequences of a HPP attack.[1]

There is noRFC standard on what should be done when it has passed multiple parameters. HPP could be used for cross channel pollution, bypassingCSRF protection andWAF input validation checks.[2]

Behaviour

[edit]

When they are passed multiple parameters with the same name, here is how various back ends behave.[3]

Behaviour when "param" is passed the values "val1" & "val2"
TechnologyParsing resultExample
ASP.NET/IISAll occurrences concatenated with a commaparam=val1,val2
ASP/IISAll occurrences concatenated with a commaparam=val1,val2
PHP/ApacheLast occurrence onlyparam=val2
PHP/ZeusLast occurrence onlyparam=val2
JSP, Servlet/Apache TomcatFirst occurrence onlyparam=val1
JSP, Servlet/Oracle Application ServerFirst occurrence onlyparam=val1
JSP, Servlet/JettyFirst occurrence onlyparam=val1
IBM Lotus DominoLast occurrence onlyparam=val2
IBM HTTP ServerFirst occurrence onlyparam=val1
mod_perl,libapreq2/ApacheFirst occurrence onlyparam=val1
Perl CGI/ApacheFirst occurrence onlyparam=val1
mod_wsgi (Python)/ApacheFirst occurrence onlyparam=val1
Python/ZopeAll occurrences in list(array)param=['val1','val2']

Types

[edit]

Client-side

[edit]
  • First Order / Reflected HPP[4]
  • Second Order / Stored HPP[4]
  • Third Order / DOM HPP[4]

Server-side

[edit]
  • Standard HPP[4]
  • Second Order HPP[4]

Prevention

[edit]

Proper input validation and awareness about web technology on HPP is protection against HTTP Parameter Pollution.[5]

See also

[edit]

References

[edit]
  1. ^abcBalduzzi et al. 2011, p. 2.
  2. ^"HTTP Parameter Pollution Vulnerabilities in Web Applications"(PDF). 2011.
  3. ^"WSTG - Latest:Testing for HTTP Parameter Pollution".
  4. ^abcdeLuca Carettoni; Stefano Di Paola."HTTP Parameter Pollution"(PDF).
  5. ^"How to Detect HTTP Parameter Pollution Attacks".

Bibliography

[edit]
Stub icon

ThisWorld Wide Web–related article is astub. You can help Wikipedia byexpanding it.

Retrieved from "https://en.wikipedia.org/w/index.php?title=HTTP_parameter_pollution&oldid=1173992729"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2025 Movatter.jp