Share to: share facebook share twitter share wa share telegram print page

Confused deputy problem

In information security, a confused deputy is a computer program that is tricked by another program (with fewer privileges or less rights) into misusing its authority on the system. It is a specific type of privilege escalation.[1] The confused deputy problem is often cited as an example of why capability-based security is important.

Capability systems protect against the confused deputy problem, whereas access-control list–based systems do not.[2]

Example

In the original example of a confused deputy,[3] there was a compiler program provided on a commercial timesharing service. Users could run the compiler and optionally specify a filename where it would write debugging output, and the compiler would be able to write to that file if the user had permission to write there.

The compiler also collected statistics about language feature usage. Those statistics were stored in a file called "(SYSX)STAT", in the directory "SYSX". To make this possible, the compiler program was given permission to write to files in SYSX.

But there were other files in SYSX: in particular, the system's billing information was stored in a file "(SYSX)BILL". A user ran the compiler and named "(SYSX)BILL" as the desired debugging output file.[citation needed]

This produced a confused deputy problem. The compiler made a request to the operating system to open (SYSX)BILL. Even though the user did not have access to that file, the compiler did, so the open succeeded. The compiler wrote the compilation output to the file (here "(SYSX)BILL") as normal, overwriting it, and the billing information was destroyed.

The confused deputy

In this example, the compiler program is the deputy because it is acting at the request of the user. The program is seen as 'confused' because it was tricked into overwriting the system's billing file.

Whenever a program tries to access a file, the operating system needs to know two things: which file the program is asking for, and whether the program has permission to access the file. In the example, the file is designated by its name, “(SYSX)BILL”. The program receives the file name from the user, but does not know whether the user had permission to write the file. When the program opens the file, the system uses the program's permission, not the user's. When the file name was passed from the user to the program, the permission did not go along with it; the permission was increased by the system silently and automatically.

It is not essential to the attack that the billing file be designated by a name represented as a string. The essential points are that:

  • the designator for the file does not carry the full authority needed to access the file;
  • the program's own permission to access the file is used implicitly.

Other examples

Prototypical confused deputy Barney Fife

A cross-site request forgery (CSRF) is an example of a confused deputy attack that uses the web browser to perform sensitive actions against a web application. A common form of this attack occurs when a web application uses a cookie to authenticate all requests transmitted by a browser. Using JavaScript, an attacker can force a browser into transmitting authenticated HTTP requests.

The Samy computer worm used cross-site scripting (XSS) to turn the browser's authenticated MySpace session into a confused deputy. Using XSS the worm forced the browser into posting an executable copy of the worm as a MySpace message which was then viewed and executed by friends of the infected user.

Clickjacking is an attack where the user acts as the confused deputy. In this attack a user thinks they are harmlessly browsing a website (an attacker-controlled website) but they are in fact tricked into performing sensitive actions on another website.[4]

An FTP bounce attack can allow an attacker to connect indirectly to TCP ports to which the attacker's machine has no access, using a remote FTP server as the confused deputy.

Another example relates to personal firewall software. It can restrict Internet access for specific applications. Some applications circumvent this by starting a browser with instructions to access a specific URL. The browser has authority to open a network connection, even though the application does not. Firewall software can attempt to address this by prompting the user in cases where one program starts another which then accesses the network. However, the user frequently does not have sufficient information to determine whether such an access is legitimate—false positives are common, and there is a substantial risk that even sophisticated users will become habituated to clicking "OK" to these prompts.[5]

Not every program that misuses authority is a confused deputy. Sometimes misuse of authority is simply a result of a program error. The confused deputy problem occurs when the designation of an object is passed from one program to another, and the associated permission changes unintentionally, without any explicit action by either party. It is insidious because neither party did anything explicit to change the authority.

Solutions

In some systems it is possible to ask the operating system to open a file using the permissions of another client. This solution has some drawbacks:

  • It requires explicit attention to security by the server. A naive or careless server might not take this extra step.
  • It becomes more difficult to identify the correct permission if the server is in turn the client of another service and wants to pass along access to the file.
  • It requires the client to trust the server to not abuse the borrowed permissions. Note that intersecting the server and client's permissions does not solve the problem either, because the server may then have to be given very wide permissions (all of the time, rather than those needed for a given request) in order to act for arbitrary clients.

The simplest way to solve the confused deputy problem is to bundle together the designation of an object and the permission to access that object. This is exactly what a capability is.[citation needed]

Using capability security in the compiler example, the client would pass to the server a capability to the output file, such as a file descriptor, rather than the name of the file. Since it lacks a capability to the billing file, it cannot designate that file for output. In the cross-site request forgery example, a URL supplied "cross"-site would include its own authority independent of that of the client of the web browser.

See also

References

  1. ^ Wu, Jianliang; Cui, Tingting; Ban, Tao; Guo, Shanqing; Cui, Lizhen (2015-09-10). "PaddyFrog: systematically detecting confused deputy vulnerability in Android applications: PaddyFrog: systematically detecting confused deputy vulnerability in Android applications". Security and Communication Networks. 8 (13): 2338–2349. doi:10.1002/sec.1179.
  2. ^ "ACLs don't". sourceforge.net.
  3. ^ "The Confused Deputy (or why capabilities might have been invented)". Archived from the original on 2003-12-05. Retrieved 2003-12-31.
  4. ^ "clickjacking: The Confused Deputy rides again!". sourceforge.net.
  5. ^ Alfred Spiessens: Patterns of Safe Collaboration, PhD thesis. http://www.evoluware.eu/fsp_thesis.pdf Section 8.1.5

This information is adapted from Wikipedia which is publicly available.

Read other articles:

Artikel ini tidak memiliki referensi atau sumber tepercaya sehingga isinya tidak bisa dipastikan. Tolong bantu perbaiki artikel ini dengan menambahkan referensi yang layak. Tulisan tanpa sumber dapat dipertanyakan dan dihapus sewaktu-waktu.Cari sumber: Silmy Karim – berita · surat kabar · buku · cendekiawan · JSTOR Silmy KarimDirektur Jenderal Imigrasi, Silmy KarimDirektur Jenderal ImigrasiPetahanaMulai menjabat 04 Januari 2023Direktur Utama PT Krakat…

Indigenous peoples of the United States This article is about the Native American peoples. For the attack helicopter, see Boeing AH-64 Apache. For the web server software, see Apache HTTP Server. For the software foundation, see The Apache Software Foundation. For other uses, see Apache (disambiguation). This article needs additional citations for verification. Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and removed.Find sources:…

Artikel ini sebatang kara, artinya tidak ada artikel lain yang memiliki pranala balik ke halaman ini.Bantulah menambah pranala ke artikel ini dari artikel yang berhubungan atau coba peralatan pencari pranala.Tag ini diberikan pada Februari 2023. SD Swasta MashitaInformasiJenisSekolah SwastaAlamatLokasi, Batam, Kepri,  IndonesiaMoto SD Swasta Mashita, merupakan salah satu Sekolah Dasar swasta yang ada di Batam, Provinsi Kepulauan Riau. Sama dengan SD pada umumnya di Indonesia masa pendidikan…

Літня універсіада 1979 Спортивний сезон літня Універсіадаd Вид спорту літній спортd Країна  Мексика Місце розташування Мехіко Попередник Літня Універсіада 1977 Наступник Літня Універсіада 1981 Номер видання 10 Дата й час 1979 Час/дата початку 2 вересня 1979 Час/дата закінчення 13 в…

  لمعانٍ أخرى، طالع تيم باريت (توضيح). هذه المقالة يتيمة إذ تصل إليها مقالات أخرى قليلة جدًا. فضلًا، ساعد بإضافة وصلة إليها في مقالات متعلقة بها. (نوفمبر 2018) تيم باريت معلومات شخصية الميلاد 31 مايو 1929[1]  لندن  الوفاة 20 أغسطس 1990 (61 سنة) [1]  كنت  مواطنة المملكة…

هذه المقالة يتيمة إذ تصل إليها مقالات أخرى قليلة جدًا. فضلًا، ساعد بإضافة وصلة إليها في مقالات متعلقة بها. (نوفمبر 2019) ميخائيل ماكهيو (بالإنجليزية: Michael Hudson McHugh)‏  معلومات شخصية الميلاد 1 نوفمبر 1935 (88 سنة)  نيوساوث ويلز  الإقامة كانبرا (12 يونيو 1989–1 يناير 2001)[1][2]…

هذه المقالة بحاجة لصندوق معلومات. فضلًا ساعد في تحسين هذه المقالة بإضافة صندوق معلومات مخصص إليها. تسمية الاتحاد الدولي للكيمياء البحتة والتطبيقية (أيوباك) نظام معتمد من International Union of Pure and Applied Chemistry (IUPAC) في تسمية المركبات الكيميائية والتي تصف علم الكيمياء بشكل عام.[1][2 …

American stock car and sprint car driver NASCAR driver Harold DunawayDunaway with #55 Outlaw Mini SprintBorn(1933-10-07)October 7, 1933Mecklenburg County, North Carolina, United StatesDiedSeptember 3, 2012(2012-09-03) (aged 78)Gaston Memorial Hospital, Gastonia, North CarolinaNASCAR Cup Series career1 race run over 1 yearBest finish123rd (1966)First race1966 Peach Blossom 500 (Rockingham) Wins Top tens Poles 0 0 0 Harold Glenn Dunaway (October 7, 1933 – September 3, 2012) was an American …

Lambang Montferrat. Bonifacius dari Montferrat (bahasa Italia: Bonifacio del Monferrato; bahasa Yunani: Βονιφάτιος Μομφερρατικός, Vonifatios Momferratikos) (skt. 1150 – 4 September 1207) merupakan Markis Montferrat (dari tahun 1192), pemimpin Perang Salib Keempat (1201-04) dan Raja Tesalonika (dari tahun 1205). Kehidupan awal Bonifacius adalah putra ketiga dari Guglielmo V dan Julitta, yang lahir setelah ayahandanya kembali dari Perang Salib Kedua. Ia adalah adik…

Thai TV show host and businessman Nawat ItsaragrisilItsaragrisil in 2013Born (1973-08-10) 10 August 1973 (age 50)Damnoen Saduak, Ratchaburi, Thailand[1]CitizenshipThailandDominica[2]Alma materUniversity of the Thai Chamber of Commerce[3]OccupationsMedia PersonalityBusiness ManYears active1994–presentKnown forMiss Grand International Nawat Itsaragrisil (Thai: ณวัฒน์ อิสรไกรศีล) is a Thai media personality and businesspe…

この項目では、男子代表について説明しています。女子代表については「サッカーオーストリア女子代表」をご覧ください。 サッカーオーストリア代表 国または地域  オーストリア協会 オーストリアサッカー協会監督 ラルフ・ラングニック最多出場選手 マルコ・アルナウトヴィッチ(110試合)最多得点選手 アントン・ポルスター(44得点) ホームカラー アウェイカ…

Este artigo não cita fontes confiáveis. Ajude a inserir referências. Conteúdo não verificável pode ser removido.—Encontre fontes: ABW  • CAPES  • Google (N • L • A) (Novembro de 2021) Real brasão de Armas da Escócia, onde consta o lema A frase latina Nemo me impune lacessit (em português Ninguém me fere impunemente) era o lema oficial do Reino da Escócia, usado no Brasão de armas da Escócia. Atualmente, é o lema do mon…

Pays-Bas Données clés Coupe du monde   · Participations 2 (2018) · Meilleur résultat 10e (2013) Données clés Sevens World Series   · Participations 4 (2018-2019) · Meilleur résultat 7e Données clés Jeux olympiques   · Participations 0/2 (en 2020) · Meilleur résultat - modifier L'équipe des Pays-Bas féminine de rugby à sept est l'équipe qui représente les Pays-Bas dans les principales compétitions internationales de rugby à sept, entre…

Form of democracy For other uses, see Direct democracy (disambiguation). A Landsgemeinde, cantonal assembly, in the canton of Glarus on 7 May 2006, Switzerland. Landsgemeinden are public voting gatherings and are one of the oldest examples of direct democracy. Part of the Politics seriesDirect democracy Referendum types Optional referendum Legislative referral Popular initiative Recall referendum Popular referendum Mandatory referendum Referendums by country Australia Canada Czechia EU France Ge…

1961 BRDC International Trophy Non-championship race in the 1961 Formula One season Race detailsDate 6 May 1961Official name XIII BRDC International TrophyLocation Silverstone Circuit, NorthamptonshireCourse Permanent racing facilityCourse length 4.710 km (2.927 mi)Distance 80 laps, 376.80 km (234.13 mi)Weather Very wetPole positionDriver Bruce McLaren Cooper-ClimaxTime 1:34.2Fastest lapDriver Stirling Moss Cooper-ClimaxTime 1:52.4PodiumFirst Stirling Moss Cooper-ClimaxSecond…

This article needs additional citations for verification. Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and removed.Find sources: Haywood Academy – news · newspapers · books · scholar · JSTOR (October 2022) (Learn how and when to remove this template message) Academy in Stoke On Trent, Staffordshire, EnglandHaywood AcademyAddressHigh LaneStoke On Trent, Staffordshire, ST6 7ABEnglandCoordinat…

Sarappo LompoPulau Sarappo LompoSarappo LompoTampilkan peta Sulawesi SelatanSarappo LompoTampilkan peta SulawesiSarappo LompoTampilkan peta IndonesiaSarappo LompoTampilkan peta Asia TenggaraEtimologidari bahasa Makassar dialek Lakiung/Pabbiring Sarappo berarti buah pinang dan Lompo berarti besarGeografiLokasiSelat MakassarAsia TenggaraSamudra HindiaKoordinat4°49′2.300″S 119°13′39.500″E / 4.81730556°S 119.22763889°E / -4.81730556; 119.22763889KepulauanKepulauan…

Makam Raja Muryeong Makam Raja Muryeong adalah sebuah situs bersejarah yang terletak di komplek Makam Raja-raja Baekje, Songsan-ri, Gongju, Korea Selatan.[1] Pada tahun 2015, makam ini beserta Situs-situs Bersejarah Kerajaan Baekje lain dimasukkan sebagai Situs Warisan Dunia UNESCO.[2] Makam Raja-raja Baekje Songsan-ri (송산리고분) Diperkirakan awalnya terdapat 10 makam,[3] tetapi hanya 7 makam yang teridentifikasi. Semuanya berasal dari Periode Ungjin (setelah Ibu k…

Island in French Polynesia For the town in Thailand, see Hua Hin. Commune in French Polynesia, FranceHuahineCommuneNASA picture of Huahine viewed from the north FlagLocation of Huahine Coordinates: 16°44′S 151°00′W / 16.73°S 151.0°W / -16.73; -151.0CountryFranceOverseas collectivityFrench PolynesiaSubdivisionLeeward IslandsGovernment • Mayor (2020–2026) Marcelin Lisan[1]Area175 km2 (29 sq mi)Population (2017)6,075 …

Shadow Secretary of State for TransportIncumbentLouise Haighsince 29 November 2021Shadow Cabinet of the United KingdomReports toLeader of the OppositionAppointerLeader of the OppositionWebsiteThe Shadow CabinetThe Shadow Secretary of State for Transport is a political post in the United Kingdom. It has been consistently held by a member of the Official Opposition Shadow Cabinet since May 1979. The Shadow Secretary helps hold the Transport Secretary and junior ministers to account and is the…

Kembali kehalaman sebelumnya

Lokasi Pengunjung: 3.135.200.121