Potential Web Backdoor

OWASP 2017-A10 PCI v3.2- CAPEC-443 CWE-507 HIPAA-507 ISO27001-A.12.2.1 WASC-15 WSTG-INFO-09

backdoor is a method implemented by an attacker or by a framework’s misconfiguration for bypassing normal authentication in a web application. A backdoor threat is a vulnerability misused by attackers through which the attacker accesses the application in the background. There are many servers with Potential web backdoor that gives attackers backdoor access a system. The result of this vulnerability involves remote access to resources like databases and file servers. The attacker will also be able to run system level commands on the server. The backdoors might be present in the web application’s code, client-server communication channel or multi-tier enterprise. A back door as also be said as an undocumented method to access the application.

There are two types of backdoors:-

  • Conventional backdoor: This backdoor includes any hidden parameters, repeating interfaces and many more.
  • Unconventional backdoor: This backdoor involves breaking authentication between two application’s components.

A backdoor can be found in the following places:-

  1. Administrator control page
  2. Repeating interfaces
  3. Hidden parameters
  4. Repeating users
  5. An uncontrolled authorisation for 3rd party access
  6. Authorisation between two components with loopholes

Impact

The attacker can do the following impacts:-

  • Execute malicious code
  • Unstable the web application
  • Remote Command Execution
  • Reading, updating and deleting arbitrary data/tables from the database

Mitigation / Precaution

Beagle recommends the following fixes:-

  • Implement a web application firewall.
  • Disable any potentially dangerous PHP functions.
  • Only allow whitelisted file types to be uploaded.

Latest Articles