Bypassing Restrictive Perimeter Firewalls
نویسنده
چکیده
The XML port scanning technique described in this paper allows an attacker to utilise an XML parser to execute port scanning of systems behind a restrictive perimeter firewall. While the technique relies on some reasonably specific implementation details in order to be exploitable remotely, it is potentially applicable to any application that accepts XML document inputs. Several workarounds exist and have been detailed in this paper and the technique does not offer the ability to perform advanced fingerprinting or analysis of the underlying operating system of hosts. However, this technique demonstrates the danger that inadequately configured XML parsers can pose to an organisation and highlights the inability of traditional network security devices to handle application-level threats. Overview The use of eXtensible Markup Language (XML) has become largely ubiquitous as a means for exchanging information between heterogeneous platforms and systems. XML lies at the core of growing technologies such as web services and AJAX web applications and XML endpoints are commonly exposed to the Internet over ports 80 or 443. The extensible nature of XML provides significant flexibility in representing arbitrary data formats, and a number of supporting standards have been defined to allow the transformation, definition and transmission of XML data in a standardised manner. The XML parser is critical to the processing of XML and is often a complex and powerful software component. However, through exploiting weaknesses in default XML parser configurations, this component can be abused to perform malicious activities that undermine the perimeter security of an organisation's network and provide an attacker with detailed information about systems within an organisation. This can typically be achieved even in the presence of a highly restrictive perimeter firewall.
منابع مشابه
Bypassing Firewalls: Tools and Techniques
This paper highlights a very important problem with network perimeter firewalls. The threat discussed is not exactly new, but neither is it widely recognised— even amongst network security professionals. Most commercial firewalls claim to be application layer devices, but they derive very little useful information about the context of the application traffic that passes through them. Malicious ...
متن کاملDesigning an Academic Firewall: Policy, Practice, and Experience with SURF
Corporate network firewalls are well-understood and are becoming commonplace. These firewalls establish a security perimeter that aims to block (or heavily restrict) both incoming and outgoing network communication. We argue that these firewalls are neither effective nor appropriate for academic or corporate research environments needing to maintain information security while still supporting t...
متن کاملDesigning A Zero Trust Network With Next-Generation Firewalls
As enterprise boundaries blur due to an extended workforce of partners and contractors, and proliferation of mobile devices bring an increase in number and variety of devices connected to the network, the old paradigm of security controls at the perimeter or on user devices are no longer adequate. A new network security paradigm is needed – one that focuses on protecting the data at the heart o...
متن کاملDomain and Type Enforcement Firewalls
Internet-connected organizations often employ an Internet firewall to mitigate risks of system penetration, data theft, data destruction, and other security breaches. Conventional Internet firewalls, however, impose an overly simple inside-vs-outside model of security that is incompatible with many business practices that require extending limited trust to external entities, for example, suppli...
متن کاملMitigating Browser Based Exploits through Behavior Based Defenses and Hardware Virtualization
As the adoption of the Internet grows worldwide, the volumes of valuable data being transmitted and stored in digital format become increasingly attractive targets. Vulnerabilities and weaknesses in web architectures and environments which are tasked with storing and preserving this data have been and continue to be exploited every day. In recent years there has been a trend to directly exploit...
متن کامل