A Test Case Generation Approach for Exploiting Access Control Vulnerabilities Based on Policy Inference
Shuo WEN,Jing XU,Li-Ying YUAN,Xiao-Hong LI,Si-Han XU,Guan-Nan SI
DOI: https://doi.org/10.11897/SP.J.1016.2017.02658
2018-01-01
Abstract:Web applications have become more and more popular for delivering information over the Internet.Although most of web applications implement access control mechanisms that restrict the data access privileges of different roles and users,access control vulnerabilities still exist due to incomplete design of access control mechanisms,in which case attackers could access sensitive data illegally.To achieve accurate access control mechanisms,it is significant to generate accurate and efficient test cases.However,existing test case generation approaches have high redundancy and false negatives.In this paper,we propose a novel test case generation approach based on policy inference,which is according to access control models of web applications,to discover access control vulnerabilities within web applications.This approach identifies the sets of authorized operations from two levels,i.e.,role and user,then infers access control policy,and finally utilizes the inferred policy to generate legal and illegal test cases.The legal test cases aim to verify the legality of the inferred policy,while the illegal test cases generated by violating authorized constraints are utilized for exploiting access control vulnerabilities within web applications.A prototype system ACV-Scanner is also implemented for evaluation over a set of web applications.The experiment results demonstrate that our method can effectively decrease test cases,reduce false negative and improve the efficiency while comprehensively exploiting different categories of access control vulnerabilities.