Web application security - the fast guide 1.1 | Page 101

Chapter 5 - Attack Execution the client P a g e | 101 This attack depends on a simple idea, benefiting from an authority that no longer exist because the session is not invalidated properly. Attack requirement:  The application gives the ability for user to extend or preserve session for long in a high changing environment. Attack process: 1- Normally login before the denial period and extends the session time out using the given option. 2- After the denial period the user is still able to execute most of the denied activities. Example: One of the example given about this type of attacks is a successful fraud done by a person who was authorize to reach a shared bank account then denied. This person opened the e-banking account and authenticate himself before the removal of his name from the authorized users and activated the (maintain the session opened) option. After the removal of the person name from the shared account he still able to initiate transfer order and move money to another account. As noticed this type of attack is easy but it depends on the preexisting authentication and authorization to same resources to be executed successfully but it might cause a great damage, image what can unsatisfied high rank x- employee do to a company with such simple attack. 5.14 JSON Hijacking malicious user is able to hijack JavaScript to attack JavaScript Object Notation (JSON) strings. JSON hijacking is a relatively new risk in the Web 2.0. Attack requirement: JSON service that returns a JSON array and response is exposed to GET requests can be used to read private data  returns sensitive data.  returns a JSON array.  responds to GET requests.  the browser making the request has JavaScript enabled (very likely the case)  the browser making the request supports the __defineSetter__ method.