Page 77 - DCAP306_DCAP511_E-COMMERCE_AND_E-BUSINESS
P. 77

E-Commerce and E-Business




                                          3D3 ShopFactory Shopping Cart experienced price manipulation vulnerability,
                                          where product and price information stored in client-side cookies  was easily
                                          manipulated by an attacker.




                           Did you know?   Smartwin Technology's CyberOffice  Shopping Cart 2.0 was attacked by price
                                        manipulation technique. It happened when an attacker downloaded the order form
                                        from a local machine and resubmitted the form to the target server by modifying the
                                        hidden fields to arbitrary values.

                          3.   Buffer Overflow: This type of security vulnerability involves overloading a Web application by
                              sending data in larger volumes than its actual capacity. When this happens, the back-end of the
                              application may not be able  to process the large data and hence, would display a fatal error
                              message showing the location of  the functions. This would allow the attacker to access the
                              confidential information.

                                          In PDGSoft Shopping Cart, multiple buffer overflows were discovered that
                                          allowed the execution of attacker’s code by over-writing the saved return address.


                                        Error pages act as a source for confidential information. The errors appearing in the
                                        error pages can be added in Web applications that possess weak input validation
                                        techniques. For example, an application that is designed to recognize the numeric
                                        inputs would fail when alphabets or other special characters are provided as input.



                          4.   Cross-site Scripting: This type of security vulnerability is also known as XSS attack. The XSS
                              attack targets a Web page that uses a ‘form’ field to input the data from the user, processes the
                              entered data and displays the result on the Web page along with the user input.
                              XSS attacks can be commonly found in 'search' option of a Web site. When a user enters a keyword
                              for search, the search option prints the result with a line - 'Results for <user_supplied_input>'. In
                              case the user input is not displayed within a quote, then an attacker can create a JavaScript as a
                              part of user input and embed it with the URL. This script begins to execute when a common user
                              who is not aware of the scripting language clicks on the link. This way an attacker can steal the
                              user’s cookies, which contains the session ID and other confidential information.

                                          Consider a scenario where Citibank’s Web site was targeted by an attacker.  The
                                         attacker had created two windows to open on the user’s system. The first window
                                          was the original Citibank Web site and  the other was a pop up window that
                                          requested the user’s debit  card number,  PIN number, and card expiration date.
                                          When a user  entered this information, the site redirected the Web page to the
                                          attacker’s server and a tricked e-mail was sent to the Citibank account holders to
                                          verify their details. Thus, the attacker gained access to users account and the money
                                          was stolen.

                          5.   Remote Command Execution: This type of security vulnerability takes place when there is a weak
                              input validation technique used in Web sites. If a Web site includes Common Gateway Interface
                              (CGI) scripts,  an attacker can easily execute operating system commands. This  vulnerability is
                              found in Web applications that are designed using Perl and PHP scripts that use the 'system' call
                              command.




                          70                                     LOVELY PROFESSIONAL UNIVERSITY
   72   73   74   75   76   77   78   79   80   81   82