HITB-Invoice-Logo

thank you for joining us!

Exploiting Race Condition Vulnerabilities in Web Applications

Date

August 26, 2022

Time

17:30

Track

CommSec Track

This talk deals with “race conditions” in web applications. From 2021 to 2022 we have seen an increase in race condition reports with huge bugbounty payouts affecting MS, AWS, Instagram and others, for example, leading to MFA-Bypass. According to MITRE it is still a big “research gap” and based on how easily race conditions are introduced into code and how difficult they are to detect, there are probably still a lot of vulnerable applications out there. This type of vulnerability allows an attacker to create unforeseen states as a result of overlapping and parallel program code sequences. By cleverly exploiting these conditions, advantages can be gained, such as bypassing anti-brute force mechanisms, overriding limits, overvoting, and other attack scenarios. As part of this talk a developed penetration testing tool with a distributed approach and a demo web application that is vulnerable to this type of attack is being presented. With help of the demo application and the race condition testing tool real-world attack scenarios will be demonstrated. Also results of tested SAST/DAST tools will be given to show how difficult it is to prevent and also test for race condition vulnerabilities.

The learning objects of the talk are in the following order:

  1. Introduction to the Race Condition and TOCTOU vulnerabilities, how they work and why exploiting them can be attractive to an attacker, how little is known about them and perhaps too often overlooked in penetration testing.
  2. How easily the vulnerability exists in various web programming languages. And in which frameworks the vulnerabilities exist by default (example of a vulnerable PHP code snippet with race condition – “would you find it in a code review?”).
  3. Why our existing toolset consisting of DAST/SAST!/RASP/WAF etc. has difficulty preventing or detecting these vulnerabilities, and why it is necessary to look for race condition vulnerabilities as part of a penetration test.
  4. Actual and impressive attack scenarios from bugbounty reports have been implemented in a vulnerable demo application and will be attacked during a live demo. The audience with the mindset of a breaker will learn how to test for race conditions during penetration testing.

Speakers

Application Security Specialist

Sage

Javan works as a senior application security specialist and supports software development teams in securing the software development cycle. On the side, he teaches Secure Coding at DHBW University. Javan made his way into security through his keen interest in online gaming, where he soon began automating bots and reporting security vulnerabilities he found. He later turned his interests into his profession and became a security consultant. Javan brings experience as a penetration tester and holds certifications such as CISSP, CCSP, CSSLP and GXPN, as well as a Master’s degree in Information Security Management. As part of his master thesis, he researched about race conditions, which then has become his favourite vulnerability.

Other Talks in This Track

LOCATION

CommSec Track

DATE

August 26

TIME

10:30

LOCATION

CommSec Track

DATE

August 26

TIME

11:30

LOCATION

CommSec Track

DATE

August 26

TIME

12:00