Naziv
|
WSDL Scanning
|
Sažetak
|
This attack targets the WSDL interface made available by a web service. The attacker may scan the WSDL interface to reveal sensitive information about invocation patterns, underlying technology implementations and associated vulnerabilities. This type of probing is carried out to perform more serious attacks (e.g. parameter tampering, malicious content injection, command injection, etc.). WSDL files provide detailed information about the services ports and bindings available to consumers. For instance, the attacker can submit special characters or malicious content to the Web service and can cause a denial of service condition or illegal access to database records. In addition, the attacker may try to guess other private methods by using the information provided in the WSDL files.
|
Preduvjeti
|
A client program connecting to a web service can read the WSDL to determine what functions are available on the server.|The target host exposes vulnerable functions within its WSDL interface.
|
Rješenja
|
['It is important to protect WSDL file or provide limited access to it.', 'Review the functions exposed by the WSDL interface (especially if you have used a tool to generate it). Make sure that none of them is vulnerable to injection.', 'Ensure the WSDL does not expose functions and APIs that were not intended to be exposed.', 'Pay attention to the function naming convention (within the WSDL interface). Easy to guess function name may be an entry point for attack.', 'Validate the received messages against the WSDL Schema. Incomplete solution.']
|