PRIVILEGE-ESCALATION VULNERABILITY DETECTION IMPLEMENTATION WITH STATIC CODE ANALYSIS

Broken access control vulnerabilities are one of the most significant vulnerabilities in software security. Despite the reputation, the detection of broken access control vulnerabilities using static code analysis tools is challenging because each software developed has different specification pa...

Full description

Saved in:
Bibliographic Details
Main Author: Andrew
Format: Final Project
Language:Indonesia
Online Access:https://digilib.itb.ac.id/gdl/view/86183
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Institut Teknologi Bandung
Language: Indonesia
Description
Summary:Broken access control vulnerabilities are one of the most significant vulnerabilities in software security. Despite the reputation, the detection of broken access control vulnerabilities using static code analysis tools is challenging because each software developed has different specification patterns. Popular static code analysis tools do not thoroughly detect broken access control vulnerabilities, especially privilege escalation. Several approaches are used to detect broken access control vulnerabilities. One approach involves comparing the number of context-free grammars and redirection sets of two different roles. Another approach involves creating a control flow graph model based on vulnerable code and patched code. In this paper, a static code analysis tool is developed to detect privilege escalation vulnerabilities. The chosen method leverages the comparison of execution flows by two different roles. Given an access control policy specification for each role, the tool is expected to detect privilege escalation vulnerabilities. From 3 source codes tested by the tool, 6 sensitive endpoints were found, 2 of which were vulnerable. Given a specification for several roles in the source code, the tool can compare execution flows and detect privilege escalation vulnerabilities within the source code. It was found that the tool is not yet effective enough in detecting vulnerabilities in large and more complex source codes. Several suggestions can be applied to improve the effectiveness of the tool in detecting privilege escalation vulnerabilities.