Today, it is essential for an organization or individual owning digital solutions to keep it protected against an array of threats at bay. For example, those who are actively involved in web and API security must understand that tampering of parameters can hamper the business logic of a program/application big time if not addressed early and properly.
Taking application business logic into its nippers, a web parameter tampering attack is a serious threat to web applications. So, you must learn more about it.
In this post, we bring the key pointers of parameter tampering vulnerability, its meaning, and viable preventive methods to adopt.
This cybersecurity vulnerability entails tempering or modifying the parameters associated with the client and server. The critical-most parameters that are generall accessed, via multiple techniques, and are further modified so that a specific data/credential/information is obtained.
Here, the targeted parameter could be anything. It could be the sales data or user credentials. Only web application parameters, stockpiled in URL Query Strings, cookies, HTTP headers, and hidden fields in HTML forms, are used for this attack. Let’s learn about all these in detail.
Examples of parameter tampering
For those not knowing the meaning of HTTP header, it’s a term referring to the controlled piece of content/information that an HTTP-based request transmits from client to server and a server-side HTTP response delivers to the client. Every HTTP header features a standard ASCII text, a numeric value, and a name.
Most commonly, HTTP headers are consumed by web server software and browsers and often work silently. This is why they aren’t part of API security policy as well, in many cases.
However, some security-concerned developers decide to monitor received headers. Those who are involved in the job must pay extra attention to the client-side HTTP headers as, if adequate security measures aren’t adopted, client-side HTTP headers could feature corrupted links or codes, inserted by an attacker.
An attacker has to do extra labor to corrupt an HTTP header as most of the browsers restrict HTTP header access. For HTTP header modification, attackers usually write a customized program, using Perl code, or use any of the available free proxies. Both these options permit HTTP header tampering.
When it comes to HTTP header protection, client-side HTTP headers are hard to manage when they are created as the referer. The only way to keep the vulnerability odds as low as possible is not to use such headers.
When it comes to server-side HTTP headers, one can protect them against the vulnerability by using the cryptographic keys. Adding cryptographic keys makes the parameter hard to decode. By all means, HTTP headers should be entertained in the absence of robust security practices.
URL Query Strings
The URL query string is the query string, attached with the URL, after ?. Basically, whatever text you find in a URL after? is the URL query string.
In this URL, the text after? is name=ferret and is the URL query string. Character-wise, query strings consist of value and parameter and are linked with = sign. In the above example, name and ferret represent parameters and values respectively.
Now, let’s understand the meaning of URL query string tampering. It's an easy job for a skilled hacker as only a clever introduction of sensitive values via parameters is required. Once this is done, the attacker is successful in tampering with the URL query string and performing malicious actions.
A simple example, depicting URL query string manipulation, is mentioned below:
This altered query string parameter will lead to copying 10000 data in place of 1 user data.
From the above example, it’s clear that query string manipulation can cause damage beyond one’s understanding. Adopting best mitigation practices is a must to keep the risk under control.
To make this happen, security personnel have to confirm that every time a parameter travels from client to server, a verified session tone tugs along. It doesn’t matter whether the session token used is a cookie or a parameter. Its presence matters. Its additions improve the security of URL query strings.
Also, the web application should be guided to confirm the authenticity of the user before taking action against it. Parameters should only be processed or operated once it’s confirmed that they come from verified sources and are safe to further processing.
To prevent double query string tampering, it’s important to understand that a parameter shouldn’t be used as a URL or a hidden field. If that’s not ensured then users are allowed to modify the parameters and this is where the problem starts.
Additionally, it’s very crucial that a user isn’t allowed to see the parameter value. It should be implemented with no exceptions. Even a user shouldn’t be allowed to see the password in the parameter.
For sensitive parameters, the best preventive measure to be taken is adding a cryptographic key to them. Now, it could be done via two methods. The first way is to encrypt the whole query string and hidden form field values. This method works great for complete secrecy as users are not allowed to see or set the value.
The other way to add cryptographic protection in the query strings is to introduce an extra parameter having a value of MD5 digest. It’s not as good as the first method as a user can modify the value.
A cookie is a minute information section featuring details like search items, session tokens, browsing preferences, and so on. It’s produced by the server and is collected by the browser. As long as cookies are used for allotted purposes like understanding the browser’s preferences and search item details, they are harmless. The concerning aspect of cookies is that they are easy to modify by the client and get along with URL requests.
Many of us think that non-persistent cookies are not modifiable. But, it’s a misconception as tools like Winhex makes non-persistent cookies easy to modify. Also, SSL protection works until a cookie is in transit. After that, all the cookies are unprotected.
Mostly, the cookie manipulation involves arrays and session tokens, crucial for user authorization. Cookie manipulation is easy to carry out because most cookies are backed with an old-school and incompetent Base64 encoding scheme. This scheme lacks cryptographic protection. Hence, hackers don’t have to work very hard.
Even though cookie manipulation is easy for hackers, enforcing the right and strong mitigation techniques will reduce the dangers greatly. One of the most viable and easy mitigation techniques is to use one session token.
This session token should be linked with reference properties, warehoused at the server-side cache. This is done to ensure that the data remains sane during the transit and returns as a stable resource as it’s based on the principle of not trusting user inputs featuring pre-determined or defined values.
While you’re constructing the cookie-based preferences, make sure that the web application has to pay attention to the user property. To make this happen, the application must check the user ID along with its corresponding session table.
Taking the help of intrusion detection hooks also works well when a cookie is under evaluation for the presence of unacceptable or impossible values that create the foundation of cookie tempering.
Finally, encrypting cookies is crucial to stop tempering in the early stage. Now, the concerning question here is, how to encrypt cookies?
Well, you can make this happen via methods like cookie hashing, symmetric encryption, and a detailed comparison of hashes upon arrival.
HTML Form Field
An HTML form field is a company of HTML page, generated when a web application user makes a selection. This selection is stored as HTML form field values and is forwarded to the web application in the form of an HTTP request.
Mostly, GET and POST requests feature it. Along with the HTML form field, an HTML request can store field value in the form of Hidden Fields as well. However, hidden fields aren’t displayed by the browser. They are only collected and submitted in the form of the parameter at the time of form submission.
Regardless of the type, all the HTML form fields are available for user-side manipulation. End-users can add whatever value they want and control the HTML request processing. The most common values picked are editing the HTML, view source, and save.
Let’s understand this with the help of an example.
Say, there is a web application using a basic form for username and password details submission. The application is using HTTP requests and is backed by SSL encryption. On the frontend, it has 2 fields named Username and Password for the user to log in, in case his identity is verified.
In case an application or developer doesn’t want to enter a long username or password, pre-defining the maximum length of these values will help. This also prevents the insertion of buffer overflow of long parameters.
But, a skilled hacker can find a way to deal with this. S/he will simply save the page, delete the maximum length tag, and access the page once again in the private browser. This way, HTML form field parameter tampering is possible.
Some very commonly used form field parameters used for tempering are value, read-only, and disabled.
For developers, hidden form fields act like an easy in-browser data storage and are widely used in the wizard-based application for data transport.
The dangers of HTML form fields are various and must be avoided. This is why we’re going to explain key mitigation techniques. The first widely used technique is replacing the hidden form fields with one session token.
As hidden form fields are not visible, any tempering involving hidden form fields isn’t easy to spot. However, it could seem too daunting to many.
If that’s the case with you, the second mitigation approach to adopt is to combine the name/value pair, present in the hidden fields of a form, in a single string. Not many of us know this but there is a secret key that never comes into the public eye. It’s known as Outgoing Form Message. One can add it to the form field as extra hidden fields.
Once the form, featuring the Outgoing Form Message, is presented, incoming name/value pairs are bridged together into an Incoming Form Message with a secret key. Afterward, an MD5 digest for the Incoming Form Message is automatically computed.
When both the Incoming and Outgoing Form Digest are collected, they are compared thoroughly. If both values don’t coincide, it’s sure that the hidden field is modified or tampered.
However, to maintain the accuracy of the whole process, the name/pair values of both the Outgoing and Incoming Form Messages must be linked in the same order and format.
Along with HTML Form Field tempering, this parameter tampering mitigation technique works in the case of URL tampering.
How to prevent parameter tampering vulnerability?
If not handled properly for web or API, this issue can cause huge havoc. Hence, API security experts suggest adopting early and viable parameter tampering prevention techniques. We present you with the best options for you:
Using a whitelist format for both client-side and server-side inputs -Whitelisting is a standard process of allowing requests or inputs only if they match the pre-defined and administer approved.
A Firewall - It is a great way to control incoming and outgoing traffic to reduce security risks. Using a feature-rich cloud WAF provides extra security as it can handle APIs or microservices stored in any ecosystem.
Encryption - Usin it for the user session cookies is an easy way to keep the possibility of tampering under control.
No Explicit Passing - As mentioned above, any client-side cookie shouldn’t be a part of any key security choices. Parameters that aren’t a part of query strings are less prone to parameter tampering.
The security of digital solutions must be the first concern of any developer. Fixing the web or API parameter tampering should be a part of any viable security practice and methods like using encryption, keeping client-side cookies out of key security decisions, and using an effective cloud WAF can help you in this regard.
What is parameter tampering attack and how does it work?
Parameter tampering is a type of cyber attack that involves altering the parameters of a website's URL to gain unauthorized access to a website or application. Attackers can exploit known vulnerabilities by manipulating the input parameters in the URL to change data or execute malicious code.
What are the common methods of defending against parameter tampering?
To defend against parameter tampering, you can implement secure coding practices, input validation, and server-side validation. Also, using encryption can help to prevent unauthorized access to sensitive data. By regularly updating software and security patches, you can prevent vulnerabilities that could expose you to such attacks.
How impactful can parameter tampering be for businesses?
Parameter tampering attacks can result in significant financial and reputational losses for a business. If successful, attackers can gain access to sensitive data, deface websites, compromise customer credentials, or steal intellectual property. These incidents can result in prolonged downtime, costly legal fees, and loss of customer trust.
What are some real-world examples of parameter tampering attacks?
What is the current state of parameter tampering attacks in 2021?
According to a recent article by Securitymagazine, parameter tampering attacks are still prevalent, accounting for about 38% of all reported web application attacks in the first half of 2021.