code review - networkshop44

23
Code review

Upload: jisc

Post on 14-Apr-2017

1.628 views

Category:

Education


0 download

TRANSCRIPT

Page 1: Code review - networkshop44

Code review

Page 2: Code review - networkshop44

Code Review

Richard Fuller, University of [email protected]

Page 3: Code review - networkshop44
Page 4: Code review - networkshop44
Page 5: Code review - networkshop44
Page 6: Code review - networkshop44

The Problem

17,394 ColdFusion source files Many hacked together in place Variety of skilled and unskilled developers

– Many of whom don’t work here anymore Mostly no test versions

– Not allowed to poke things (unlike attackers)

Page 7: Code review - networkshop44

OWASP Top 10

Provides a focus for training and review Initial focus on:

– Code execution– SQL injection– XSS

Page 8: Code review - networkshop44

Methodology

Track third level directories in a huge Google Sheet– Owner– Reviewer– Most serious exploit– Status

“Code Review” day No automated code review tools for ColdFusion, so…

Page 9: Code review - networkshop44
Page 10: Code review - networkshop44

Mechanical Turk

Recruited students on the Cyber Security MSc Can quickly teach someone to spot flaws in

ColdFusion– “ColdFusion for Pentesters”– “Deconstructing ColdFusion”

Decidedly more challenging with complex Java apps

Inability to recreate environment– Makes fixing harder

Page 11: Code review - networkshop44

What did we find?

Arbitrary file upload – Additional misconfiguration allowing access to all web

scripts and DB passwords 29 “apps” with SQL injection (mix of public and

authenticated) 33 with XSS (mix of stored and reflected) A few “generate arbitrary e-mail” scripts Downloadable source code with passwords in (wrong

extension, zip files, etc.) Username stored in cookies

Page 12: Code review - networkshop44

What will you find?

Page 13: Code review - networkshop44

What will you find?

Spoiler: It’s not going to be that different

Page 14: Code review - networkshop44

Really serious stuff

Disable code Fix web server config

Page 15: Code review - networkshop44

Competent responsible owner

Let the owner know a breakdown of the issues Offer them our training course Meet up with people

– People start coming to you

Page 16: Code review - networkshop44

Everything else

Asking people to fix their code? No. Asking if we could fix their code? No. Promising to remove their code in two weeks? Sort of.

– Surprisingly little resistance– Or consequence

Page 17: Code review - networkshop44

Webapp Security Training

Full day course offered to developers across the University

Theory and practical “hacking” exercises– DVWA running in VirtualBox– sqlmap

Find out what languages used in advanced

Page 18: Code review - networkshop44
Page 19: Code review - networkshop44

Embedding code review

Automated, continuous deployment with Jenkins Code review with Review Board

– Helps get more developers familiar with the code

– Gets two pairs of eyes on security Lightweight, but effective

Page 20: Code review - networkshop44
Page 21: Code review - networkshop44
Page 22: Code review - networkshop44

Questions?

Page 23: Code review - networkshop44

jisc.ac.uk

Contact

Richard FullerUniversity of [email protected]