Skip to main content
Announcements
Qlik Connect 2024! Seize endless possibilities! LEARN MORE

Test Ability to Forge Requests in Qlik Sense Enterprise on Windows

No ratings
cancel
Showing results for 
Search instead for 
Did you mean: 
ToniKautto
Employee
Employee

Test Ability to Forge Requests in Qlik Sense Enterprise on Windows

Last Update:

Mar 21, 2022 7:52:19 PM

Updated By:

ToniKautto

Created date:

Mar 21, 2022 7:52:19 PM

Forging requests is a method that attackers use to circumvent the front-end GUI application to directly submit information for back-end processing. The goal of the attacker is to send HTTP POST/GET requests through an intercepting proxy with data values that is not supported, guarded against, or expected by the application's business logic. Some examples of forged requests include exploiting guessable or predictable parameters or exposing “hidden” features and functionality such as enabling debugging or presenting special screens or windows that are very useful during development but may leak information or bypass the business logic.

Vulnerabilities related to the ability to forge requests are unique to each application and different from business logic data validation in that its focus is on breaking the business logic workflow.

Applications should have logic checks in place to prevent the system from accepting forged requests that may allow attackers the opportunity to exploit the business logic, process, or flow of the application. Request forgery is nothing new; the attacker uses an intercepting proxy to send HTTP POST/GET requests to the application. Through request forgeries, attackers may be able to circumvent the business logic or process by finding, predicting, and manipulating parameters to make the application think a process or task has or has not taken place.

Applications must have logical controls in place to prevent the system from accepting forged requests that may allow attackers to exploit business logic or application flow. 

In Qlik Sense Enterprise on Windows, attribute-based access control (ABAC) is defined as an access control method where user requests to perform actions on resources are granted based on assigned attributes of the user, assigned attributes of the resource, environment conditions, and a set of security rules that are specified in terms of those attributes and conditions. 
Security rules control access to application streams in the hub, capabilities within applications (sheet, story, bookmark creation), and administrative capabilities in the QMC (publish apps, set stream access, create and run tasks). 

Environment

  • Qlik Sense Enterprise on Windows, All versions

Example 

This example shows that HTTP responses can be manipulated to alter the web interface. The actual action and access related to the false UI options can not be executed, due to the back-end access control and missing user authorization. 

  1. A user has limited access to Qlik Management Console. 
    ToniKautto_0-1647905769354.png
  2. The HTTP response is captured and manipulated.
    ToniKautto_1-1647906275005.png
  3. The Users section is enabled in the web interface, without changing the deployment configuration
    ToniKautto_2-1647906342773.png
  4. Selecting the Users in the menu returns an error
    ToniKautto_3-1647906545938.png

 

Related Test Scenarios

  • Test Ability to forge requests (OTG-BUSLOGIC-002)

References 

Contributors
Version history
Last update:
‎2022-03-21 07:52 PM
Updated by: