Web application security - the fast guide 1.1 | Page 90

Chapter 5 - Attack Execution the client P a g e | 90 5.4 Flash Cookies (LSO) Send a request to sever to get App.swf 2 Client 1 Respond sending App.swf App.swf write on client machine .lso 3 Attacker alters .lso file written by App.swf since he has access to the machine 4 Send request by App.swf with altered parameters Server 5 Figure 31:Flash cookie attack process Flash uses what is called Flash Cookies for client-side storage which Is a text file with the extension (.lso) being able to access and manipulate this file will give the ability to change the behavior of the flash object. Attack requirement: A. Being able to access the LSO file B. No validation for data retrieved from the LSO files stored on the client. Attack process A. Access the LSO file. B. Use the LSO editor to change an invalidated value that might give higher privileges Example: This example will allow the attacker to get higher discount rate on a purchase done through a flash object. A. Locate the LSO file. B. Use LSO editor to change the discount value C. As soon as the flash object retrieve the local storage from the lso file it will apply the new discount rate if no validation where done by the server. Figure 32:Sol Edit tool