Method and device for ultra vires vulnerability detection

A vulnerability detection and vulnerability technology, applied in the computer field, can solve problems such as low efficiency and misjudgment, and achieve the effect of improving detection efficiency and reducing the probability of false positives

Active Publication Date: 2018-12-04
PING AN TECH (SHENZHEN) CO LTD
View PDF5 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The present invention provides a method and device for detecting unauthorized leaks, which solves the problems of low efficiency and misjudgment in manual detection of unauthorized leaks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for ultra vires vulnerability detection
  • Method and device for ultra vires vulnerability detection
  • Method and device for ultra vires vulnerability detection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0038] see first figure 1 , figure 1 It is a schematic flow diagram of an unauthorized vulnerability detection method provided by an embodiment of the present invention. As shown in the figure, the method includes:

[0039] S101. Trigger multiple service logics of the system to be detected through the first account.

[0040] Here, the first account is a user account on the system to be detected, through which the system to be detected can be lo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method and a device for ultra vires vulnerability detection are disclosed. The method includes: triggering a plurality of service logics of a to-be-detected system through a first account; respectively obtaining a first service request corresponding to each of the service logics triggered by the first account and first returning data corresponding to each first service request, wherein an identity identification parameter in the first service request is an identity identification parameter corresponding to the first account; modifying the identity identification parameter in each first service request to the identity identification parameters corresponding to a second account respectively, and obtaining second returning data corresponding to each first service request after the identityidentification parameters are modified, respectively; if a second service request exists in the first service request, determined that the service logic corresponding to the second service request has an ultra vires vulnerability, and similarity between the first returning data and the second returning data corresponding to the second service request is greater than a first similarity threshold.The scheme can improve detection efficiency and reduce false alarm rate of ultra vires vulnerability detection.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to a method and device for detecting unauthorized loopholes. Background technique [0002] Privilege violation vulnerability is a common security vulnerability in web applications. It means that due to the negligence of programmers, there is no strict restriction on the permissions or users required for an operation, so that users who should not have operation permissions can perform normal operations. The threat is that one user can control the user data of the entire site, that is, an attacker can use a legitimate account to perform illegal operations on other account data that has an unauthorized defect vulnerability, such as query, insert, delete, modify and other routine database commands. [0003] Privilege violation vulnerability is a kind of business logic vulnerability, which cannot be reinforced through external web application firewall (WebApplication Firewall, WAF), an...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/50
CPCG06F21/50G06F2221/2141
Inventor 高亭宇
Owner PING AN TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products