SlideShare a Scribd company logo
www.egi.euEGI-InSPIRE RI-261323
EGI-InSPIRE
www.egi.euEGI-InSPIRE RI-261323
Vulnerability Assessment of
Middleware Packages Supplied by
EMI: VOMS Core Case
Manuel Brugnoli, Elisa Heymann
UAB
www.egi.euEGI-InSPIRE RI-261323
Outline
• First Principles Vulnerability Assessment
(FPVA)
• VOMS Core
• VOMS Core assessment using FPVA
• Conclusions
Contents
www.egi.euEGI-InSPIRE RI-261323
“Is a primarily analyst-centric (manual)
approach to assessment, whose aim is to focus
the analyst’s attention on the parts of the
software system and its resources that are
mostly likely to contain vulnerabilities that
would provide access to high-value assets”*
* James A. Kupsch, Barton P. Miller, Eduardo César, and Elisa Heymann, "First Principles Vulnerability
Assessment" (extended version), MIST Project Technical Report, September 2009.
First Principles Vulnerability
Assessment (FPVA)
www.egi.euEGI-InSPIRE RI-261323
Architecture
Resources
Privileges
Components
Dissemination
to identify the major structural components
of the system, including modules, threads,
processes, and hosts.to identify the key resources accessed by
each component, and the operations
supported on those resources.identifies the trust assumptions about each
component, answering such questions as
how are they protected and who can
access them?
is to examine each component in depth. A
key aspect is that this step is guided by
information obtained in the first three steps,
helping to prioritize the work so that
highvalue targets are evaluated first.
artifacts produced by this step are
vulnerability reports, perhaps with
suggested fixes, to be provided to the
middleware developers.
First Principles Vulnerability
Assessment (FPVA)
www.egi.euEGI-InSPIRE RI-261323
Virtual Organization Membership Service (VOMS) serves
as a central repository for user authorization information,
providing support for sorting users into a general group
hierarchy, keeping track of their roles, etc.
VOMS Core is the server that receives requests from a
VOMS client and returns information about the user.
We worked with VOMS Core 2.0.2.
VOMS Core assessment using
FPVA
www.egi.euEGI-InSPIRE RI-261323
VOMS Server Host
DB
VOMS Admin
(Tomcat)
VOMS
daemon
User Host
Web
Browser
VOMS
Client
VOMS Admin
Client
HTTPS
SOAP over SSL
Ancillary
Utilities
GSI Connection
OS privileges
user daemon root
DB privileges
VO_Server
Command Line
Command Line
Web
Command Line
Step 1: VOMS 2.0.2 Architecture
Analysis
www.egi.euEGI-InSPIRE RI-261323
Step 1: VOMS Client-Server
Interaction
www.egi.euEGI-InSPIRE RI-261323
Step 2: VOMS Core 2.0.2 Resource
Analysis
www.egi.euEGI-InSPIRE RI-261323
Step 2: VOMS Core 2.0.2 Resource
Analysis
www.egi.euEGI-InSPIRE RI-261323
Step 3: VOMS Core 2.0.2 Privilege
Analysis
www.egi.euEGI-InSPIRE RI-261323
• Resource permissions:
• Evaluated the permissions of files that have a
high security value (certificate private keys,
database and configuration files).
• The permissions of these files appeared to be
correct.
Step 4: VOMS Core 2.0.2
Component Analysis
www.egi.euEGI-InSPIRE RI-261323
• User privileges:
• Client side:
• No privilege problems in the client commands.
• Server side:
• The voms daemon runs with root operating system privileges.
• Evaluated the source code looking for flaws that may
compromise the server.
• No privilege problems were found.
Step 4: VOMS Core 2.0.2
Component Analysis
www.egi.euEGI-InSPIRE RI-261323
• Dangerous functions:
• Evaluated the use of functions that commonly
result in security problems, such as system or
exec family functions.
• No vulnerabilities related to dangerous
functions were found.
Step 4: VOMS Core 2.0.2
Component Analysis
www.egi.euEGI-InSPIRE RI-261323
• Authentication Issues:
• Mutual authentication is performed between
the client and server.
• VOMS design makes the system quite strong,
and reduces many possible threats.
Step 4: VOMS Core 2.0.2
Component Analysis
www.egi.euEGI-InSPIRE RI-261323
• Network Layer Security:
• VOMS server creates a secure communication
channel via Globus GSI with the VOMS
Clients.
• The use of a encrypted channel provides
strong end-to-end data encryption and
integrity.
Step 4: VOMS Core 2.0.2
Component Analysis
www.egi.euEGI-InSPIRE RI-261323
• Injection Attacks:
• Evaluated the source code to ensure VOMS
correctly parses and checks the arguments
passed through the command line.
• Appropriate parsing is performed to protect
against command injection vulnerabilities.
Step 4: VOMS Core 2.0.2
Component Analysis
www.egi.euEGI-InSPIRE RI-261323
• Buffer overflows:
• VOMS Core is written in C/C++ → Checked for
potential buffer overflow problems.
• No dangerous behavior was detected.
Step 4: VOMS Core 2.0.2
Component Analysis
www.egi.euEGI-InSPIRE RI-261323
• Denial of Service Attacks:
• A DoS vulnerability was discovered and
reported to the VOMS developers.
• This vulnerability is caused by lack of limits on
the number of simultaneous connections.
• Full details about this were reported in the
vulnerability report VOMS-CORE-2011-0001.
Step 4: VOMS Core 2.0.2
Component Analysis
www.egi.euEGI-InSPIRE RI-261323
ConclusionsConclusions
No serious security problems in VOMS Core 2.0.2
was found:
• The attack surface in VOMS Core is very small.
• VOMS Core correctly parses and checks the arguments sent from the
client.
• The VOMS server uses a forking server model to handle all requests from
VOMS clients.
• The recommended operational configuration of a VOMS server node is a
highly secured host with limited local user access and other services.
• All communication between the VOMS server and VOMS clients is secure.
• A DoS vulnerability was found.
www.egi.euEGI-InSPIRE RI-261323
¿Questions?
Thank you!!!

More Related Content

PPTX
Os Command Injection Attack
PDF
Shellcoding in linux
PPTX
Computer security Description about SQL-Injection and SYN attacks
PDF
Browser Exploit Framework
PPTX
Evaluating container security with ATT&CK Framework
PDF
Distributed systems
PPTX
Red Teaming and Energy Grid Security
PDF
Thisworldofours
Os Command Injection Attack
Shellcoding in linux
Computer security Description about SQL-Injection and SYN attacks
Browser Exploit Framework
Evaluating container security with ATT&CK Framework
Distributed systems
Red Teaming and Energy Grid Security
Thisworldofours

Similar to Vulnerability Assessment of Middleware Packages Supplied by EMI: VOMS Core Case (20)

PDF
Security trend analysis with CVE topic models
PDF
How do JavaScript frameworks impact the security of applications?
PDF
Using Analyzers to Resolve Security Problems
PPTX
Open source security tools for Kubernetes.
PPTX
apidays LIVE New York 2021 - Supercharge microservices with Service Mesh by S...
PDF
Effectiveness of AV in Detecting Web Application Backdoors
PDF
Continuous Security: From tins to containers - now what!
PDF
Vulnerability Advisor Deep Dive (Dec 2016)
PPTX
Security for cloud native workloads
PPTX
A Distributed Malware Analysis System Cuckoo Sandbox
PDF
Grafana Alloy Best Practice presented in COSCUP 2024
PPTX
Web application vulnerability assessment
PPT
Chapter 6 overview
PPTX
Application cloudification with liberty and urban code deploy - UCD
PDF
Watch How The Giants Fall: Learning from Bug Bounty Results
PPTX
Envoy @ Lyft: developer productivity (kubecon 2.0)
PDF
Azure 101: Shared responsibility in the Azure Cloud
PPTX
Why Johnny Still Can’t Pentest: A Comparative Analysis of Open-source Black-b...
PDF
Laying the Foundation for Ionic Platform Insights on Spark
PDF
[OWASP Poland Day] A study of Electron security
Security trend analysis with CVE topic models
How do JavaScript frameworks impact the security of applications?
Using Analyzers to Resolve Security Problems
Open source security tools for Kubernetes.
apidays LIVE New York 2021 - Supercharge microservices with Service Mesh by S...
Effectiveness of AV in Detecting Web Application Backdoors
Continuous Security: From tins to containers - now what!
Vulnerability Advisor Deep Dive (Dec 2016)
Security for cloud native workloads
A Distributed Malware Analysis System Cuckoo Sandbox
Grafana Alloy Best Practice presented in COSCUP 2024
Web application vulnerability assessment
Chapter 6 overview
Application cloudification with liberty and urban code deploy - UCD
Watch How The Giants Fall: Learning from Bug Bounty Results
Envoy @ Lyft: developer productivity (kubecon 2.0)
Azure 101: Shared responsibility in the Azure Cloud
Why Johnny Still Can’t Pentest: A Comparative Analysis of Open-source Black-b...
Laying the Foundation for Ionic Platform Insights on Spark
[OWASP Poland Day] A study of Electron security
Ad

Recently uploaded (20)

PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Electronic commerce courselecture one. Pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Machine learning based COVID-19 study performance prediction
PDF
Spectral efficient network and resource selection model in 5G networks
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PPTX
sap open course for s4hana steps from ECC to s4
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
Per capita expenditure prediction using model stacking based on satellite ima...
Electronic commerce courselecture one. Pdf
Digital-Transformation-Roadmap-for-Companies.pptx
Machine learning based COVID-19 study performance prediction
Spectral efficient network and resource selection model in 5G networks
“AI and Expert System Decision Support & Business Intelligence Systems”
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Agricultural_Statistics_at_a_Glance_2022_0.pdf
MIND Revenue Release Quarter 2 2025 Press Release
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Mobile App Security Testing_ A Comprehensive Guide.pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
Dropbox Q2 2025 Financial Results & Investor Presentation
NewMind AI Weekly Chronicles - August'25 Week I
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Encapsulation_ Review paper, used for researhc scholars
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
sap open course for s4hana steps from ECC to s4
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
Ad

Vulnerability Assessment of Middleware Packages Supplied by EMI: VOMS Core Case

  • 1. www.egi.euEGI-InSPIRE RI-261323 EGI-InSPIRE www.egi.euEGI-InSPIRE RI-261323 Vulnerability Assessment of Middleware Packages Supplied by EMI: VOMS Core Case Manuel Brugnoli, Elisa Heymann UAB
  • 2. www.egi.euEGI-InSPIRE RI-261323 Outline • First Principles Vulnerability Assessment (FPVA) • VOMS Core • VOMS Core assessment using FPVA • Conclusions Contents
  • 3. www.egi.euEGI-InSPIRE RI-261323 “Is a primarily analyst-centric (manual) approach to assessment, whose aim is to focus the analyst’s attention on the parts of the software system and its resources that are mostly likely to contain vulnerabilities that would provide access to high-value assets”* * James A. Kupsch, Barton P. Miller, Eduardo César, and Elisa Heymann, "First Principles Vulnerability Assessment" (extended version), MIST Project Technical Report, September 2009. First Principles Vulnerability Assessment (FPVA)
  • 4. www.egi.euEGI-InSPIRE RI-261323 Architecture Resources Privileges Components Dissemination to identify the major structural components of the system, including modules, threads, processes, and hosts.to identify the key resources accessed by each component, and the operations supported on those resources.identifies the trust assumptions about each component, answering such questions as how are they protected and who can access them? is to examine each component in depth. A key aspect is that this step is guided by information obtained in the first three steps, helping to prioritize the work so that highvalue targets are evaluated first. artifacts produced by this step are vulnerability reports, perhaps with suggested fixes, to be provided to the middleware developers. First Principles Vulnerability Assessment (FPVA)
  • 5. www.egi.euEGI-InSPIRE RI-261323 Virtual Organization Membership Service (VOMS) serves as a central repository for user authorization information, providing support for sorting users into a general group hierarchy, keeping track of their roles, etc. VOMS Core is the server that receives requests from a VOMS client and returns information about the user. We worked with VOMS Core 2.0.2. VOMS Core assessment using FPVA
  • 6. www.egi.euEGI-InSPIRE RI-261323 VOMS Server Host DB VOMS Admin (Tomcat) VOMS daemon User Host Web Browser VOMS Client VOMS Admin Client HTTPS SOAP over SSL Ancillary Utilities GSI Connection OS privileges user daemon root DB privileges VO_Server Command Line Command Line Web Command Line Step 1: VOMS 2.0.2 Architecture Analysis
  • 7. www.egi.euEGI-InSPIRE RI-261323 Step 1: VOMS Client-Server Interaction
  • 8. www.egi.euEGI-InSPIRE RI-261323 Step 2: VOMS Core 2.0.2 Resource Analysis
  • 9. www.egi.euEGI-InSPIRE RI-261323 Step 2: VOMS Core 2.0.2 Resource Analysis
  • 10. www.egi.euEGI-InSPIRE RI-261323 Step 3: VOMS Core 2.0.2 Privilege Analysis
  • 11. www.egi.euEGI-InSPIRE RI-261323 • Resource permissions: • Evaluated the permissions of files that have a high security value (certificate private keys, database and configuration files). • The permissions of these files appeared to be correct. Step 4: VOMS Core 2.0.2 Component Analysis
  • 12. www.egi.euEGI-InSPIRE RI-261323 • User privileges: • Client side: • No privilege problems in the client commands. • Server side: • The voms daemon runs with root operating system privileges. • Evaluated the source code looking for flaws that may compromise the server. • No privilege problems were found. Step 4: VOMS Core 2.0.2 Component Analysis
  • 13. www.egi.euEGI-InSPIRE RI-261323 • Dangerous functions: • Evaluated the use of functions that commonly result in security problems, such as system or exec family functions. • No vulnerabilities related to dangerous functions were found. Step 4: VOMS Core 2.0.2 Component Analysis
  • 14. www.egi.euEGI-InSPIRE RI-261323 • Authentication Issues: • Mutual authentication is performed between the client and server. • VOMS design makes the system quite strong, and reduces many possible threats. Step 4: VOMS Core 2.0.2 Component Analysis
  • 15. www.egi.euEGI-InSPIRE RI-261323 • Network Layer Security: • VOMS server creates a secure communication channel via Globus GSI with the VOMS Clients. • The use of a encrypted channel provides strong end-to-end data encryption and integrity. Step 4: VOMS Core 2.0.2 Component Analysis
  • 16. www.egi.euEGI-InSPIRE RI-261323 • Injection Attacks: • Evaluated the source code to ensure VOMS correctly parses and checks the arguments passed through the command line. • Appropriate parsing is performed to protect against command injection vulnerabilities. Step 4: VOMS Core 2.0.2 Component Analysis
  • 17. www.egi.euEGI-InSPIRE RI-261323 • Buffer overflows: • VOMS Core is written in C/C++ → Checked for potential buffer overflow problems. • No dangerous behavior was detected. Step 4: VOMS Core 2.0.2 Component Analysis
  • 18. www.egi.euEGI-InSPIRE RI-261323 • Denial of Service Attacks: • A DoS vulnerability was discovered and reported to the VOMS developers. • This vulnerability is caused by lack of limits on the number of simultaneous connections. • Full details about this were reported in the vulnerability report VOMS-CORE-2011-0001. Step 4: VOMS Core 2.0.2 Component Analysis
  • 19. www.egi.euEGI-InSPIRE RI-261323 ConclusionsConclusions No serious security problems in VOMS Core 2.0.2 was found: • The attack surface in VOMS Core is very small. • VOMS Core correctly parses and checks the arguments sent from the client. • The VOMS server uses a forking server model to handle all requests from VOMS clients. • The recommended operational configuration of a VOMS server node is a highly secured host with limited local user access and other services. • All communication between the VOMS server and VOMS clients is secure. • A DoS vulnerability was found.