Menu
Home Explore People Places Arts History Plants & Animals Science Life & Culture Technology
On this page
Mass assignment vulnerability
Inability of software to discern authorized from unauthorized data modification requests

Mass assignment is a computer vulnerability where an active record pattern in a web application is abused to modify data items that the user should not normally be allowed to access such as password, granted permissions, or administrator status.

Many web application frameworks offer an active record and object-relational mapping features, where external data in serialization formats is automatically converted on input into internal objects and, in turn, into database record fields. If the framework's interface for that conversion is too permissive and the application designer doesn't mark specific fields as immutable, it is possible to overwrite fields that were never intended to be modified from outside (e.g. admin permissions flag).

These vulnerabilities have been found in applications written in Ruby on Rails, ASP.NET MVC, and Java Play framework.

In 2012 mass assignment on Ruby on Rails allowed bypassing of mapping restrictions and resulted in proof of concept injection of unauthorized SSH public keys into user accounts at GitHub. Further vulnerabilities in Ruby on Rails allowed creation of internal objects through a specially crafted JSON structure.

In ASP.NET Core mapping restriction can be declared using the [BindNever] attribute.

We don't have any images related to Mass assignment vulnerability yet.
We don't have any YouTube videos related to Mass assignment vulnerability yet.
We don't have any PDF documents related to Mass assignment vulnerability yet.
We don't have any Books related to Mass assignment vulnerability yet.

See also

References

  1. "CWE-915: Improperly Controlled Modification of Dynamically-Determined Object Attributes". Common Weakness Enumeration. NIST. Retrieved February 27, 2013. http://cwe.mitre.org/data/definitions/915.html

  2. "Mass Assignment". Ruby On Rails Security Guide. Retrieved February 27, 2013. http://guides.rubyonrails.org/security.html#mass-assignment

  3. "Mass Assignment Vulnerability in ASP.NET MVC". IronsHay. Retrieved February 27, 2013. http://ironshay.com/post/Mass-Assignment-Vulnerability-in-ASPNET-MVC.aspx

  4. Alberto Souza (2014). "Playframework, how to protect against Mass Assignment". http://alots.wordpress.com/2014/03/26/playframework-how-to-protect-against-mass-assignment/

  5. "GitHub suspends member over 'mass-assignment' hack". ZDnet. 2012. Retrieved February 27, 2013. https://www.zdnet.com/home-and-office/networking/github-suspends-member-over-mass-assignment-hack/

  6. "[SEC][ANN] Rails 3.2.12, 3.1.11, and 2.3.17 have been released!". Retrieved January 7, 2016. http://weblog.rubyonrails.org/2013/2/11/SEC-ANN-Rails-3-2-12-3-1-11-and-2-3-17-have-been-released/

  7. "Denial of Service and Unsafe Object Creation Vulnerability in JSON (CVE-2013-0269)". Retrieved January 7, 2016. https://www.ruby-lang.org/en/news/2013/02/22/json-dos-cve-2013-0269/

  8. tdykstra (20 June 2023). "Model Binding in ASP.NET Core". docs.microsoft.com. https://docs.microsoft.com/en-us/aspnet/core/mvc/models/model-binding