그림 1. 테스트 페이지 정상 프로세스 Fig. 1 Test page normal process
그림 2. 테스트 페이지 공격 시나리오 Fig. 2 Test page attack scenarios
그림 3. 스프링 프레임워크 서버 구축 Fig. 3 Building a spring framework server
그림 4. 테스트 페이지 기능 Fig. 4 Test page features
그림 5. app.js 내 실행코드 삽입 Fig. 5 Insert execution code in app.js
그림 6. 2차 공격 예시[IP 조회] Fig. 6 Example of a secondary attack
그림 7. 서버 내 실행코드 처리 프로세스 Fig. 7 In-server execution code processing process
그림 8. 대응을 위한 Snort Rule Fig. 8 Snort Rule for response
표 1. 시연 환경 Table 1. Demonstration environment
References
- B. Jung and C. Choi, "Spring Server Remote Code Execution Vulnerability (CVE-2018-1270)," Proc. of the 2018 Fall Conf. on The Korea Institute of Communication and Information Sciences, Seoul, Korea, Jan. 2016, pp. 665-667.
- S. Lee, T. Ahn, and J. Jung, "A Study of Broadleaf Open Source Commerce Swift based on Spring Framework," Proc. of the 2014 Summer Conf. on The Korea Society of Computer and Information, Jeju, Korea, July 2014, pp. 213-216.
- H. Choi and D. Son, "Spring Framework Responsive Web AWS," Proc. of the 2017 Summer Conf. on The Korea Society of Computer and Information, Seoul, Korea, July 2017, pp. 149-150.
- J. Ye, J. Kim, and M. Chung, "Spring Framework based Integrated Support System for Assets and Insolvency Prediction in the Cloud Computing," Proc. of the 2014 Fall Conf. on Korea Information Processing Society, Seoul, Korea, Jan. 2014, pp. 699-702.
- K. Kwon and J. Byun, "Implementation and evaluation of enabling skill for POJO programing Based on Spring Framework," Proc. of the 2013 Fall Conf. on Korea Information Processing Society, Jeju, Korea, Jan. 2013, pp. 1027-1029.
- W. Choi, "Countermeasures research on HTTP trapping attack in the spring framework based web environment," Master's Thesis, Sungkyunkwan University, 2014.
- W. Seo and M. Jeon, "A Study on Security Hole Attack According to the Establishment of Policies to Limit Particular IP Area," J. of the Korea Institute of Electronic Communication Sciences, vol. 5 no. 6, 2010, pp. 625-630.
- S. Kim, S. Lim, and D. Kim, "Regulatory Requirements Analysis for Development of Nuclear Power Plants Cyber Security Vulnerability Inspection Tool," J. of the Korea Institute of Electronic Communication Sciences, vol. 12 no. 5, 2017, pp. 725-270. https://doi.org/10.13067/JKIECS.2017.12.5.725
- H. Cho, J. Kim, and B. Noh, "Analysis for Security Vulnerabilities on DSTM Tunneling," J. of the Korea Institute of Electronic Communication Sciences, vol. 2 no. 4, 2007, pp. 215-221.
- J. Jeon, "A Study on The Vulnerabilities and Problems of Security Program," J. of Information and Security, Korea Information Assurance Society, vol. 12 no. 6. 2012, pp. 77-84.