Misplaced Pages

Mass-assignment protection

Article snapshot taken from Wikipedia with creative commons attribution-sharealike license. Give it a read and then ask your questions in the chat. We can research this topic together.
This article has multiple issues. Please help improve it or discuss these issues on the talk page. (Learn how and when to remove these messages)
This article is written like a manual or guide. Please help rewrite this article and remove advice or instruction. (December 2016)
This article may be too technical for most readers to understand. Please help improve it to make it understandable to non-experts, without removing the technical details. (December 2016) (Learn how and when to remove this message)
This article is an orphan, as no other articles link to it. Please introduce links to this page from related articles; try the Find link tool for suggestions. (September 2016)
(Learn how and when to remove this message)

In the computing world, where software frameworks make life of developer easier, there are problems associated with it which the developer does not intend. Software frameworks use object-relational mapping (ORM) tool or active record pattern for converting data of different types and if the software framework does not have a strong mechanism to protect the fields of a class (the types of data), then it becomes easily exploitable by the attackers. These frameworks allow developers to bind parameters with HTTP and manipulate the data externally. The HTTP request that is generated carries the parameters that is used to create or manipulate objects in the application program.

The phrase mass assignment or overposting refers to assigning values to multiple attributes in a single go. It is a feature available in frameworks like Ruby on Rails that allows the modifications of multiple object attributes at once using modified URL. For example,

@person = Person.new(params) #params contains  multiple fields like name, email, isAdmin and contact

This Mass Assignment saves substantial amount of work for developers as they need not set each value individually.

Threats

In Mass Assignment, a malicious agent can attack and manipulate the data in various ways. It can send the tags which can make him assign various permissions which would otherwise be forbidden. For example, a database schema has a table "users" having field "admin" which specifies if corresponding user is admin or not. Malicious agent can easily send the value for this field to the server through HTTP request and mark himself as an admin. This is called Mass assignment vulnerability. It explores the security breaches that can be done using mass assignment.

GitHub got hacked in 2012 by exploiting mass assignment feature. Homakov who attacked the GitHub gained private access to Rails by replacing his SSH with SSH key of one of the members of Rails GitHub.

Protection

ASP.NET Core

In ASP.NET Core use the Bind attribute.

public IActionResult OnPost(
     Instructor instructor)

Ruby

We can perform some changes in the active record models to ensure the protection of our data.

  1. To use attr_protected: We specify the attributes which need to be protected. If the user tries mass assignment, then the user will get an error page which says Mass Assignment Security error and the attribute value will not be changed. This is also called blacklisting In this method, sometimes keeping track of all the attributes we want to protect is difficult. For example, in the code below, assign_project attribute is protected.
    Class Person < ActiveRecord::Base
      has_many :projects
      attr_protected :assign_project
    end
    
    This method optionally takes a role option using :as which enables to define multiple mass-assignment groupings. These attributes will have the :default role in case no role role is assigned. Here is an example which illustrates that assign_project will only be visible to admin.
    attr_protected :assign_project, :as => :admin
    
  2. To use attr_accessible: We add attributes that are accessible to everyone and need not be protected. This is easier to manage as the attributes that can be mass-assigned can be explicitly selected. All others are considered as protected. This is sometimes referred to as whitelisting.
    attr_accessible :name, :email, :contact
    
  3. To use Sanitize method: Another configuration which we can do to avoid mass assignment problems is called mass assignment sanitizer. This is a method called sanitize. This method filters the incoming requests and takes care that there should be no malicious tags. It only allows those tags that are whitelisted by the user. If the config config.active_record.mass_assignment_sanitizer is set to strict, it will raise ActiveModel::MassAssignmentSecurity::Error when mass assignment is not as intended.
  4. To use Require and Permit: These methods are used in Rails 4. These provide functionalities that check the incoming requests and parameters. Require method checks whether all the required parameters are present. If not, it throws error. Permit method checks whether a particular parameter is permitted to be passed in mass assignment. It returns the list of the permitted parameters. This is also referred to as strong parameters.

Sometimes developer might forget adding attributes as accessible. So as to avoid this, recent versions of Rail has config setting config.active_record.whitelist_attributes = true" which creates blank white list of attributes and protects from Mass Assignment Vulnerability. Models still need to explicitly whitelist or blacklist accessible parameters.

References

  1. "Ruby on Rails Security Guide — Ruby on Rails Guides". Guides.rubyonrails.org. Retrieved 2016-12-27.
  2. Meyer, David (2012-03-05). "GitHub suspends member over 'mass-assignment' hack". ZDNet.com. Retrieved 2016-12-27.
  3. "Model Binding in ASP.NET Core". learn.microsoft.com. Retrieved 6 February 2023.
  4. "ActiveModel::MassAssignmentSecurity::ClassMethods". Api.rubyonrails.org. Retrieved 2016-12-27.
  5. ^ The Rails 4 Way by Obie Fernandez, Kevin Faustino
  6. "Ruby on Rails Guides: Ruby On Rails Security Guide". Guides.rubyonrails.org. Retrieved 2016-12-27.
Category: