Skip to main content
Article
UChecker: Automatically Detecting PHP-Based Unrestricted File Upload Vulnerabilities
Proceedings - 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2019
  • Jin Huang, Wright State University - Main Campus
  • Yu Li, Wright State University - Main Campus
  • Junjie Zhang, Wright State University - Main Campus
  • Rui Dai
Document Type
Conference Proceeding
Publication Date
6-1-2019
Disciplines
Abstract

Unrestricted file upload vulnerabilities enable attackers to upload and execute malicious scripts in web servers. We have built a system, namely UChecker, to effectively and automatically detect such vulnerabilities in PHP server-side web applications. Towards this end, UChecker first interprets abstract syntax trees (AST) of program source code to perform symbolic execution. It then models vulnerabilities using SMT constraints and further leverages an SMT solver to verify the satisfiability of these constraints. UChecker features a novel vulnerability-oriented locality analysis algorithm to reduce the workload of symbolic execution, an AST-driven symbolic execution engine with compact data structures, and rules to translate PHP-based constraints into SMT-based constraints by mitigating their semantic gaps. Experiments based on real-world examples have demonstrated that UChecker has accomplished a high detection accuracy. In addition, it detected three vulnerable PHP scripts that are previously unknown.

DOI
10.1109/DSN.2019.00064
Citation Information
Jin Huang, Yu Li, Junjie Zhang and Rui Dai. "UChecker: Automatically Detecting PHP-Based Unrestricted File Upload Vulnerabilities" Proceedings - 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2019 (2019) p. 581 - 592
Available at: http://works.bepress.com/junjie_zhang/28/