Monitoring and mitigating client-side exploitation of application flaws
First Claim
1. A system for monitoring and mitigating client-side exploitation of application flaws, the system comprising:
- a server to operate a first application, the first application to communicate with a client device operating a second application to execute an application flaw script and the application flaw script to cause the client device to produce a first request associated with vulnerability of the first application;
an application flaw service module communicatively coupled to the server, the application flaw service module to;
receive the first request from the client device comprising transactional metadata based on the application flaw script; and
inspect the transactional metadata in a header of the first request for malicious content within the first request by using a header and location inspection module that refers to a filter rules and logic database, wherein prior to the application flaw service module receiving and inspecting the transactional metadata within the first request, the server causes the application flaw script to be added to the transactional metadata of a response to a second request sent by the client device; and
a vulnerability tracking module that tracks attack vectors in the received requests that are detected by the header and location inspection module.
2 Assignments
0 Petitions
Accused Products
Abstract
A system for monitoring and mitigating client-side exploitation of application flaws, the system comprising a client device operating an application, a server communicatively coupled to the client device, and an application flaw service module communicatively coupled to the client device and server in which the application flaw service module receives a request from the client device comprising transactional metadata and inspecting the transactional metadata for malicious content within the request. A method of monitoring and mitigating client-side exploitation of application flaws by adding computer usable program code to the response to a first request from a client, receiving a second request from the client, determining that transactional metadata within the response contains an attack vector, and returning a response to the browser including attack vector countermeasures embedded in the response.
8 Citations
12 Claims
-
1. A system for monitoring and mitigating client-side exploitation of application flaws, the system comprising:
-
a server to operate a first application, the first application to communicate with a client device operating a second application to execute an application flaw script and the application flaw script to cause the client device to produce a first request associated with vulnerability of the first application; an application flaw service module communicatively coupled to the server, the application flaw service module to; receive the first request from the client device comprising transactional metadata based on the application flaw script; and inspect the transactional metadata in a header of the first request for malicious content within the first request by using a header and location inspection module that refers to a filter rules and logic database, wherein prior to the application flaw service module receiving and inspecting the transactional metadata within the first request, the server causes the application flaw script to be added to the transactional metadata of a response to a second request sent by the client device; and a vulnerability tracking module that tracks attack vectors in the received requests that are detected by the header and location inspection module. - View Dependent Claims (2, 3, 4)
-
-
5. A method of monitoring and mitigating client-side exploitation of application flaws comprising:
-
adding an application flaw script to transactional metadata of a first response to a first request from a client, the computer usable program code to perform a basic inspection of the first response; receiving a second request from the client, the second request comprising transactional metadata based on the application flaw script; determining that transactional metadata within the second request contains malicious content, comprising an attack vector, by inspecting the transactional metadata in a header of the second request using a header and location inspection module that refers to a filter rules and logic database; returning a second response to the second request to the client including attack vector countermeasures embedded in the second response; and tracking attack vectors in the received requests that are detected by the header and location inspection module. - View Dependent Claims (6, 7, 8, 9)
-
-
10. A computer program product for monitoring and mitigating client-side exploitation of application flaws, the computer program product comprising:
a non-transitory computer readable storage medium comprising computer usable program code embodied therewith, the computer usable program code comprising; computer usable program code to, when executed by a processor, add an application flaw script to transactional metadata of a first response to a first request from a client, the computer usable program code to perform a basic inspection of the first response; computer usable program code to, when executed by a processor, receive a second request from the client, the second request comprising transactional metadata based on the application flaw script; computer usable program code to, when executed by a processor, determine that transactional metadata within the second request contains malicious content, comprising an attack vector, by inspecting the transactional metadata in a header of the second request using a header and location inspection module that refers to a filter rules and logic database; computer usable program code to, when executed by a processor, return a second response to the second request to the client including attack vector countermeasures embedded in the response; and computer usable program code to, when executed by a processor, tracks attack vectors in the received requests that are detected by the header and location inspection module. - View Dependent Claims (11, 12)
Specification