Detection of bypass vulnerabilities

A method and proxy device for detecting bypass vulnerabilities in a cloud-computing platform are provided. The method includes identifying an access attempt by a client device to a cloud-based application hosted in the cloud-computing platform; identifying login information corresponding to the iden...

Full description

Saved in:
Bibliographic Details
Main Authors Costica, Yinon, Most, Yonatan
Format Patent
LanguageEnglish
Published 25.09.2018
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:A method and proxy device for detecting bypass vulnerabilities in a cloud-computing platform are provided. The method includes identifying an access attempt by a client device to a cloud-based application hosted in the cloud-computing platform; identifying login information corresponding to the identified access attempt; requesting authenticated login information from a central authentication system; correlating the login information corresponding to the access attempt with the authenticated login information; determining, based on the correlation, whether a bypass vulnerability exists; and generating a bypass event when it is determined that the bypass vulnerability has been exploited wherein the bypass event indicates that the access attempt to the cloud-based application has not been properly authenticated.
Bibliography:Application Number: US201615054555