Security Vulnerabilities within Link Traversal Query Processing

Ruben Taelman, Ruben Verborgh

QuWeDa 2022, 23 October 2022

Security Vulnerabilities within Link Traversal Query Processing

Ghent University – imec – IDLab, Belgium

Decentralization efforts such as Solid leads to a massive distribution of data

Solid pods

To find data, links must be followed across interlinked documents

Documents are spread over the Web

An environment that is

Analysis of security vulnerabilities
when querying over decentralized data

Personal online data vaults (a.k.a. pods)

Use case

Follow links during query execution

→ Link Traversal Query Processing

Hartig, O., Bizer, C., Freytag, J.-C.: Executing SPARQL Queries over the Web of Linked Data. Proceedings of the 8th International Semantic Web Conference. pp. 293–309 (2009).

Link Traversal Query Processing (LTQP)

Hartig, O., Bizer, C., Freytag, J.-C.: Executing SPARQL Queries over the Web of Linked Data. Proceedings of the 8th International Semantic Web Conference. pp. 293–309 (2009).

LTQP engine

The Web is an open and potentially unsafe environment

Analysis of vulnerabilities

  1. Unauthorized Statements
  2. Intermediate Result and Query Leakage
  3. Session Hijacking
  4. Cross-site Data Injection
  5. Arbitrary Code Execution
  6. Link Traversal Trap
  7. System hogging
  8. Document Corruption
  9. Cross-query Execution Interaction
  10. Document Priority Modification

Analysis of vulnerabilities

  1. Unauthorized Statements
  2. Intermediate Result and Query Leakage
  3. Session Hijacking
  4. Cross-site Data Injection
  5. Arbitrary Code Execution
  6. Link Traversal Trap
  7. System hogging
  8. Document Corruption
  9. Cross-query Execution Interaction
  10. Document Priority Modification

1. Unauthoritative Statements

6. Link Traversal Trap

7. System Hogging

The Web is an unsafe environment