skip to main content
10.1145/1653662.1653713acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

XCS: cross channel scripting and its impact on web applications

Published:09 November 2009Publication History

ABSTRACT

We study the security of embedded web servers used in consumer electronic devices, such as security cameras and photo frames, and for IT infrastructure, such as wireless access points and lights-out management systems. All the devices we examine turn out to be vulnerable to a variety of web attacks, including cross site scripting (XSS) and cross site request forgery (CSRF). In addition, we show that consumer electronics are particularly vulnerable to a nasty form of persistent XSS where a non-web channel such as NFS or SNMP is used to inject a malicious script. This script is later used to attack an unsuspecting user who connects to the device's web server. We refer to web attacks which are mounted through a non-web channel as cross channel scripting (XCS). We propose a client-side defense against certain XCS which we implement as a browser extension.

References

  1. D. Balzarotti, M. Cova, V. Felmetsger, N. Jovanovic, E. Kirda, C. Kruegel, and G. Vigna. Saner: Composing static and dynamic analysis to validate sanitization in web applications. In IEEE Symposium on Security and Privacy, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. A. Barth, C. Jackson, and J. Mitchell. Robust defenses for cross-site request forgery. In proceedings of ACM CCS'08, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. H. Bojinov, E. Bursztein, and D. Boneh. Embedded management interfaces: Emerging massive insecurity. BlackHat'09 http://seclab.stanford.edu/websec/embedded/, August 2009.Google ScholarGoogle Scholar
  4. D. Dagon, G. Gu, C. Lee, and W. Lee. A taxonomy of botnet structures. In Proceedings of the 23 Annual Computer Security Applications Conference (ACSAC), 2007.Google ScholarGoogle ScholarCross RefCross Ref
  5. Dell remote access controller (DRAC), 2008. http://support.dell.com/support/edocs/software/smdrac3/drac4/160/en/ug/index.htm.Google ScholarGoogle Scholar
  6. S. Fogie, J. Grossman, R. Hansen, A. Rager, and P. Petkov. XSS Exploits: Cross Site Scripting Attacks and Defense. Syngress, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. M. Foundation. Content security policy, 2009. wiki.mozilla.org/Security/CSP/Spec.Google ScholarGoogle Scholar
  8. D. Grzelak. Log injection attack and defence, 2007. www.sift.com.au/assets/downloads/SIFT-Log-Injection-Intelligence-Report-v1-00. pdf.Google ScholarGoogle Scholar
  9. O. Hallaraker and G. Vigna. Detecting malicious javascript code in mozilla. In Proceedings of the IEEE International Conference on Engineering of Complex Computer Systems (ICECCS), 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. T. L. Harris and Palm. Software update information for palm pre sprint p100eww. Web: http://kb.palm.com/wps/portal/kb/na/pre/p100eww/sprint/solutions/article/50607_en.html, August 2009.Google ScholarGoogle Scholar
  11. HP integrated lights-out (iLo), 2008. http://bizsupport.austin.hp.com/bc/docs/support/SupportManual/c00209014/c00209014.pdf.Google ScholarGoogle Scholar
  12. IBM remote supervisor adapter (RSA), 2008. http://www.ibm.com/support/docview.wss?uid=psg1MIGR-57091.Google ScholarGoogle Scholar
  13. Intel active management technology (AMT), 2008. http://software.intel.com/en-us/articles/architecture-guide-intel-/active-management-technology.Google ScholarGoogle Scholar
  14. C. Jackson and A. Barth. Forcehttps: Protecting high-security web sites from network attacks. In Proceedings of the 17th International World Wide Web Conference (WWW2008), 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. T. Jim, N. Swamy, and M. Hicks. Defeating script injection attacks with browser-enforced embedded policies. In in proc. of 16th International World Wide Web Conference, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. N. Jovanovic, C. Kruegel, and E. Kirda. Pixy: A static analysis tool for detecting web application vulnerabilities. In IEEE Symposium on Security and Privacy, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. N. Jovanovic, C. Kruegel, and E. Kirda. Precise alias analysis for static detection of web application vulnerabilities. In Proceedings of the Workshop on Programming Languages and Analysis for Security (PLAS), 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. E. Kirda, C. Kruegel, G. Vigna,, and N. Jovanovic. Noxes: A client-side solution for mitigating cross-site scripting attacks. In In Proceedings of the 21st ACM Symposium on Applied Computing (SAC), Security Track, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. V. T. Lam, S. Antonatos, P. Akritidis, and K. G. Anagnostakis. Puppetnets: Misusing web browsers as a distributed attack infrastructure. In Proc. CCS, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. M. Mahemoff. Ajax Design Patterns, volume 978-0596101800. O'Reilly, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. G. Maone. Noscript, 2006. http://noscript.net/.Google ScholarGoogle Scholar
  22. G. Markham. Content restrictions, 2007. www.gerv.net/security/content-restrictions/.Google ScholarGoogle Scholar
  23. A. Nguyen-Tuong, S. Guarnieri, D. Greene, J. Shirley, and D. Evans. Automatically hardening web applications using precise tainting. In In Proceedings of the 20th IFIP International Information Security Conference, 2005.Google ScholarGoogle ScholarCross RefCross Ref
  24. T. Oda, G. Wurster, P. van Oorschot, and A. Somayaji. Soma: mutual approval for included content in web pages. In ACM CCS'08, pages 89--98, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. T. Pietraszek and C. V. Berghe. Defending against injection attacks through context-sensitive string evaluation. In Recent Advances in Intrusion Detection (RAID), 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. N. Provos, D. McNamee, P. Mavrommatis, K. Wang, and N. Modadugu. The ghost in the browser analysis of web-based malware. In proceedings of HotBots'07, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Html purifier. http://htmlpurifier.org/.Google ScholarGoogle Scholar
  28. RSnake. Xss (cross site scripting) cheat sheet for filter evasion. http://ha.ckers.org/xss.html.Google ScholarGoogle Scholar
  29. P. Saxena and D. Song. Document structure integrity: A robust basis for cross-site scripting defense. In proceedings of NDSS'08, 2008.Google ScholarGoogle Scholar
  30. D. Stuttard and M. Pinto. The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws. Wiley, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Twitter worm. http://www.techcrunch.com/2009/04/11/twitter-hit-by-stalkdaily-worm/.Google ScholarGoogle Scholar
  32. Y. Xie and A. Aiken. Static detection of security vulnerabilities in scripting languages. In In Proceedings of the USENIX Security Symposium, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. XCS: cross channel scripting and its impact on web applications

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        CCS '09: Proceedings of the 16th ACM conference on Computer and communications security
        November 2009
        664 pages
        ISBN:9781605588940
        DOI:10.1145/1653662

        Copyright © 2009 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 9 November 2009

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        Overall Acceptance Rate1,261of6,999submissions,18%

        Upcoming Conference

        CCS '24
        ACM SIGSAC Conference on Computer and Communications Security
        October 14 - 18, 2024
        Salt Lake City , UT , USA

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader