Context
In this paper, we present the technical background of the cross-domain mechanisms and the security implications. Several recent studies have demonstrated the weakness of the cross-domain policies, leading to session hijacking or the leakage of sensitive information
Current solutions to detect these vulnerabilities use a client-side approach:
- The purpose of our work is to present a new approach based on network flows analysis (HTTP analysis) to detect malicious behavior
Main ideas
- In 2012, social media were rapidly acquiring importance and became very attractive targets for cybercrimes
- XSS (cross site scripting), spam, phishing and other attacks related to Adobe Flash1 vulnerabilities can be carried out exploiting social media
- In 2012, Flash was used by 95% of web applications. Youtube used Flash by default and HTML5 on mobile devices
- Flash worked generating client-side requests to fetch content from various remote locations. This opens the door for cross-domain attacks
- The authors approach is to analyze the HTTP network flow to detect cross-domain attacks in social media, using Bro2
- SOP (Same-Origin Policy) is the default protection against cross-origin attacks, but often web applications need to authorize cross-domain requests. A white-list of trusted domains should be used, but in practice a wildcard policy is implemented (
*
, all the cross-domain requests are allowed) - obviously wildcards are misconfiguration and can be exploited
- the authors idea is to automatically detect wildcards misuses by analyzing the HTTP traffic with Bro
- preliminary analysis of the traffic generated by viewing a YouTube video embedded in a web page, highlighted the numerous cross-domain interactions involved and the complex server infrastructure used by YouTube (web servers, static cache servers, video cache servers, CDN)
- the authors conceptualized a system consisting of (i) an automation engine for generating HTTP traffic and (ii) a module for correlating the traffic captured at the network level with HTTP traffic at the browser level.
- This system aims to build a model for defining policy rules for a Bro-based detection system
- the limitation of encrypted traffic is recognized. This can hinder the recovery of information.
Wildcard policy exploitation
a.com
is under the control of an attacker and a victim access a Flash object on this website- the victim is also connected to
b.com
with authenticated access, andb.com
uses a wildcard, that allows every domain to make requests - the Flash object from
a.com
makes a request tob.com
. ==The user’s active session cookie is attached to the cross-domain request by default== - the attacker can get the session cookie and perform a CSRF (cross-site request forgery)
- the usage of a social media can create a trustful environment and lead the victim into clicking to
a.com
in the first place
References
Footnotes
-
Flash has been deprecated and then has been officially disabled by browser, since 2021 ↩
-
The tool is now called Zeek: https://zeek.org/ ↩