CORSICA: Cross-Origin Web Service Identification

04/02/2020
by   Christian Dresen, et al.
0

Vulnerabilities in private networks are difficult to detect for attackers outside of the network. While there are known methods for port scanning internal hosts that work by luring unwitting internal users to an external web page that hosts malicious JavaScript code, no such method for detailed and precise service identification is known. The reason is that the Same Origin Policy (SOP) prevents access to HTTP responses of other origins by default. We perform a structured analysis of loopholes in the SOP that can be used to identify web applications across network boundaries. For this, we analyze HTML5, CSS, and JavaScript features of standard-compliant web browsers that may leak sensitive information about cross-origin content. The results reveal several novel techniques, including leaking JavaScript function names or styles of cross-origin requests that are available in all common browsers. We implement and test these techniques in a tool called CORSICA. It can successfully identify 31 of 42 (74 devices as well as the version numbers of the four most widely used content management systems WordPress, Drupal, Joomla, and TYPO3. CORSICA can also determine the patch level on average down to three versions (WordPress), six versions (Drupal), two versions (Joomla), and four versions (TYPO3) with only ten requests on average. Furthermore, CORSICA is able to identify 48 WordPress plugins containing 65 vulnerabilities. Finally, we analyze mitigation strategies and show that the proposed but not yet implemented strategies Cross-Origin Resource Policy (CORP) and Sec-Metadata would prevent our identification techniques.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
10/02/2019

Eradicating Attacks on the Internal Network with Internal Network Policy

In this paper we present three attacks on private internal networks behi...
research
08/06/2019

Cross-Origin State Inference (COSI) Attacks: Leaking Web Site States through XS-Leaks

In a Cross-Origin State Inference (COSI) attack, an attacker convinces a...
research
09/14/2023

The Nonce-nce of Web Security: an Investigation of CSP Nonces Reuse

Content Security Policy (CSP) is an effective security mechanism that pr...
research
09/01/2021

CorbFuzz: Checking Browser Security Policies with Fuzzing

Browsers use security policies to block malicious behaviors. Cross-Origi...
research
05/11/2021

An Innovative Security Strategy using Reactive Web Application Honeypot

Nowadays, web applications have become most prevalent in the industry, a...
research
04/27/2023

Machine Learning for Detection and Mitigation of Web Vulnerabilities and Web Attacks

Detection and mitigation of critical web vulnerabilities and attacks lik...
research
09/15/2018

On the Integrity of Cross-Origin JavaScripts

The same-origin policy is a fundamental part of the Web. Despite the res...

Please sign up or login with your details

Forgot password? Click here to reset