首页> 外文会议>IEEE International Conference on Software Maintenance and Evolution >Detecting DOM-Sourced Cross-Site Scripting in Browser Extensions
【24h】

Detecting DOM-Sourced Cross-Site Scripting in Browser Extensions

机译:在浏览器扩展中检测基于DOM的跨站点脚本

获取原文

摘要

In recent years, with the advances in JavaScript engines and the adoption of HTML5 APIs, web applications begin to show a tendency to shift their functionality from the server side towards the client side, resulting in dense and complex interactions with HTML documents using the Document Object Model (DOM). As a consequence, client-side vulnerabilities become more and more prevalent. In this paper, we focus on DOM-sourced Cross-site Scripting (XSS), which is a kind of severe but not well-studied vulnerability appearing in browser extensions. Comparing with conventional DOM-based XSS, a new attack surface is introduced by DOM-sourced XSS where the DOM could become a vulnerable source as well besides common sources such as URLs and form inputs. To discover such vulnerability, we propose a detecting framework employing hybrid analysis with two phases. The first phase is the lightweight static analysis consisting of a text filter and an abstract syntax tree parser, which produces potential vulnerable candidates. The second phase is the dynamic symbolic execution with an additional component named shadow DOM, generating a document as a proof-of-concept exploit. In our large-scale real-world experiment, 58 previously unknown DOM-sourced XSS vulnerabilities were discovered in user scripts of the popular browser extension Greasemonkey.
机译:近年来,随着JavaScript引擎的发展和HTML5 API的采用,Web应用程序开始显示出将其功能从服务器端转移到客户端端的趋势,从而导致使用Document Object与HTML文档进行密集而复杂的交互。模型(DOM)。结果,客户端漏洞变得越来越普遍。在本文中,我们重点研究基于DOM的跨站点脚本(XSS),它是一种严重的但没有经过充分研究的漏洞,它出现在浏览器扩展中。与传统的基于DOM的XSS相比,基于DOM的XSS引入了新的攻击面,其中DOM不仅可能成为URL和表单输入之类的常见来源,而且还可能成为易受攻击的来源。为了发现这种漏洞,我们提出了一个采用两个阶段的混合分析的检测框架。第一阶段是轻量级静态分析,该分析由文本过滤器和抽象语法树解析器组成,该解析器会生成潜在的易受攻击的候选对象。第二阶段是动态符号执行,带有一个名为shadow DOM的附加组件,生成文档作为概念验证漏洞。在我们的大规模实际实验中,在流行的浏览器扩展Greasemonkey的用户脚本中发现了58个以前未知的DOM来源的XSS漏洞。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号