首页> 外文会议>International workshop on information security application >Systematically Breaking Online WYSIWYG Editors
【24h】

Systematically Breaking Online WYSIWYG Editors

机译:系统地打破在线所见即所得的编辑器

获取原文

摘要

Cross-Site Scripting (XSS) - around fourteen years old vulnerability is still on the rise and a continuous threat to the web applications. Only last year, 150505 defacements (this is a least, an XSS can do) have been reported and archived in Zone-H (a cybercrime archive). The online WYSIWYG (What You See Is What You Get) or rich-text editors are now a days an essential component of the web applications. They allow users of web applications to edit and enter HTML rich text (i.e., formatted text, images, links and videos etc.) inside the web browser window. The web applications use WYSIWYG editors as a part of comment functionality, private messaging among users of applications, blogs, notes, forums post, spellcheck as-you-type, ticketing feature, and other online services. The XSS in WYSIWYG editors is considered more dangerous and exploitable because the user-supplied rich-text contents (may be dangerous) are viewable by other users of web applications. In this paper, we present a security analysis of twenty (20) popular WYSIWYG editors powering thousands of web sites. The analysis includes WYSIWYG editors like Enterprise TinyMCE, EditLive, Lithium, Jive, TinyMCE, PHP HTML Editor, markltUp! universal markup jQuery editor, FreeTextBox (popular ASP.NET editor), Froala Editor, elRTE, and CKEditor. At the same time, we also analyze rich-text editors available on very popular sites like Twitter, Yahoo Mail, Amazon, GitHub and Magento and many more. In order to analyze online WYSIWYG editors, this paper also present a systematic and WYSIWYG editors's specific XSS attack methodology. We apply the XSS attack methodology on online WYSIWYG editors and found XSS is all of them. We show XSS bypasses for old and modern browsers. We have responsibly reported our findings to the respective developers of editors and our suggestions have been added. In the end, we also point out some recommendations for the developers of web applications and WYSIWYG editors.
机译:跨站点脚本(XSS)-大约有14年历史的漏洞仍在上升,并且不断威胁着Web应用程序。仅去年一年,就报告了150505个污损(这至少是XSS可以做的),并将其存档在Zone-H(网络犯罪存档)中。如今,在线所见即所得(所见即所得)或RTF编辑器已经成为Web应用程序中必不可少的组成部分。它们允许网络应用程序的用户在网络浏览器窗口中编辑和输入HTML富文本格式(即格式化的文本,图像,链接和视频等)。 Web应用程序使用“所见即所得”编辑器作为评论功能,应用程序用户之间的私人消息传递,博客,便笺,论坛帖子,键入时进行拼写检查,票务功能以及其他在线服务的一部分。所见即所得(WYSIWYG)编辑器中的XSS被认为更加危险和可利用,因为Web应用程序的其他用户可以查看用户提供的富文本内容(可能是危险的)。在本文中,我们提供了对支持数千个网站的二十(20)个受欢迎的所见即所得(WYSIWYG)编辑器的安全性分析。分析包括所见即所得的编辑器,例如Enterprise TinyMCE,EditLive,Lithium,Jive,TinyMCE,PHP HTML编辑器,markltUp!通用标记jQuery编辑器,FreeTextBox(流行的ASP.NET编辑器),Froala编辑器,elRTE和CKEditor。同时,我们还分析了非常流行的网站(如Twitter,Yahoo Mail,Amazon,GitHub和Magento等)上提供的富文本编辑器。为了分析在线所见即所得编辑器,本文还介绍了系统的和所见即所得编辑器的特定XSS攻击方法。我们在所见即所得的在线编辑器上应用了XSS攻击方法,并发现XSS就是所有这些。我们展示了针对旧版和现代浏览器的XSS绕过。我们已经以负责任的方式将我们的发现报告给了各自的编辑人员,并增加了我们的建议。最后,我们还为Web应用程序开发人员和所见即所得(WYSIWYG)编辑器提出了一些建议。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号