(2021) JAW: Studying Client-side CSRF with Hybrid Property Graphs and Declarative Traversals.
|
Text
Paper.pdf - Accepted Version Download (1MB) | Preview |
Abstract
Client-side CSRF is a new type of CSRF vulnerability where the adversary can trick the client-side JavaScript program to send a forged HTTP request to a vulnerable target site by modifying the program’s input parameters. We have little to-no knowledge of this new vulnerability, and exploratory security evaluations of JavaScript-based web applications are impeded by the scarcity of reliable and scalable testing techniques. This paper presents JAW, a framework that enables the analysis of modern web applications against client-side CSRF leveraging declarative traversals on hybrid property graphs, a canonical, hybrid model for JavaScript programs. We use JAW to evaluate the prevalence of client-side CSRF vulnerabilities among all (ie, 106) web applications from the Bitnami catalog, covering over 228M lines of JavaScript code. Our approach uncovers 12,701 forgeable client-side requests affecting 87 web applications in total. For 203 forgeable requests, we successfully created client-side CSRF exploits against seven web applications that can execute arbitrary server-side state-changing operations or enable cross-site scripting and SQL injection, that are not reachable via the classical attack vectors. Finally, we analyzed the forgeable requests and identified 25 request templates, highlighting the fields that can be manipulated and the type of manipulation.
Item Type: | Conference or Workshop Item (A Paper) (Paper) |
---|---|
Divisions: | Giancarlo Pellegrino (GP) |
Conference: | USENIX-Security Usenix Security Symposium |
Depositing User: | Soheil Khodayari |
Date Deposited: | 11 Feb 2021 12:22 |
Last Modified: | 08 Oct 2021 09:45 |
Primary Research Area: | NRA5: Empirical & Behavioral Security |
URI: | https://publications.cispa.saarland/id/eprint/3361 |
Actions
Actions (login required)
View Item |