论文标题

djangochecker:应用扩展的污点跟踪和服务器端解析以检测上下文敏感的XSS缺陷

DjangoChecker: Applying Extended Taint Tracking and Server Side Parsing for Detection of Context-Sensitive XSS Flaws

论文作者

Steinhauser, Antonín, Tůma, Petr

论文摘要

跨站点脚本(XSS)缺陷是一类安全缺陷,可将恶意代码注入Web应用程序。在简单的情况下,这些缺陷可能是由于缺失的输入消毒而引起的。但是,有时将所有应用输入都进行了消毒,但是消毒不适合消毒值的浏览器上下文。使用不正确的消毒剂可以使应用程序看起来受保护,而实际上它很脆弱,好像没有使用消毒,从而创建了上下文敏感的XSS缺陷。 为了发现上下文敏感的XSS缺陷,我们介绍了Djangochecker。 Djangochecker将扩展动态污点跟踪与模型浏览器结合在一起,以进行上下文分析。我们证明了Djangochecker在基于Django的八个成熟Web应用程序上的实际应用,在八个应用程序中的七个中发现了以前未知的缺陷,包括高度严重的缺陷,这些缺陷允许在七个有缺陷的应用程序中进行任意JavaScript执行。

Cross-site scripting (XSS) flaws are a class of security flaws that permit the injection of malicious code into a web application. In simple situations, these flaws can be caused by missing input sanitizations. Sometimes, however, all application inputs are sanitized, but the sanitizations are not appropriate for the browser contexts of the sanitized values. Using an incorrect sanitizer can make the application look protected, when it is in fact vulnerable as if no sanitization was used, creating a context-sensitive XSS flaw. To discover context-sensitive XSS flaws, we introduce DjangoChecker. DjangoChecker combines extended dynamic taint tracking with a model browser for context analysis. We demonstrate the practical application of DjangoChecker on eight mature web applications based on Django, discovering previously unknown flaws in seven of the eight applications, including highly severe flaws that allow arbitrary JavaScript execution in the seven flawed applications.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源