Abstract
The networking functionality of JavaScript is restricted by the Same Origin Policy (SOP). However, as the SOP applies on a document level, JavaScript still possesses certain functionality for cross domain communication. These capabilities can be employed by malicious JavaScript to gain access to intranet resources from the outside. In this paper we exemplify capabilities of such scripts. To protect intranet hosts against JavaScript based threats, we then propose three countermeasures: Element Level SOP, rerouting of cross-site requests, and restricting the local network. These approaches are discussed concerning their respective protection potential and disadvantages. Based on this analysis, the most promising approach, restricting the local network, is evaluated practically.
This work was supported by the German Ministry of Economics (BMWi) as part of the project “secologic”, www.secologic.org.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Alcorn, W.: Inter-protocol communication. Whitepaper (11/13/06) (August 2006), http://www.ngssoftware.com/research/papers/InterProtocolCommunication.pdf
Burns, J.: Cross site reference forgery - an introduction to a common web application weakness. Whitepaper (2005), https://www.isecpartners.com/documents/XSRF_Paper.pdf
Endler, D.: The evolution of cross-site scripting attacks. Whitepaper, iDefense Inc. (May 2002), http://www.cgisecurity.com/lib/XSS.pdf
Glass, E.: The ntlm authentication protocol. (03/13/06) (2003) [online] http://davenport.sourceforge.net/ntlm.html
Grossman, J.: Browser port scanning without javascript. (08/01/07) (November 2006), Website http://jeremiahgrossman.blogspot.com/2006/11/browser-port-scanningwithout.html
Grossman, J.: Javascript malware, port scanning, and beyond. Posting to the websecurity mailing list (July 2006), http://www.webappsec.org/lists/websecurity/archive/2006-07/msg00097.html
Grossman, J., Niedzialkowski, T.C: Hacking intranet websites from the outside. Talk at Black Hat USA 2006 (August 2006), http://www.blackhat.com/presentations/bh-usa-06/BH-US-06-Grossman.pdf
Hallaraker, O., Vigna, G.: Detecting malicious javascript code in mozilla. In: Proceedings of the IEEE International Conference on Engineering of Complex Computer Systems (ICECCS), pp. 85–94 (June 2005)
Le Hegaret, P., Whitmer, R., Wood, L.: Document object model (dom). W3C recommendation (January 2005), http://www.w3.org/DOM/
InformAction. Noscript firefox extension. Software (2006), http://www.noscript.net/whats
Ismail, O., Eto, M., Kadobayashi, Y., Yamaguchi, S.: A proposal and implementation of automatic detection/collection system for cross-site scripting vulnerability. In: 8th International Conference on Advanced Information Networking and Applications (AINA 2004) (March 2004)
Jackson, C., Bortz, A., Boneh, D., Mitchell, J.C.: Protecting browser state from web privacy attacks. In: Proceedings of the 15th ACM World Wide Web Conference (WWW 2006) (2006)
Johns, M. (somewhat) breaking the same-origin policy by undermining dns-pinning. Posting to the Bug Traq Mailinglist (August 2006) http://www.securityfocus.com/archive/107/443429/30/180/threaded
Johns, M., Winter, J.: Requestrodeo: Client side protection against session riding. In: Piessens,F. (ed.) Proceedings of the OWASP Europe 2006 Conference, refereed papers track, Report CW448, pp. 5 – 17. Departement Computerwetenschappen, Katholieke Universiteit Leuven (May 2006)
Kanatoko. Stealing information using anti-dns pinning (30/01/07) (2006) Online demonstration. webpage, http://www.jumperz.net/index.php?i=2&a=1&b=7
Kanatoko. Anti-dns pinning + socket in flash (19/01/07) (January 2007), Website http://www.jumperz.net/index.php?i=2&a=3&b=3
Kindermann, L.: My address java applet (11/08/06) (2003), Webpage http://reglos.de/myaddress/MyAddress.html
Kirda, E., Kruegel, C., Vigna, G., Jovanovic, N.: Noxes: A client-side solution for mitigating cross site scripting attacks, security. In: Security Track of the 21st ACM Symposium on Applied Computing (SAC 2006) (April 2006)
SPI Labs. Detecting, analyzing, and exploiting intranet applications using javascript. Whitepaper (July 2006) http://www.spidynamics.com/assets/documents/JSportscan.pdf
Lam, V.T., Antonatos, S., Akritidis, P., Anagnostakis, K.G.: Puppetnets: Misusing web browsers as a distributed attack infrastructure. In: ACM Conference on Computer and Communications Security (CCS 2006), pp. 221–234 (2006)
Petkov, P.: Javascript port scanner (11/08/06) (August 2006), Website http://www.gnucitizen.org/projects/javascript-port-scanner/
XUL Planet. nsicontentpolicy. API Reference (11/02/07) (2006), webpage http://www.xulplanet.com/references/xpcomref/ifaces/nsIContentPolicy.html
Mozilla Project. Mozilla port blocking (11/13/06) (2001), Webpage http://www.mozilla.org/projects/netlib/PortBanning.html
Ruderman, J.: The same origin policy (01/10/06) (August 2001), Webpage http://www.mozilla.org/projects/security/components/same-origin.html
Samy: Technical explanation of the myspace worm (01/10/06) (October 2005), website http://namb.la/popular/tech.html
Schreiber, T.: Session riding - a widespread vulnerability in today’s web applications. Whitepaper, SecureNet GmbH (December 2004), http://www.securenet.de/papers/Session_Riding.pdf
Princeton University Secure Internet Programming Group. Dns attack scenario (February 1996), Webpage http://www.cs.princeton.edu/sip/news/dns-scenario.html
Soref, J.: Dns: Spoofing and pinning (14/11/06) (September 2003), Webpage http://viper.haque.net/~timeless/blog/11/
Vogt, P., Nentwich, F., Jovanovic, N., Kruegel, C., Kirda, E., Vig, G.: Cross site scripting prevention with dynamic data tainting and static analysis. In: 14th Annual Network and Distributed System Security Symposium (NDSS 2007) (2007)
Winter, J., Johns, M.: Localrodeo: Client side protection against javascript malware (01/02/07) (January 2007), webpage http://databasement.net/labs/localrodeo
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Johns, M., Winter, J. (2007). Protecting the Intranet Against “JavaScript Malware” and Related Attacks. In: M. Hämmerli, B., Sommer, R. (eds) Detection of Intrusions and Malware, and Vulnerability Assessment. DIMVA 2007. Lecture Notes in Computer Science, vol 4579. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-73614-1_3
Download citation
DOI: https://doi.org/10.1007/978-3-540-73614-1_3
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-73613-4
Online ISBN: 978-3-540-73614-1
eBook Packages: Computer ScienceComputer Science (R0)