[Zurück]


Vorträge und Posterpräsentationen (mit Tagungsband-Eintrag):

M. Squarcina, M. Tempesta, L. Veronese, S. Calzavara, M. Maffei:
"Can I Take Your Subdomain? Exploring Same-Site Attacks in the Modern Web";
Vortrag: 30th USENIX Security Symposium, Online; 11.08.2021 - 13.08.2021; in: "30th USENIX Security Symposium", 30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021, (2021), S. 2917 - 2934.



Kurzfassung englisch:
Related-domain attackers control a sibling domain of their target web application, e.g., as the result of a subdomain takeover. Despite their additional power over traditional web attackers, related-domain attackers received only limited attention by the research community. In this paper we define and quantify for the first time the threats that related-domain attackers pose to web application security. In particular, we first clarify the capabilities that related-domain attackers can acquire through different attack vectors, showing that different instances of the related-domain attacker concept are worth attention. We then study how these capabilities can be abused to compromise web application security by focusing on different angles, including: cookies, CSP, CORS, postMessage and domain relaxation. By building on this framework, we report on a large-scale security measurement on the top 50k domains from the Tranco list that led to the discovery of vulnerabilities in 887, sites, where we quantified the threats posed by related-domain attackers to popular web applications.

Schlagworte:
Related-domain attacker, web security, same-site, subdomain


Elektronische Version der Publikation:
https://publik.tuwien.ac.at/files/publik_296683.pdf


Erstellt aus der Publikationsdatenbank der Technischen Universität Wien.