Talks and Poster Presentations (with Proceedings-Entry):
M. Squarcina, M. Tempesta, L. Veronese, S. Calzavara, M. Maffei:
"Can I Take Your Subdomain? Exploring Same-Site Attacks in the Modern Web";
Talk: 30th USENIX Security Symposium,
- 2021-08-13; in: "30th USENIX Security Symposium",
30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021,
Related-domain attackers control a sibling domain of their target web application, e.g., as the result of a subdomain takeover. Despite their additional power over traditional web attackers, related-domain attackers received only limited attention by the research community. In this paper we define and quantify for the first time the threats that related-domain attackers pose to web application security. In particular, we first clarify the capabilities that related-domain attackers can acquire through different attack vectors, showing that different instances of the related-domain attacker concept are worth attention. We then study how these capabilities can be abused to compromise web application security by focusing on different angles, including: cookies, CSP, CORS, postMessage and domain relaxation. By building on this framework, we report on a large-scale security measurement on the top 50k domains from the Tranco list that led to the discovery of vulnerabilities in 887, sites, where we quantified the threats posed by related-domain attackers to popular web applications.
Related-domain attacker, web security, same-site, subdomain
Electronic version of the publication:
Created from the Publication Database of the Vienna University of Technology.