论文标题

使用客户端模板的精确XSS检测和缓解

Precise XSS detection and mitigation with Client-side Templates

论文作者

Pazos, Jose Carlos, Legare, Jean-Sebastien, Beschastnikh, Ivan, Aiello, William

论文摘要

我们提出了完全客户端XSS解决方案XSnare,以Firefox扩展为实现。我们的方法利用了对Web应用程序HTML模板内容的可用知识,以及DOM中可用的丰富上下文可阻止XSS攻击。 XSNARE通过使用利用描述数据库来防止XSS利用,该数据库借助先前记录的CVE编写。 XS的CVE广泛可用,是解决零日漏洞的主要方法之一。 XSNARE有效地选择了HTML中漏洞的潜在注入点,并对内容进行了消毒,以防止恶意有效载荷出现在DOM中。 XSNARE可以在应用程序开发人员发布补丁程序之前和服务器操作员应用之前保护应用程序用户。 我们在81个与XSS攻击有关的CVE上评估了XSNARE,并发现它可以抵抗94.2%的这些漏洞。据我们所知,XSNARE是针对特定应用程序的XSS的第一个保护机制,并且基于公开可用的CVE信息。我们表明,XSNARE的特异性可以保护用户免受逃避其他,更通用的反XSS方法的利用。 我们的性能评估表明,对于MOZ Top 500列表中72.6%的网站,网页加载时间的扩展时间不到10%。

We present XSnare, a fully client-side XSS solution, implemented as a Firefox extension. Our approach takes advantage of available previous knowledge of a web application's HTML template content, as well as the rich context available in the DOM to block XSS attacks. XSnare prevents XSS exploits by using a database of exploit descriptions, which are written with the help of previously recorded CVEs. CVEs for XSS are widely available and are one of the main ways to tackle zero-day exploits. XSnare effectively singles out potential injection points for exploits in the HTML and sanitizes content to prevent malicious payloads from appearing in the DOM. XSnare can protect application users before application developers release patches and before server operators apply them. We evaluated XSnare on 81 recent CVEs related to XSS attacks, and found that it defends against 94.2% of these exploits. To the best of our knowledge, XSnare is the first protection mechanism for XSS that is application-specific, and based on publicly available CVE information. We show that XSnare's specificity protects users against exploits which evade other, more generic, anti-XSS approaches. Our performance evaluation shows that our extension's overhead on web page loading time is less than 10% for 72.6% of the sites in the Moz Top 500 list.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源