remaining hazards and mitigating patterns for secure
play

Remaining Hazards and Mitigating Patterns for Secure Mashups in - PowerPoint PPT Presentation

Remaining Hazards and Mitigating Patterns for Secure Mashups in EcmaScript 5 Mark S. Miller and the Cajadores Overview The Mashup Problem The Offensive and Defensive Code Problems JavaScript (EcmaScript) gets simpler ES3, ES5, ES5/strict,


  1. Remaining Hazards and Mitigating Patterns for Secure Mashups in EcmaScript 5 Mark S. Miller and the Cajadores

  2. Overview The Mashup Problem The Offensive and Defensive Code Problems JavaScript (EcmaScript) gets simpler ES3, ES5, ES5/strict, SES-on-ES5 Secure EcmaScript (SES) defenses Confinement and Tamper Proofing Remaining SES Security Hazards Riddles: Attack these example Mitigating Patterns for Attack Resistant Code

  3. New Skills open up New Worlds Remember learning “Avoid goto” “Beware pointer arithmetic” “Beware threads and locks” “Zero index origin likes closed-open intervals” “Manual encoding is better than string append” “Auto-escaping is better than manual encoding” and various oo patterns and their hazards? Co-evolution of skills and tools Student drivers think hard to avoid accidents. Experts avoid traps, but think about destination. Cars learn to help.

  4. Mashups are Everywhere … <script src=“https://evil.com/matrix.js”> <script> var prod = matMult(matrixA, matrixB); </script> Why can matMult hijack my account?

  5. A Trivial Mashup Scenario Alice says: Alice Bob var bobSrc = //site B bob var carolSrc = //site C var bob = eval (bobSrc); Carol var carol = eval (carolSrc); carol

  6. A Trivial Mashup Scenario Alice says: Alice bob Bob carol Carol

  7. A Trivial Mashup Scenario Alice says: bob Bob var counter = makeCounter(); counter incr incr bob(counter); carol(counter.decr); carol count count Carol count decr decr

  8. A Trivial Mashup Scenario Alice says: bob Bob var counter = makeCounter(); counter incr incr bob(counter); carol(counter.decr); carol count count Carol count decr decr Bob can count up and down and see result. Carol can count down and see the result.

  9. A Trivial Mashup Scenario Alice says: bob Bob var counter = makeCounter(); counter incr incr bob(counter); carol(counter.decr); carol count count Carol count decr decr Principle of least authority: Bob can only count up and down and see result. Carol can only count down and see the result.

  10. A Trivial Mashup Attack Scenario Alice says: bob Bob var counter = makeCounter(); counter incr incr bob(counter); carol(counter.decr); carol count count Carol count Bob says: evil evil counter.decr = evil; When Alice or Carol try to count down, they call Bob’s evil function instead.

  11. A Trivial Mashup Attack Scenario Alice says: bob Bob var counter = makeCounter(); counter incr incr bob(counter); carol(counter.decr); carol count count Carol count Bob says: evil evil counter.decr = evil; …window…document.cookie… Bob can do much worse damage!

  12. The Mashup Problem “A Mashup is a Self Inflicted Cross-Site Script” —Douglas Crockford The Offensive Code Problem Solved by SES The Defensive Code Problem Mitigated by patterns made possible by SES Still Hard! A puzzle solving skill to learn.

  13. The Offensive Code Problem Abuse of Global Authority Phishing, Redirection, Cookies Prototype Poisoning Object.prototype.toString = evilFunc; Global Scope Poisoning JSON = {parse: eval};

  14. Turning EcmaScript 5 into SES <script src=“initSES.js”></script> Monkey patch away bad non-std behaviors Remove non-whitelisted primordials Install leaky WeakMap emulation Make virtual global root Freeze whitelisted global variables • Replace eval & Function with safe alternatives Freeze accessible primordials

  15. SES eval  Confinement Alice says: Alice bob Bob var bobSrc = //site B var carolSrc = //site C var bob = eval (bobSrc); carol Carol var carol = eval (carolSrc); Bob cannot yet cause any effects outside himself!

  16. Need Bullet-proof Defensive Objects Alice says: bob Bob var counter = makeCounter(); counter incr incr bob(counter); carol(counter.decr); carol count count Carol count Bob says: evil evil counter.decr = evil; …window…document.cookie… Bob can still subvert a non-defensive counter

  17. The Defensive Code Problem Violating Encapsulation Tampering with API surface Violating Assumptions  Loss of Integrity Contagious Corruption

  18. Classic JS Prototypal Objects prototype function Counter () { this.count = 0; } Object Object.prototype Counter.prototype = { incr: function() { return ++this.count; }, constructor inherits from decr: function() { return --this.count; }, prototype (__proto__) constructor: Counter }; Counter Counter.prototype var c = new Counter(); incr decr inherits from constructor (__proto__) count: 0 c count: 0 c count: 0 c

  19. Classic JS Prototypal Objects function Counter () { this.count = 0; } Counter.prototype = { incr: function() { return ++this.count; }, decr: function() { return --this.count; }, constructor: Counter }; Counter.prototype var c = new Counter(); incr decr inherits from (__proto__) count: 0 c count: 0 c count: 0 c

  20. Classic JS Prototypal Objects function Counter () { this.count = 0; } Counter.prototype = { incr: function() { return ++this.count; }, decr: function() { return --this.count; }, constructor: Counter }; Counter.prototype var c = new Counter(); incr decr inherits from c.incr(); (__proto__) count: 0 c count: 0 c count: 0 c

  21. Classic JS Prototypal Objects function Counter () { this.count = 0; } Counter.prototype = { incr: function() { return ++this.count; }, decr: function() { return --this.count; }, constructor: Counter }; Counter.prototype var c = new Counter(); incr decr method { inherits from c.incr(); (__proto__) { { count: 0 c count: 0 implicit arguments c count: 0 c “this” arg

  22. Function Call, Method Call, Reflection c.incr() Method call “this” is c c[‘incr’]() Method call “this” is c (c.incr)() Method call “this” is c (c[‘incr’])() Method call “this” is c var incr = c.incr; Function call “this” is undefined incr() (1,c.incr)() Function call “this” is undefined d.incr = c.incr; Method call “this” is d method d.incr() { c.incr.apply(d, []) Reflective call “this” is d c.incr(); applyFn(c.incr, d, []) Reflective call “this” is d { { implicit arguments “this” arg

  23. Reflection Helper var applyFn = Function.prototype.call.bind(Function.prototype.apply); obj.name(…args)  applyFn(obj.name, obj, args) func(…args)  applyFn(func, undefined, args)

  24. Classic JS Prototypal Objects function Counter () { this.count = 0; } Counter.prototype = { incr: function() { return ++this.count; }, decr: function() { return --this.count; }, constructor: Counter }; Counter.prototype var c = new Counter(); incr decr // Confusion attacks: applyFn(c.incr, nonCounter, []); inherits from (__proto__) // Corruption attacks: count: 0 c count: 0 c.count = -Infinity; c count: 0 c

  25. First Lesson Classic JS Prototype Pattern is hazardous “this” is hazardous

  26. Objects as Closures in JavaScript makeCounter function makeCounter () { var count = 0; incr incr return { incr incr incr incr incr: function() { return ++count; }, count decr: function() { return --count; } count count }; decr decr decr decr } decr decr

  27. Objects as Closures in JavaScript makeCounter function makeCounter () { var count = 0; incr incr return { incr incr incr incr incr: function() { return ++count; }, count decr: function() { return --count; } count count }; decr decr decr decr } decr decr A record of closures hiding state is a fine representation of an object of methods hiding instance vars

  28. Robustness impossible in ES3 Mandatory mutability (monkey patching) Not statically scoped – repaired by ES5 (function n () {…x…}) // named function exprs try{throw fn;}catch( f ){f();…x…} // thrown function Object = Date; …{}… // “as if by” Not statically scoped – repaired by ES5/strict with (o) {…x…} // attractive but botched delete x; // dynamic deletion eval(str); …x… // eval exports binding

  29. Objects as Closures in EcmaScript 3 makeCounter function makeCounter () { var count = 0; incr incr return { incr incr incr incr incr: function() { return ++count; }, count decr: function() { return --count; } count count }; decr decr decr decr } decr decr • Mandatory mutability • Scoping confusions • Encapsulation leaks

  30. Using ES5 to Stop Bob’s 1 st Attack makeCounter function makeCounter () { var count = 0; incr incr return Object.freeze( { incr incr incr incr incr: function() { return ++count; }, count decr: function() { return --count; } count count }); decr decr decr decr } decr decr • Unexpressed mutability • Scoping confusions • Encapsulation leaks

  31. Encapsulation Leaks in non-strict ES5 function doSomething ( ifBobKnows , passwd ) { if (ifBobKnows() === passwd) { //… do something with passwd } }

  32. Encapsulation Leaks in non-strict ES5 function doSomething ( ifBobKnows , passwd ) { if (ifBobKnows() === passwd) { //… do something with passwd } } Bob says: var stash ; function ifBobKnows () { stash = arguments.caller.arguments[1]; return arguments.caller.arguments[1] = badPasswd; }

  33. Encapsulation in ES5/strict “use strict”; function doSomething ( ifBobKnows , passwd ) { if (ifBobKnows() === passwd) { //… do something with passwd } } Bob’s attack fails: return arguments.caller.arguments[1] = badPasswd; Parameters not joined to arguments .

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend