SlideShare una empresa de Scribd logo
1 de 49
Descargar para leer sin conexión
© 2014 Imperva, Inc. All rights reserved.
CUSRF | It’s Pronounced “See You Surf”
and It’s Dangerous
Amichai Shulman, CTO, Imperva
1
© 2014 Imperva, Inc. All rights reserved.
Agenda
2
§  CSRF brief intro
§  CUSRF: A close encounter with CSRF of the third kind
§  CUSRF explained
§  Vulnerable applications in the wild
§  Google Docs
§  Linkedin.com
§  Mitigations
§  Summary and conclusion
© 2014 Imperva, Inc. All rights reserved.
Amichai Shulman – CTO, Imperva
3
§  Speaker at Industry Events
•  RSA, Appsec, Info Security UK, Black Hat
§  Lecturer on Information Security
•  Technion - Israel Institute of Technology
§  Former security consultant to banks & financial services
firms
§  Leads the Application Defense Center (ADC)
•  Discovered over 20 commercial application vulnerabilities
§  Credited by Oracle, MS-SQL, IBM and others
One of InfoWorld’s “Top 25 CTOs”
© 2014 Imperva, Inc. All rights reserved.
The Motivation:
Protecting Your ID in a Hostile
Online Environment
4
© 2014 Imperva, Inc. All rights reserved.
Privacy on the Web: An Uphill Battle?
5
Source: www.askingsmarterquestions.com
© 2014 Imperva, Inc. All rights reserved.
Privacy Can Be Achieved Through Anonymity
6
Source: www.antiquaprintgallery.com
© 2014 Imperva, Inc. All rights reserved.
Privacy Can Be Achieved Through Anonymity
7
Source: www.antiquaprintgallery.com
© 2014 Imperva, Inc. All rights reserved.
CUSRF Vulnerability Opens Your
Social Kimono!
§  CUSRF (pronounced “See You Surf”)
•  Cross USer Request Forgery
§  Web sites you visit can see your privates:
•  In real-time
•  Name, email, work place, title, etc.
§  Potential outcomes:
•  “Ice Hole Phishing”: e.g. infect only certain roles in a
specific organization.
•  Display different price
•  Disinformation
8
© 2014 Imperva, Inc. All rights reserved.
CSRF Intro
9
© 2014 Imperva, Inc. All rights reserved.
SOP Threat Model
Communication
Custom Code
Accounts
Finance
Administration
Transactions
KnowledgeMgmt
E-Commerce
Bus.Functions
Target Application
Attacker sets the trap on some website on the internet1
Some interaction
with victim site
10
© 2014 Imperva, Inc. All rights reserved.
SOP Threat Model
Communication
Custom Code
Accounts
Finance
Administration
Transactions
KnowledgeMgmt
E-Commerce
Bus.Functions
Target Application
Attacker sets the trap on some website on the internet1
2
While logged into vulnerable site,
victim views attacker site
Target site
interaction
Some interaction
with victim site
11
© 2014 Imperva, Inc. All rights reserved.
SOP Threat Model
Communication
Custom Code
Accounts
Finance
Administration
Transactions
KnowledgeMgmt
E-Commerce
Bus.Functions
Target Application
3
Vulnerable site sees
legitimate request from
victim, performs the
requested action and
sends a response
Attacker sets the trap on some website on the internet1
2
While logged into vulnerable site,
victim views attacker site
Target site
interaction
Some interaction
with victim site
12
© 2014 Imperva, Inc. All rights reserved.
CSRF Illustrated: “Bypassing SOP”
Attacker sets the trap on some website on the internet
(or simply via an e-mail)
1
Custom Code
Accounts
Finance
Administration
Transactions
Communication
KnowledgeMgmt
E-Commerce
Bus.Functions
Hidden <img> tag
contains attack
against vulnerable
site
Application with
CSRF vulnerability
13
© 2014 Imperva, Inc. All rights reserved.
CSRF Illustrated: “Bypassing SOP”
Attacker sets the trap on some website on the internet
(or simply via an e-mail)
1
Hidden <img> tag
contains attack
against vulnerable
site
2
While logged into vulnerable site,
victim views attacker site
<img> tag loaded by
browser – sends GET
request (including
credentials) to
vulnerable site
14
© 2014 Imperva, Inc. All rights reserved.
CSRF Illustrated: “Bypassing SOP”
3
Attacker sets the trap on some website on the internet
(or simply via an e-mail)
1
Vulnerable site sees
legitimate request from
victim and performs the
requested action
Custom Code
Accounts
Finance
Administration
Transactions
Communication
KnowledgeMgmt
E-Commerce
Bus.Functions
Hidden <img> tag
contains attack
against vulnerable
site
Application with
CSRF vulnerability
2
While logged into vulnerable site,
victim views attacker site
<img> tag loaded by
browser – sends GET
request (including
credentials) to
vulnerable site
15
© 2014 Imperva, Inc. All rights reserved.
CSRF
§  The “Confused Deputy” Problem
•  Web browsers automatically include access
tokens with each request
•  Requests can be invoked by malicious sites from
victim’s browser without user consent
§  Automatically Provided Tokens: Session
cookie, basic authentication header, IP address,
client side SSL certificates, Windows domain
authentication
16
© 2014 Imperva, Inc. All rights reserved.
CSRF Type I: Classic CSRF
17
§  The “Transfer Fund” attack
§  Attacker tricks the browser into issuing a “transfer funds”
request to the attacker’s account
§  “/transferFund.jsp?To=<attacker>&Sum=10000000”
Attack Type Used credentials Interacts with
Classic CSRF Victim’s Victim’s web account
© 2014 Imperva, Inc. All rights reserved.
CSRF Type II: Login CSRF
§  The attacker mounts a CSRF attack that logs the victim
into an attacker controlled account (sink account)
§  “signin.jsp?user=<attacker>&password=123456”
§  Later on, the attacker is able to track the victim’s activity
in the sink account
§  e.g. log the victim to attacker’s controlled Google account
to collect search history
18
© 2014 Imperva, Inc. All rights reserved.
CSRF Type II: Login CSRF
§  The attacker mounts a CSRF attack that logs the victim
into an attacker controlled account (sink account)
§  “signin.jsp?user=<attacker>&password=123456”
§  Later on, the attacker is able to track the victim’s activity
in the sink account
§  e.g. log the victim to attacker’s controlled Google account
to collect search history
Attack Type Used credentials Interacts with
Classic CSRF Victim’s Victim’s web account
Login CSRF Attacker’s Attacker web account
19
© 2014 Imperva, Inc. All rights reserved.
CSRF Type II: Login CSRF
§  The attacker mounts a CSRF attack that logs the victim
into an attacker controlled account (sink account)
§  “signin.jsp?user=<attacker>&password=123456”
§  Later on, the attacker is able to track the victim’s activity
in the sink account
§  e.g. log the victim to attacker’s controlled Google account
to collect search history
20
© 2014 Imperva, Inc. All rights reserved.
CSRF is Very Relevant
Source: WhiteHat Security
21
© 2014 Imperva, Inc. All rights reserved.
CSRF is Very Relevant
Source: WhiteHat Security
22
© 2014 Imperva, Inc. All rights reserved.
CUSRF:
A Close Encounter With CSRF
of the Third Kind
23
© 2014 Imperva, Inc. All rights reserved.
CSRF Type III: CUSRF
24
§  A new type of CSRF, bringing CSRF to Web 2.0
environment
§  “Cross USer Request Forgery” (CUSRF, pronounced
“See You Surf”) attack
§  Composition of the known CSRF vulnerability types, for
collaboration environment
© 2014 Imperva, Inc. All rights reserved.
Web 2.0: It’s All About Collaboration
25
§  “A Web 2.0 site may allow users to interact and
collaborate with each other in a social media dialogue as
creators of user-generated content in a virtual
community” (Source: Wikipedia)
Source: http://conceptart.ca
© 2014 Imperva, Inc. All rights reserved.
CUSRF Explained
26
§  The attacker forges collaboration requests on behalf of
the victim
•  Similar to the “Classic CSRF”
§  The collaboration target is located on an attacker
controlled account
•  Similar to the “Login CSRF”
§  Outcome: Attacker can reveal the victim’s social network
identity
Attack Type Used credentials Interacts with
Classic CSRF Victim’s Victim’s web account
Login CSRF Attacker’s Attacker’s web account
CUSRF Victim’s Attacker’s web account
© 2014 Imperva, Inc. All rights reserved.
CUSRF in the Wild 1:
LinkedIn Profile
27
© 2014 Imperva, Inc. All rights reserved.
Attack Setup: Creating a LinkedIn Profile
28
§  Attacker sets up a LinkedIn account
© 2014 Imperva, Inc. All rights reserved.
Attack Setup: Settings
29
§  In order to view the identity of profile visitors, the attacker
can either:
•  Go “Pro”
•  Make their “LinkedIn” identity available to others
© 2014 Imperva, Inc. All rights reserved.
Attack Setup: CSRF Page
30
§  Attacker adds an invisible CSRF link referencing the
attacker’s LinkedIn profile to their online asset
§  Asset can be:
•  A “watering hole” page
•  A “phishing” page
•  Etc.
© 2014 Imperva, Inc. All rights reserved.
Launching the Attack
31
§  When the intended
target visits the CSRF
page:
•  The attacker discovers
his identity (“Tal Be’ery”)
instantly
§  Can act accordingly:
•  e.g. infect him personally
with a “drive by
download“ infection
© 2014 Imperva, Inc. All rights reserved.
Resolving “Semi Anonymous Profiles”
32
§  Victim can choose to share only “profile characteristics”
•  e.g “Engineer in Imperva”
§  This is the default setting
§  Sometimes that’s enough information for the attacker
© 2014 Imperva, Inc. All rights reserved.
Resolving “Semi Anonymous Profiles”
33
§  In 2013, Linkedininsights.com had demonstrated a
bypass
§  Linkedin “Red Herring” Module showed list of 10 possible
“candidates” for the “Semi Anonymous Profiles”
§  One was the actual person; others were just “Red
Herrings”
§  The problem: “Red Herrings” were randomized, actual
person was not
§  Exploit: Attacker should view the “candidates” list twice
and mark the overlapping item
© 2014 Imperva, Inc. All rights reserved.
A Smelly Red Herring
34
Source: www.linkedinsights.com
© 2014 Imperva, Inc. All rights reserved.
CUSRF in the Wild 2:
Google Docs
35
© 2014 Imperva, Inc. All rights reserved.
Attack Setup: Creating a Google Doc
36
§  Attacker (“honeymadhatter”)
shares her doc with targeted
account(s) (“sam.burekas”)
§  Only needs to know the
targets’ email
§  No email is sent, as the
option can be unchecked
© 2014 Imperva, Inc. All rights reserved.
Attack Setup: CSRF Page
37
§  Attacker adds an invisible CSRF link referencing to the
attacker’s Google Doc to their online asset
§  Asset can be
•  A “watering hole” page
•  A “phishing” page
•  Etc.
§  Invisible link example:
•  “<script src = "
https://docs.google.com/document/d/<some doc id>/edit"></
script>”
© 2014 Imperva, Inc. All rights reserved.
Launching the Attack
38
§  When the intended target visits the CSRF page:
•  The attacker uncovers victim’s identity (“sam.burekas”)
instantly
§  Can act accordingly: e.g. infect victim with
malware
© 2014 Imperva, Inc. All rights reserved.
Google’s Response
39
© 2014 Imperva, Inc. All rights reserved.
Mitigations
40
© 2014 Imperva, Inc. All rights reserved.
Consumers
41
§  Logout more!
§  Use stricter privacy settings for vulnerable applications
•  Full anonymity for LinkedIn
§  Use personal Anti CSRF add-ons to block cross-site
requests
•  RequestPolicy
•  CsFire
•  NoScript
© 2014 Imperva, Inc. All rights reserved.
Platform Providers
§  Use standard CSRF protections
•  Don’t allow a collaboration based on a single request from other
domain
§  Other domains can be determined by HTTP headers
•  Referer
•  Origin
42
© 2014 Imperva, Inc. All rights reserved.
Platform Providers
§  Single request collaboration, within same domain can be
secured with a CSRF token
•  Changing, un-guessable, unique identifier appended to the
request
§  Libraries exist to include this functionality in the code
•  http://anticsrf.codeplex.com/ (.NET)
•  https://www.owasp.org/index.php/
Category:OWASP_CSRFGuard_Project (Java, PHP, .NET)
43
© 2014 Imperva, Inc. All rights reserved.
MS Seems to Get It Right
44
© 2014 Imperva, Inc. All rights reserved.
Summary & Conclusion
45
© 2014 Imperva, Inc. All rights reserved.
Summary
46
§  CSRF vulnerabilities of various types are common
within applications
§  CUSRF is a new type of CSRF that affects users of
collaboration platforms and applications
•  Disclosing the true identity of a victim, when accessing an
attacker controlled application
§  CUSRF can be used for fraud as well as “Ice Hole
Phishing”
© 2014 Imperva, Inc. All rights reserved.
Recommendations
47
§  Consumers
•  Review privacy settings for collaboration platforms
§  Providers
•  Apply anti-CSRF mechanisms to collaboration activity
© 2014 Imperva, Inc. All rights reserved.
Webinar Materials
48
Post-Webinar
Discussions
Answers to
Attendee
Questions
Webinar
Recording Link
Join Group
Join Imperva LinkedIn Group,
Imperva Data Security Direct, for…
© 2014 Imperva, Inc. All rights reserved.
www.imperva.com
49

Más contenido relacionado

La actualidad más candente

cybercrime survival guide
cybercrime survival guidecybercrime survival guide
cybercrime survival guide
Gary Gray, MCSE
 
A4 A K S H A Y B H A R D W A J
A4    A K S H A Y  B H A R D W A JA4    A K S H A Y  B H A R D W A J
A4 A K S H A Y B H A R D W A J
bhardwajakshay
 
Cross Site Request Forgery Vulnerabilities
Cross Site Request Forgery VulnerabilitiesCross Site Request Forgery Vulnerabilities
Cross Site Request Forgery Vulnerabilities
Marco Morana
 
A survey on detection of website phishing using mcac technique
A survey on detection of website phishing using mcac techniqueA survey on detection of website phishing using mcac technique
A survey on detection of website phishing using mcac technique
bhas_ani
 

La actualidad más candente (20)

Web Application Security
Web Application SecurityWeb Application Security
Web Application Security
 
Xss frame work
Xss frame workXss frame work
Xss frame work
 
Understanding Cross-site Request Forgery
Understanding Cross-site Request ForgeryUnderstanding Cross-site Request Forgery
Understanding Cross-site Request Forgery
 
cybercrime survival guide
cybercrime survival guidecybercrime survival guide
cybercrime survival guide
 
CSRF Basics
CSRF BasicsCSRF Basics
CSRF Basics
 
HallTumserFinalPaper
HallTumserFinalPaperHallTumserFinalPaper
HallTumserFinalPaper
 
Hybrid website security from Indusface
Hybrid website security from IndusfaceHybrid website security from Indusface
Hybrid website security from Indusface
 
A4 A K S H A Y B H A R D W A J
A4    A K S H A Y  B H A R D W A JA4    A K S H A Y  B H A R D W A J
A4 A K S H A Y B H A R D W A J
 
Cross Site Request Forgery Vulnerabilities
Cross Site Request Forgery VulnerabilitiesCross Site Request Forgery Vulnerabilities
Cross Site Request Forgery Vulnerabilities
 
Different Types of Phishing Attacks
Different Types of Phishing AttacksDifferent Types of Phishing Attacks
Different Types of Phishing Attacks
 
Shiv seminar final
Shiv seminar finalShiv seminar final
Shiv seminar final
 
What is Phishing? Phishing Attack Explained | Edureka
What is Phishing? Phishing Attack Explained | EdurekaWhat is Phishing? Phishing Attack Explained | Edureka
What is Phishing? Phishing Attack Explained | Edureka
 
Hacking web applications
Hacking web applicationsHacking web applications
Hacking web applications
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
A survey on detection of website phishing using mcac technique
A survey on detection of website phishing using mcac techniqueA survey on detection of website phishing using mcac technique
A survey on detection of website phishing using mcac technique
 
Man-In-The-Browser attacks
Man-In-The-Browser attacksMan-In-The-Browser attacks
Man-In-The-Browser attacks
 
Phishing: Swiming with the sharks
Phishing: Swiming with the sharksPhishing: Swiming with the sharks
Phishing: Swiming with the sharks
 
Phishing techniques
Phishing techniquesPhishing techniques
Phishing techniques
 
Web application vulnerabilities
Web application vulnerabilitiesWeb application vulnerabilities
Web application vulnerabilities
 
The Quiet Rise of Account Takeover
The Quiet Rise of Account TakeoverThe Quiet Rise of Account Takeover
The Quiet Rise of Account Takeover
 

Similar a CUSRF | It's Pronounced "See You Surf" and It's Dangerous

CYREN_Q1_2015_Trend_Report
CYREN_Q1_2015_Trend_ReportCYREN_Q1_2015_Trend_Report
CYREN_Q1_2015_Trend_Report
Chris Taylor
 
30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.ppt
30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.ppt30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.ppt
30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.ppt
Kaukau9
 
Web application security
Web application securityWeb application security
Web application security
Jin Castor
 
OWASP Serbia - A5 cross-site request forgery
OWASP Serbia - A5 cross-site request forgeryOWASP Serbia - A5 cross-site request forgery
OWASP Serbia - A5 cross-site request forgery
Nikola Milosevic
 

Similar a CUSRF | It's Pronounced "See You Surf" and It's Dangerous (20)

Top Security Trends for 2014
Top Security Trends for 2014Top Security Trends for 2014
Top Security Trends for 2014
 
CuSRF. OWASP AppSecUS 2014
CuSRF. OWASP AppSecUS 2014CuSRF. OWASP AppSecUS 2014
CuSRF. OWASP AppSecUS 2014
 
Cyber Security Workshop @SPIT- 3rd October 2015
Cyber Security Workshop @SPIT- 3rd October 2015Cyber Security Workshop @SPIT- 3rd October 2015
Cyber Security Workshop @SPIT- 3rd October 2015
 
Hiding in Plain Sight: The Danger of Known Vulnerabilities
Hiding in Plain Sight: The Danger of Known VulnerabilitiesHiding in Plain Sight: The Danger of Known Vulnerabilities
Hiding in Plain Sight: The Danger of Known Vulnerabilities
 
Testing Application Security: The Hacker Psyche Exposed
Testing Application Security: The Hacker Psyche ExposedTesting Application Security: The Hacker Psyche Exposed
Testing Application Security: The Hacker Psyche Exposed
 
Understanding CSRF
Understanding CSRFUnderstanding CSRF
Understanding CSRF
 
Hacking Encounters of the 3rd Kind
Hacking Encounters of the 3rd KindHacking Encounters of the 3rd Kind
Hacking Encounters of the 3rd Kind
 
CYREN_Q1_2015_Trend_Report
CYREN_Q1_2015_Trend_ReportCYREN_Q1_2015_Trend_Report
CYREN_Q1_2015_Trend_Report
 
Strategies to handle Phishing attacks
Strategies to handle Phishing attacksStrategies to handle Phishing attacks
Strategies to handle Phishing attacks
 
Imperva - Hacking encounters of the 3rd kind
Imperva -  Hacking encounters of the 3rd kindImperva -  Hacking encounters of the 3rd kind
Imperva - Hacking encounters of the 3rd kind
 
30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.ppt
30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.ppt30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.ppt
30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.ppt
 
Web application security
Web application securityWeb application security
Web application security
 
Client sidesec 2013 - script injection
Client sidesec 2013 - script injectionClient sidesec 2013 - script injection
Client sidesec 2013 - script injection
 
The waf book intro attack elements v1.0 lior rotkovitch
The waf book intro attack elements v1.0 lior rotkovitchThe waf book intro attack elements v1.0 lior rotkovitch
The waf book intro attack elements v1.0 lior rotkovitch
 
CSRF-Lecture13.pptx
CSRF-Lecture13.pptxCSRF-Lecture13.pptx
CSRF-Lecture13.pptx
 
Web security landscape Unit 3 part 2
Web security landscape Unit 3 part 2Web security landscape Unit 3 part 2
Web security landscape Unit 3 part 2
 
OWASP Serbia - A5 cross-site request forgery
OWASP Serbia - A5 cross-site request forgeryOWASP Serbia - A5 cross-site request forgery
OWASP Serbia - A5 cross-site request forgery
 
Securing your AngularJS Application
Securing your AngularJS ApplicationSecuring your AngularJS Application
Securing your AngularJS Application
 
Web security: OWASP project, CSRF threat and solutions
Web security: OWASP project, CSRF threat and solutionsWeb security: OWASP project, CSRF threat and solutions
Web security: OWASP project, CSRF threat and solutions
 
The Whys and Wherefores of Web Security – by United Security Providers
The Whys and Wherefores of Web Security – by United Security ProvidersThe Whys and Wherefores of Web Security – by United Security Providers
The Whys and Wherefores of Web Security – by United Security Providers
 

Más de Imperva

Más de Imperva (20)

Cybersecurity and Healthcare - HIMSS 2018 Survey
Cybersecurity and Healthcare - HIMSS 2018 SurveyCybersecurity and Healthcare - HIMSS 2018 Survey
Cybersecurity and Healthcare - HIMSS 2018 Survey
 
API Security Survey
API Security SurveyAPI Security Survey
API Security Survey
 
Imperva ppt
Imperva pptImperva ppt
Imperva ppt
 
Beyond takeover: stories from a hacked account
Beyond takeover: stories from a hacked accountBeyond takeover: stories from a hacked account
Beyond takeover: stories from a hacked account
 
Research: From zero to phishing in 60 seconds
Research: From zero to phishing in 60 seconds Research: From zero to phishing in 60 seconds
Research: From zero to phishing in 60 seconds
 
Making Sense of Web Attacks: From Alerts to Narratives
Making Sense of Web Attacks: From Alerts to NarrativesMaking Sense of Web Attacks: From Alerts to Narratives
Making Sense of Web Attacks: From Alerts to Narratives
 
How We Blocked a 650Gb DDoS Attack Over Lunch
How We Blocked a 650Gb DDoS Attack Over LunchHow We Blocked a 650Gb DDoS Attack Over Lunch
How We Blocked a 650Gb DDoS Attack Over Lunch
 
Survey: Insider Threats and Cyber Security
Survey: Insider Threats and Cyber SecuritySurvey: Insider Threats and Cyber Security
Survey: Insider Threats and Cyber Security
 
Companies Aware, but Not Prepared for GDPR
Companies Aware, but Not Prepared for GDPRCompanies Aware, but Not Prepared for GDPR
Companies Aware, but Not Prepared for GDPR
 
Rise of Ransomware
Rise of Ransomware Rise of Ransomware
Rise of Ransomware
 
7 Tips to Protect Your Data from Contractors and Privileged Vendors
7 Tips to Protect Your Data from Contractors and Privileged Vendors7 Tips to Protect Your Data from Contractors and Privileged Vendors
7 Tips to Protect Your Data from Contractors and Privileged Vendors
 
SEO Botnet Sophistication
SEO Botnet SophisticationSEO Botnet Sophistication
SEO Botnet Sophistication
 
Phishing Made Easy
Phishing Made EasyPhishing Made Easy
Phishing Made Easy
 
Imperva 2017 Cyber Threat Defense Report
Imperva 2017 Cyber Threat Defense ReportImperva 2017 Cyber Threat Defense Report
Imperva 2017 Cyber Threat Defense Report
 
Combat Payment Card Attacks with WAF and Threat Intelligence
Combat Payment Card Attacks with WAF and Threat IntelligenceCombat Payment Card Attacks with WAF and Threat Intelligence
Combat Payment Card Attacks with WAF and Threat Intelligence
 
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing Exponentially
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing ExponentiallyHTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing Exponentially
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing Exponentially
 
Get Going With Your GDPR Plan
Get Going With Your GDPR PlanGet Going With Your GDPR Plan
Get Going With Your GDPR Plan
 
Cyber Criminal's Path To Your Data
Cyber Criminal's Path To Your DataCyber Criminal's Path To Your Data
Cyber Criminal's Path To Your Data
 
Combat Today's Threats With A Single Platform For App and Data Security
Combat Today's Threats With A Single Platform For App and Data SecurityCombat Today's Threats With A Single Platform For App and Data Security
Combat Today's Threats With A Single Platform For App and Data Security
 
Hacking HTTP/2 : New attacks on the Internet’s Next Generation Foundation
Hacking HTTP/2: New attacks on the Internet’s Next Generation FoundationHacking HTTP/2: New attacks on the Internet’s Next Generation Foundation
Hacking HTTP/2 : New attacks on the Internet’s Next Generation Foundation
 

Último

Último (20)

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

CUSRF | It's Pronounced "See You Surf" and It's Dangerous

  • 1. © 2014 Imperva, Inc. All rights reserved. CUSRF | It’s Pronounced “See You Surf” and It’s Dangerous Amichai Shulman, CTO, Imperva 1
  • 2. © 2014 Imperva, Inc. All rights reserved. Agenda 2 §  CSRF brief intro §  CUSRF: A close encounter with CSRF of the third kind §  CUSRF explained §  Vulnerable applications in the wild §  Google Docs §  Linkedin.com §  Mitigations §  Summary and conclusion
  • 3. © 2014 Imperva, Inc. All rights reserved. Amichai Shulman – CTO, Imperva 3 §  Speaker at Industry Events •  RSA, Appsec, Info Security UK, Black Hat §  Lecturer on Information Security •  Technion - Israel Institute of Technology §  Former security consultant to banks & financial services firms §  Leads the Application Defense Center (ADC) •  Discovered over 20 commercial application vulnerabilities §  Credited by Oracle, MS-SQL, IBM and others One of InfoWorld’s “Top 25 CTOs”
  • 4. © 2014 Imperva, Inc. All rights reserved. The Motivation: Protecting Your ID in a Hostile Online Environment 4
  • 5. © 2014 Imperva, Inc. All rights reserved. Privacy on the Web: An Uphill Battle? 5 Source: www.askingsmarterquestions.com
  • 6. © 2014 Imperva, Inc. All rights reserved. Privacy Can Be Achieved Through Anonymity 6 Source: www.antiquaprintgallery.com
  • 7. © 2014 Imperva, Inc. All rights reserved. Privacy Can Be Achieved Through Anonymity 7 Source: www.antiquaprintgallery.com
  • 8. © 2014 Imperva, Inc. All rights reserved. CUSRF Vulnerability Opens Your Social Kimono! §  CUSRF (pronounced “See You Surf”) •  Cross USer Request Forgery §  Web sites you visit can see your privates: •  In real-time •  Name, email, work place, title, etc. §  Potential outcomes: •  “Ice Hole Phishing”: e.g. infect only certain roles in a specific organization. •  Display different price •  Disinformation 8
  • 9. © 2014 Imperva, Inc. All rights reserved. CSRF Intro 9
  • 10. © 2014 Imperva, Inc. All rights reserved. SOP Threat Model Communication Custom Code Accounts Finance Administration Transactions KnowledgeMgmt E-Commerce Bus.Functions Target Application Attacker sets the trap on some website on the internet1 Some interaction with victim site 10
  • 11. © 2014 Imperva, Inc. All rights reserved. SOP Threat Model Communication Custom Code Accounts Finance Administration Transactions KnowledgeMgmt E-Commerce Bus.Functions Target Application Attacker sets the trap on some website on the internet1 2 While logged into vulnerable site, victim views attacker site Target site interaction Some interaction with victim site 11
  • 12. © 2014 Imperva, Inc. All rights reserved. SOP Threat Model Communication Custom Code Accounts Finance Administration Transactions KnowledgeMgmt E-Commerce Bus.Functions Target Application 3 Vulnerable site sees legitimate request from victim, performs the requested action and sends a response Attacker sets the trap on some website on the internet1 2 While logged into vulnerable site, victim views attacker site Target site interaction Some interaction with victim site 12
  • 13. © 2014 Imperva, Inc. All rights reserved. CSRF Illustrated: “Bypassing SOP” Attacker sets the trap on some website on the internet (or simply via an e-mail) 1 Custom Code Accounts Finance Administration Transactions Communication KnowledgeMgmt E-Commerce Bus.Functions Hidden <img> tag contains attack against vulnerable site Application with CSRF vulnerability 13
  • 14. © 2014 Imperva, Inc. All rights reserved. CSRF Illustrated: “Bypassing SOP” Attacker sets the trap on some website on the internet (or simply via an e-mail) 1 Hidden <img> tag contains attack against vulnerable site 2 While logged into vulnerable site, victim views attacker site <img> tag loaded by browser – sends GET request (including credentials) to vulnerable site 14
  • 15. © 2014 Imperva, Inc. All rights reserved. CSRF Illustrated: “Bypassing SOP” 3 Attacker sets the trap on some website on the internet (or simply via an e-mail) 1 Vulnerable site sees legitimate request from victim and performs the requested action Custom Code Accounts Finance Administration Transactions Communication KnowledgeMgmt E-Commerce Bus.Functions Hidden <img> tag contains attack against vulnerable site Application with CSRF vulnerability 2 While logged into vulnerable site, victim views attacker site <img> tag loaded by browser – sends GET request (including credentials) to vulnerable site 15
  • 16. © 2014 Imperva, Inc. All rights reserved. CSRF §  The “Confused Deputy” Problem •  Web browsers automatically include access tokens with each request •  Requests can be invoked by malicious sites from victim’s browser without user consent §  Automatically Provided Tokens: Session cookie, basic authentication header, IP address, client side SSL certificates, Windows domain authentication 16
  • 17. © 2014 Imperva, Inc. All rights reserved. CSRF Type I: Classic CSRF 17 §  The “Transfer Fund” attack §  Attacker tricks the browser into issuing a “transfer funds” request to the attacker’s account §  “/transferFund.jsp?To=<attacker>&Sum=10000000” Attack Type Used credentials Interacts with Classic CSRF Victim’s Victim’s web account
  • 18. © 2014 Imperva, Inc. All rights reserved. CSRF Type II: Login CSRF §  The attacker mounts a CSRF attack that logs the victim into an attacker controlled account (sink account) §  “signin.jsp?user=<attacker>&password=123456” §  Later on, the attacker is able to track the victim’s activity in the sink account §  e.g. log the victim to attacker’s controlled Google account to collect search history 18
  • 19. © 2014 Imperva, Inc. All rights reserved. CSRF Type II: Login CSRF §  The attacker mounts a CSRF attack that logs the victim into an attacker controlled account (sink account) §  “signin.jsp?user=<attacker>&password=123456” §  Later on, the attacker is able to track the victim’s activity in the sink account §  e.g. log the victim to attacker’s controlled Google account to collect search history Attack Type Used credentials Interacts with Classic CSRF Victim’s Victim’s web account Login CSRF Attacker’s Attacker web account 19
  • 20. © 2014 Imperva, Inc. All rights reserved. CSRF Type II: Login CSRF §  The attacker mounts a CSRF attack that logs the victim into an attacker controlled account (sink account) §  “signin.jsp?user=<attacker>&password=123456” §  Later on, the attacker is able to track the victim’s activity in the sink account §  e.g. log the victim to attacker’s controlled Google account to collect search history 20
  • 21. © 2014 Imperva, Inc. All rights reserved. CSRF is Very Relevant Source: WhiteHat Security 21
  • 22. © 2014 Imperva, Inc. All rights reserved. CSRF is Very Relevant Source: WhiteHat Security 22
  • 23. © 2014 Imperva, Inc. All rights reserved. CUSRF: A Close Encounter With CSRF of the Third Kind 23
  • 24. © 2014 Imperva, Inc. All rights reserved. CSRF Type III: CUSRF 24 §  A new type of CSRF, bringing CSRF to Web 2.0 environment §  “Cross USer Request Forgery” (CUSRF, pronounced “See You Surf”) attack §  Composition of the known CSRF vulnerability types, for collaboration environment
  • 25. © 2014 Imperva, Inc. All rights reserved. Web 2.0: It’s All About Collaboration 25 §  “A Web 2.0 site may allow users to interact and collaborate with each other in a social media dialogue as creators of user-generated content in a virtual community” (Source: Wikipedia) Source: http://conceptart.ca
  • 26. © 2014 Imperva, Inc. All rights reserved. CUSRF Explained 26 §  The attacker forges collaboration requests on behalf of the victim •  Similar to the “Classic CSRF” §  The collaboration target is located on an attacker controlled account •  Similar to the “Login CSRF” §  Outcome: Attacker can reveal the victim’s social network identity Attack Type Used credentials Interacts with Classic CSRF Victim’s Victim’s web account Login CSRF Attacker’s Attacker’s web account CUSRF Victim’s Attacker’s web account
  • 27. © 2014 Imperva, Inc. All rights reserved. CUSRF in the Wild 1: LinkedIn Profile 27
  • 28. © 2014 Imperva, Inc. All rights reserved. Attack Setup: Creating a LinkedIn Profile 28 §  Attacker sets up a LinkedIn account
  • 29. © 2014 Imperva, Inc. All rights reserved. Attack Setup: Settings 29 §  In order to view the identity of profile visitors, the attacker can either: •  Go “Pro” •  Make their “LinkedIn” identity available to others
  • 30. © 2014 Imperva, Inc. All rights reserved. Attack Setup: CSRF Page 30 §  Attacker adds an invisible CSRF link referencing the attacker’s LinkedIn profile to their online asset §  Asset can be: •  A “watering hole” page •  A “phishing” page •  Etc.
  • 31. © 2014 Imperva, Inc. All rights reserved. Launching the Attack 31 §  When the intended target visits the CSRF page: •  The attacker discovers his identity (“Tal Be’ery”) instantly §  Can act accordingly: •  e.g. infect him personally with a “drive by download“ infection
  • 32. © 2014 Imperva, Inc. All rights reserved. Resolving “Semi Anonymous Profiles” 32 §  Victim can choose to share only “profile characteristics” •  e.g “Engineer in Imperva” §  This is the default setting §  Sometimes that’s enough information for the attacker
  • 33. © 2014 Imperva, Inc. All rights reserved. Resolving “Semi Anonymous Profiles” 33 §  In 2013, Linkedininsights.com had demonstrated a bypass §  Linkedin “Red Herring” Module showed list of 10 possible “candidates” for the “Semi Anonymous Profiles” §  One was the actual person; others were just “Red Herrings” §  The problem: “Red Herrings” were randomized, actual person was not §  Exploit: Attacker should view the “candidates” list twice and mark the overlapping item
  • 34. © 2014 Imperva, Inc. All rights reserved. A Smelly Red Herring 34 Source: www.linkedinsights.com
  • 35. © 2014 Imperva, Inc. All rights reserved. CUSRF in the Wild 2: Google Docs 35
  • 36. © 2014 Imperva, Inc. All rights reserved. Attack Setup: Creating a Google Doc 36 §  Attacker (“honeymadhatter”) shares her doc with targeted account(s) (“sam.burekas”) §  Only needs to know the targets’ email §  No email is sent, as the option can be unchecked
  • 37. © 2014 Imperva, Inc. All rights reserved. Attack Setup: CSRF Page 37 §  Attacker adds an invisible CSRF link referencing to the attacker’s Google Doc to their online asset §  Asset can be •  A “watering hole” page •  A “phishing” page •  Etc. §  Invisible link example: •  “<script src = " https://docs.google.com/document/d/<some doc id>/edit"></ script>”
  • 38. © 2014 Imperva, Inc. All rights reserved. Launching the Attack 38 §  When the intended target visits the CSRF page: •  The attacker uncovers victim’s identity (“sam.burekas”) instantly §  Can act accordingly: e.g. infect victim with malware
  • 39. © 2014 Imperva, Inc. All rights reserved. Google’s Response 39
  • 40. © 2014 Imperva, Inc. All rights reserved. Mitigations 40
  • 41. © 2014 Imperva, Inc. All rights reserved. Consumers 41 §  Logout more! §  Use stricter privacy settings for vulnerable applications •  Full anonymity for LinkedIn §  Use personal Anti CSRF add-ons to block cross-site requests •  RequestPolicy •  CsFire •  NoScript
  • 42. © 2014 Imperva, Inc. All rights reserved. Platform Providers §  Use standard CSRF protections •  Don’t allow a collaboration based on a single request from other domain §  Other domains can be determined by HTTP headers •  Referer •  Origin 42
  • 43. © 2014 Imperva, Inc. All rights reserved. Platform Providers §  Single request collaboration, within same domain can be secured with a CSRF token •  Changing, un-guessable, unique identifier appended to the request §  Libraries exist to include this functionality in the code •  http://anticsrf.codeplex.com/ (.NET) •  https://www.owasp.org/index.php/ Category:OWASP_CSRFGuard_Project (Java, PHP, .NET) 43
  • 44. © 2014 Imperva, Inc. All rights reserved. MS Seems to Get It Right 44
  • 45. © 2014 Imperva, Inc. All rights reserved. Summary & Conclusion 45
  • 46. © 2014 Imperva, Inc. All rights reserved. Summary 46 §  CSRF vulnerabilities of various types are common within applications §  CUSRF is a new type of CSRF that affects users of collaboration platforms and applications •  Disclosing the true identity of a victim, when accessing an attacker controlled application §  CUSRF can be used for fraud as well as “Ice Hole Phishing”
  • 47. © 2014 Imperva, Inc. All rights reserved. Recommendations 47 §  Consumers •  Review privacy settings for collaboration platforms §  Providers •  Apply anti-CSRF mechanisms to collaboration activity
  • 48. © 2014 Imperva, Inc. All rights reserved. Webinar Materials 48 Post-Webinar Discussions Answers to Attendee Questions Webinar Recording Link Join Group Join Imperva LinkedIn Group, Imperva Data Security Direct, for…
  • 49. © 2014 Imperva, Inc. All rights reserved. www.imperva.com 49