Sunday, June 19, 2011

HTML 5 – expansion of att ack surface and possible abuses

HTML 5 with its implementation across the browsers has
given a new face to the threat model. There are various new
openings and entry points that lure an attacker to craft
variants for existing attack vectors and successfully abuse
the security. As show in Figure 3 the several components of



HTML 5 can be divided into four segments – presentation,
process/logic, network access and policies.
• Enhanced event model, tags, attributes and a thick set
of advanced features can cause the crafting of attack
vectors like ClickJacking and XSS
• DOM and browser threads can be abused with DOM
based XSS, redirects, widgets/mashup attacks
• Storage and WebSQL can be exploited by poisoning and
stealing the same
• WebSockets, XHR and other sockets can be abused too
• Same Origin Policy (SOP) can be attacked with CSRF
using various streams
Based on the above threat model and attack surface
synopsis the following are some interesting attack vectors.
16 HITB Magazine I JUNE 2011

TQ MEGAZINE HITB

No comments: