Black Hat: JavaScript Flaws Ease Intranet Attacks - InformationWeek
Software // Enterprise Applications
01:46 PM
Building Security for the IoT
Nov 09, 2017
In this webcast, experts discuss the most effective approaches to securing Internet-enabled system ...Read More>>

Black Hat: JavaScript Flaws Ease Intranet Attacks

Security researchers at the Black Hat conference discussed the weaknesses in JavaScript that let an attacker take control of a user's browser.

Which of the following will protect your Web site from attack: network perimeter firewalls, encryption, antivirus, or multi-factor authentication?

None of the above, says one Web security researcher.

That leaves it up to Microsoft, Mozilla, and all of the foremost makers of Web browsers to protect cyber space from a litany of emerging Web-based attacks including cross-site scripting, cross-site request forgeries, and browser port scanning.

What's worse, poor Web site security can lead to browser infections, which can lead to malicious software installing itself on a user's computer and attacking corporate systems from the inside. "Intranet hacks are happening already," Jeremiah Grossman, founder and chief technology officer of Web application security firm WhiteHat Security, told InformationWeek.

Grossman and Robert Hansen, CEO of security consulting firm SecTheory, described how it works during a presentation at last week's Black Hat USA 2007 conference in Las Vegas. It starts when a user visits any Web page -- a blog, social networking site, etc. -- that either has been designed to distribute malware or is a legitimate site infected with malware. Once that malware infects and takes control of the browser running on the user's PC, the browser can be instructed to hand over its network address translation ID, which is designed to keep internal network addresses hidden from the outside world. Once this is done, the attacker has been handed the information needed to peruse network addresses located inside the local network.

The problem isn't the result of security bugs or vulnerabilities. "You can patch all you want," Grossman said. "It's a design flaw in JavaScript. Browser security is flawed in general."

At the 2006 Black Hat USA conference, Grossman discussed the weaknesses in JavaScript that let an attacker take control of a user's browser. Simply turning off JavaScript is not a great option, given that there's no Ajax -- and, consequently, no Web 2.0 -- without JavaScript.

New methods of attack have emerged in the year since Grossman first laid out the dangers of cross-site scripting, cross-site request forgeries, and JavaScript malware. One such attack is history stealing, whereby an attacker uses JavaScript running in a user's browser to reveal the sites the user has visited most frequently. Once the attacker knows the user's Web-surfing history, the attacker can create look-alike spoofed sites containing malware or infect the sites that the user visits.

In another type of attack, JavaScript can be used to do intranet port scans by forcing the browser to make certain types of requests to internal IP addresses. Even if a browser's JavaScript has been disabled for security purposes, Grossman said port scanning can be done using HTML as well.

One of the problems with securing Web sites is that the building and securing of Web sites is treated as two separate processes. "The security guys have no control over the Web site," Grossman said. "The developers do, and they don't work for security."

While Microsoft and Mozilla have made strides in improving the security of Internet Explorer and Firefox, respectively, it's incumbent upon them to ensure that their browsers can figh toff new threats.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
[Interop ITX 2017] State Of DevOps Report
[Interop ITX 2017] State Of DevOps Report
The DevOps movement brings application development and infrastructure operations together to increase efficiency and deploy applications more quickly. But embracing DevOps means making significant cultural, organizational, and technological changes. This research report will examine how and why IT organizations are adopting DevOps methodologies, the effects on their staff and processes, and the tools they are utilizing for the best results.
Register for InformationWeek Newsletters
White Papers
Current Issue
2017 State of IT Report
In today's technology-driven world, "innovation" has become a basic expectation. IT leaders are tasked with making technical magic, improving customer experience, and boosting the bottom line -- yet often without any increase to the IT budget. How are organizations striking the balance between new initiatives and cost control? Download our report to learn about the biggest challenges and how savvy IT executives are overcoming them.
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll