Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

04:31 PM
Connect Directly

'Waldo' Finds Ways To Abuse HTML5 WebSockets

Black Hat USA researchers to release free hacking tool and demonstrate how new communication channel could be used for XSS, denial-of-service, and hiding malicious or unauthorized traffic

With new features come new risks, and HTML5 is no exception: Its WebSocket feature opens the door for a wide range of abuses by attackers, researchers will demonstrate next week at Black Hat USA.

Click here for more of Dark Reading's Black Hat articles.

Sergey Shekyan and Vaagn Toukharian also will release a hacking tool called Waldo for researchers to test for WebSocket vulnerabilities and potential attack vectors. WebSocket is basically a faster, more efficient way for browsers and Web servers to communicate (bidirectionally); it supports real-time applications, such as customer-support chat features and online gaming, for example. Most major browsers support it.

The problem is that today's firewalls, next-generation firewalls, unified threat management (UTM), and IDS/IPS products are not WebSocket-aware, the researchers say. In other words, they can't detect WebSocket traffic: "Nobody monitors it: We think that's the scariest part," says Shekyan, who is a senior software engineer.

WebSocket could be used for anonymized, TOR-type peer-to-peer communication, for example, as well as a platform for attacks, such as cross-site scripting (XSS) and denial-of-service, the researchers say. The good news is that WebSocket so far is deployed in a small percentage of websites today, only around 1 percent, according to their research.

Waldo is a simple tool based on the Websocketpp server that shows how easy it is to abuse WebSocket on both the client and server side as a malicious communication channel, they say. It currently runs on OS X and most flavors of Linux.

"Our tool is doing malicious things, like delivering commands to a compromised browser to steal cookies and keystrokes, copy documents, and then send them back to us," Shekyan says.

[ HTML5 could help spur SQL injection attacks on client machines, experts say. See New HTML Version Comes With Security Risks Of Its Own. ]

An attacker could launch a XSS exploit against a website to hijack its customer-support chat application, for instance. Many of these chat apps are supplied by a third party. "It's using SSL, and everything seems fine. But the main page is not from the same Web server as the one serving up the chat, and it's using plain HTTP," Shekyan says. An attacker then could execute a man-in-the-middle attack and modify the main page, intercept traffic from the browser, and pose as the customer service rep online, requesting the customer's personal information.

Toukharian, who is a developer for Qualys' Web application scanner, says it's not the WebSocket protocol that's vulnerable: It's the way organizations are implementing it. "All XSS and other vulnerabilities and man-in-the-middle WebSocket connections are weaker from the client side. The problem here is the security design of the entire Web app," he says.

From the client side, an attacker could DoS a server from a single browser because WebSocket supports 1,000 concurrent sessions. "A number of simultaneous browser connections can be opened, which can be a problem," Toukharian says.

The researchers say perimeter security vendors don't consider WebSocket a major threat for now.

They plan to share with Black Hat attendees new data they are gathering on WebSocket use around the Net. "We're going to provide statistics on who's using it ... if it's going over SSL or plain text" and other usage trends, Shekyan says.

While adoption is fairly low today, WebSocket is attractive due to its persistent connection, low overhead, and faster performance, so the concern is that this could become a hot attack vector once adoption rises. And if such attacks are under way today, they wouldn't be detectable from today's security tools, the researchers say.

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio


Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/9/2020
Russian Cyber Gang 'Cosmic Lynx' Focuses on Email Fraud
Kelly Sheridan, Staff Editor, Dark Reading,  7/7/2020
Why Cybersecurity's Silence Matters to Black Lives
Tiffany Ricks, CEO, HacWare,  7/8/2020
Register for Dark Reading Newsletters
White Papers
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-07-10
Django Two-Factor Authentication before 1.12, stores the user's password in clear text in the user session (base64-encoded). The password is stored in the session when the user submits their username and password, and is removed once they complete authentication by entering a two-factor authenticati...
PUBLISHED: 2020-07-10
In Bareos Director less than or equal to 16.2.10, 17.2.9, 18.2.8, and 19.2.7, a heap overflow allows a malicious client to corrupt the director's memory via oversized digest strings sent during initialization of a verify job. Disabling verify jobs mitigates the problem. This issue is also patched in...
PUBLISHED: 2020-07-10
Bareos before version 19.2.8 and earlier allows a malicious client to communicate with the director without knowledge of the shared secret if the director allows client initiated connection and connects to the client itself. The malicious client can replay the Bareos director's cram-md5 challenge to...
PUBLISHED: 2020-07-10
osquery before version 4.4.0 enables a priviledge escalation vulnerability. If a Window system is configured with a PATH that contains a user-writable directory then a local user may write a zlib1.dll DLL, which osquery will attempt to load. Since osquery runs with elevated privileges this enables l...
PUBLISHED: 2020-07-10
An exploitable SQL injection vulnerability exists in the Admin Reports functionality of Glacies IceHRM v26.6.0.OS (Commit bb274de1751ffb9d09482fd2538f9950a94c510a) . A specially crafted HTTP request can cause SQL injection. An attacker can make an authenticated HTTP request to trigger this vulnerabi...