'Waldo' Finds Ways To Abuse HTML5 WebSockets
Black Hat USA researchers to release free hacking tool and demonstrate how new communication channel could be used for XSS, denial-of-service, and hiding malicious or unauthorized traffic
July 17, 2012
With new features come new risks, and HTML5 is no exception: Its WebSocket feature opens the door for a wide range of abuses by attackers, researchers will demonstrate next week at Black Hat USA.
Sergey Shekyan and Vaagn Toukharian also will release a hacking tool called Waldo for researchers to test for WebSocket vulnerabilities and potential attack vectors. WebSocket is basically a faster, more efficient way for browsers and Web servers to communicate (bidirectionally); it supports real-time applications, such as customer-support chat features and online gaming, for example. Most major browsers support it.
The problem is that today's firewalls, next-generation firewalls, unified threat management (UTM), and IDS/IPS products are not WebSocket-aware, the researchers say. In other words, they can't detect WebSocket traffic: "Nobody monitors it: We think that's the scariest part," says Shekyan, who is a senior software engineer.
WebSocket could be used for anonymized, TOR-type peer-to-peer communication, for example, as well as a platform for attacks, such as cross-site scripting (XSS) and denial-of-service, the researchers say. The good news is that WebSocket so far is deployed in a small percentage of websites today, only around 1 percent, according to their research.
Waldo is a simple tool based on the Websocketpp server that shows how easy it is to abuse WebSocket on both the client and server side as a malicious communication channel, they say. It currently runs on OS X and most flavors of Linux.
"Our tool is doing malicious things, like delivering commands to a compromised browser to steal cookies and keystrokes, copy documents, and then send them back to us," Shekyan says.
[ HTML5 could help spur SQL injection attacks on client machines, experts say. See New HTML Version Comes With Security Risks Of Its Own. ]
An attacker could launch a XSS exploit against a website to hijack its customer-support chat application, for instance. Many of these chat apps are supplied by a third party. "It's using SSL, and everything seems fine. But the main page is not from the same Web server as the one serving up the chat, and it's using plain HTTP," Shekyan says. An attacker then could execute a man-in-the-middle attack and modify the main page, intercept traffic from the browser, and pose as the customer service rep online, requesting the customer's personal information.
Toukharian, who is a developer for Qualys' Web application scanner, says it's not the WebSocket protocol that's vulnerable: It's the way organizations are implementing it. "All XSS and other vulnerabilities and man-in-the-middle WebSocket connections are weaker from the client side. The problem here is the security design of the entire Web app," he says.
From the client side, an attacker could DoS a server from a single browser because WebSocket supports 1,000 concurrent sessions. "A number of simultaneous browser connections can be opened, which can be a problem," Toukharian says.
The researchers say perimeter security vendors don't consider WebSocket a major threat for now.
They plan to share with Black Hat attendees new data they are gathering on WebSocket use around the Net. "We're going to provide statistics on who's using it ... if it's going over SSL or plain text" and other usage trends, Shekyan says.
While adoption is fairly low today, WebSocket is attractive due to its persistent connection, low overhead, and faster performance, so the concern is that this could become a hot attack vector once adoption rises. And if such attacks are under way today, they wouldn't be detectable from today's security tools, the researchers say.
Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.
Read more about:
Black Hat NewsAbout the Author
You May Also Like
Unleashing AI to Assess Cyber Security Risk
Nov 12, 2024Securing Tomorrow, Today: How to Navigate Zero Trust
Nov 13, 2024The State of Attack Surface Management (ASM), Featuring Forrester
Nov 15, 2024Applying the Principle of Least Privilege to the Cloud
Nov 18, 2024The Right Way to Use Artificial Intelligence and Machine Learning in Incident Response
Nov 20, 2024