Black Widow: Blackbox Data-driven Web Scanning

被引:31
作者
Eriksson, Benjamin [1 ]
Pellegrino, Giancarlo [2 ]
Sabelfeld, Andrei [1 ]
机构
[1] Chalmers Univ Technol, Gothenburg, Sweden
[2] CISPA Helmholtz Ctr Informat Secur, Saarbrucken, Germany
来源
2021 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP | 2021年
基金
瑞典研究理事会;
关键词
web application scanning; security testing; cross-site scripting; XSS; web crawling; VULNERABILITIES; SCANNERS;
D O I
10.1109/SP40001.2021.00022
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Modern web applications are an integral part of our digital lives. As we put more trust in web applications, the need for security increases. At the same time, detecting vulnerabilities in web applications has become increasingly hard, due to the complexity, dynamism, and reliance on third-party components. Blackbox vulnerability scanning is especially challenging because (i) for deep penetration of web applications scanners need to exercise such browsing behavior as user interaction and asynchrony, and (ii) for detection of nontrivial injection attacks, such as stored cross-site scripting (XSS), scanners need to discover inter-page data dependencies. This paper illuminates key challenges for crawling and scanning the modern web. Based on these challenges we identify three core pillars for deep crawling and scanning: navigation modeling, traversing, and tracking inter-state dependencies. While prior efforts are largely limited to the separate pillars, we suggest an approach that leverages all three. We develop Black Widow, a blackbox data-driven approach to web crawling and scanning. We demonstrate the effectiveness of the crawling by code coverage improvements ranging from 63% to 280% compared to other crawlers across all applications. Further, we demonstrate the effectiveness of the web vulnerability scanning by featuring no false positives and finding more cross-site scripting vulnerabilities than previous methods. In older applications, used in previous research, we find vulnerabilities that the other methods miss. We also find new vulnerabilities in production software, including HotCRP, osCommerce, PrestaShop and WordPress.
引用
收藏
页码:1125 / 1142
页数:18
相关论文
共 42 条
[1]  
[Anonymous], 2020, CVE-ID CVE- 2020-5271
[2]   Saner: Composing static and dynamic analysis to validate sanitization in web applications [J].
Balzarotti, Davide ;
Cova, Marco ;
Felmetsger, Vika ;
Jovanovic, Nenad ;
Kirda, Engin ;
Kruegel, Christopher ;
Vigna, Giovanni .
PROCEEDINGS OF THE 2008 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2008, :387-+
[3]   State of the Art: Automated Black-Box Web Application Vulnerability Testing [J].
Bau, Jason ;
Bursztein, Elie ;
Gupta, Divij ;
Mitchell, John .
2010 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2010, :332-345
[4]   Automated Security Testing of Web Widget Interactions [J].
Bezemer, Cor-Paul ;
Mesbah, Ali ;
van Deursen, Arie .
7TH JOINT MEETING OF THE EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND THE ACM SIGSOFT SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING, 2009, :81-90
[5]  
Bugcrowd, 2020, The State of Crowdsourced Security in 2019
[6]   Mitch: A Machine Learning Approach to the Black-Box Detection of CSRF Vulnerabilities [J].
Calzavara, Stefano ;
Conti, Mauro ;
Focardi, Riccardo ;
Rabitti, Alvise ;
Tolomei, Gabriele .
2019 4TH IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P), 2019, :528-543
[7]  
Doupe A., 2018, Wackopicko
[8]  
Doupé A, 2010, LECT NOTES COMPUT SC, V6201, P111, DOI 10.1007/978-3-642-14215-4_7
[9]   Data Preparation for Mining World Wide Web Browsing Patterns [J].
Robert Cooley ;
Bamshad Mobasher ;
Jaideep Srivastava .
Knowledge and Information Systems, 1999, 1 (1) :5-32
[10]  
Duchène F, 2013, WORK CONF REVERSE EN, P252, DOI 10.1109/WCRE.2013.6671300