skip to main content
10.1145/1866307.1866376acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Protecting browsers from cross-origin CSS attacks

Published:04 October 2010Publication History

ABSTRACT

Cross-origin CSS attacks use style sheet import to steal confidential information from a victim website, hijacking a user's existing authenticated session; existing XSS defenses are ineffective. We show how to conduct these attacks with any browser, even if JavaScript is disabled, and propose a client-side defense with little or no impact on the vast majority of web sites. We have implemented and deployed defenses in Firefox, Google Chrome, and Safari. Our defense proposal has also been adopted by Opera.

References

  1. ]]Alexa. Top Sites. http://www.alexa.com/topsites.Google ScholarGoogle Scholar
  2. ]]A. Barth. HTTP state management mechanism, 2010. https://datatracker.ietf.org/doc/draft-ietf-httpstate-cookie/.Google ScholarGoogle Scholar
  3. ]]A. Barth, J. Caballero, and D. Song. Secure content sniffing for web browsers, or how to stop papers from reviewing themselves. In Proceedings of the 30th IEEE Symposium on Security and Privacy, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. ]]A. Barth, C. Jackson, and J. C. Mitchell. Robust defenses for cross-site request forgery. In Proceedings of the 15th ACM Conference on Computer and Communications Security, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. ]]T. Berners-Lee. WorldWideWeb: Proposal for a HyperText Project, 1990. http://www.w3.org/Proposal.html.Google ScholarGoogle Scholar
  6. ]]H. Bojinov, E. Bursztein, and D. Boneh. XCS: cross channel scripting and its impact on web applications. In CCS '09: Proceedings of the 16th ACM conference on Computer and communications security, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. ]]T. Close. Web-key: Mashing with permission. In Web 2.0 Security and Privacy, 2008.Google ScholarGoogle Scholar
  8. ]]D. Crockford. The application/json media type for JavaScript Object Notation (JSON), 2006. http://tools.ietf.org/html/rfc4627.Google ScholarGoogle Scholar
  9. ]]Fortify. JavaScript Hijacking Vulnerability Detected. http://www.fortify.com/advisory.jsp.Google ScholarGoogle Scholar
  10. ]]J. Franks, P. M. Hallam-Baker, J. L. Hostetler, S. D. Lawrence, and P. J. Leach. HTTP authentication, 1999. http://www.ietf.org/rfc/rfc2617.txt.Google ScholarGoogle Scholar
  11. ]]M. Gillon. Google Desktop Exposed: Exploiting an Internet Explorer vulnerability to phish user information, 2005. http://www.hacker.co.il/security/ie/css_import.html.Google ScholarGoogle Scholar
  12. ]]D. Goldsmith and M. Davis. UTF-7: A Mail-Safe Transformation Format of Unicode, 1997. http://tools.ietf.org/html/rfc2152. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. ]]GreyMagic Software. GreyMagic Security Advisory GM#004-IE, 2002. http://www.greymagic.com/ security/advisories/gm004-ie/.Google ScholarGoogle Scholar
  14. ]]C. Grier, S. Tang, and S. T. King. Secure web browsing with the OP web browser. In IEEE Symposium on Security and Privacy, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. ]]D. Hyatt, W. Bastian, et al. WebKit, an open source web browser engine, 2005--2010. http://webkit.org/.Google ScholarGoogle Scholar
  16. ]]C. Jackson. Improving Browser Security Policies. PhD thesis, Stanford University, Stanford, CA, USA, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. ]]C. Jackson, A. Bortz, D. Boneh, and J. C. Mitchell. Protecting browser state from web privacy attacks. In Proceedings of the 15th International World Wide Web Conference. (WWW 2006), 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. ]]D. M. Kristol and L. Montulli. HTTP state management mechanism, 1997. http://www.ietf.org/rfc/rfc2109.txt. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. ]]E. Lawrence. IE8 Security Part V: Comprehensive Protection. http://blogs.msdn.com/ie/archive/2008/07/02/ie8-security-part-v-comprehensive-protection.aspx.Google ScholarGoogle Scholar
  20. ]]H. W. Lie. Cascading Style Sheets. PhD thesis, University of Oslo, Norway, 2005. http://people.opera.com/howcome/2006/phd/.Google ScholarGoogle Scholar
  21. ]]T. Oda, G. Wurster, P. C. van Oorschot, and A. Somayaji. SOMA: mutual approval for included content in web pages. In Proceedings of the 15th ACM conference on Computer and communications security, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. ]]ofk. CSSXSS attack on mixi post key, 2008. http://d.hatena.ne.jp/ofk/20081111/1226407593.Google ScholarGoogle Scholar
  23. ]]J. Ruderman. JavaScript Security: Same Origin. http://www.mozilla.org/projects/security/components/same-origin.html.Google ScholarGoogle Scholar
  24. ]]S. Stamm, B. Sterne, and G. Markham. Reining in the web with content security policy. In WWW '10: Proceedings of the 19th international conference on World wide web, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. ]]A. van Kesteren et al. Cross-origin resource sharing (editor's draft), 2010. http://dev.w3.org/2006/waf/access-control/.Google ScholarGoogle Scholar
  26. ]]W3C. CSS syntax and basic data types. http://www.w3.org/TR/CSS2/syndata.html.Google ScholarGoogle Scholar
  27. ]]W3C. Document Object Model CSS. http://www.w3.org/TR/DOM-Level-2-Style/css.html.Google ScholarGoogle Scholar
  28. ]]W3C. HTML 4.01 Specification. http://www.w3.org/TR/html4/.Google ScholarGoogle Scholar
  29. ]]H. J. Wang, C. Grier, A. Moshchuk, S. T. King, P. Choudhury, and H. Venter. The Multi-Principal OS Construction of the Gazelle Web Browser. In Proceedings of the 18th USENIX Security Symposium, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. ]]E. Z. Yang. HTML Purifier, 2006--2010. http://htmlpurifier.org.Google ScholarGoogle Scholar

Index Terms

  1. Protecting browsers from cross-origin CSS attacks

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        CCS '10: Proceedings of the 17th ACM conference on Computer and communications security
        October 2010
        782 pages
        ISBN:9781450302456
        DOI:10.1145/1866307

        Copyright © 2010 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 4 October 2010

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Upcoming Conference

        CCS '24
        ACM SIGSAC Conference on Computer and Communications Security
        October 14 - 18, 2024
        Salt Lake City , UT , USA

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader