Send email Copy Email Address
2020-11

PMForce: Systematically Analyzing PostMessage Handlers at Scale

Summary

The Web has become a platform in which applications rely on intricate interactions that span across the boundaries of origins. While the Same-Origin Policy prevents direct data exchange with documents from other origins, the postMessage API offers one relaxation that allows developers to exchange data across these boundaries nevertheless. While prior manual analysis efforts have already shown the presence of issues within postMessage handlers, unfortunately, a steep increase in postMessage usage makes any manual approach intractable. To deal with this increased analysis work load, we set out to automatically find issues in postMessage handlers that allow an attacker to execute code in the vulnerable sites, alter its client-side state, or leak sensitive information. To achieve this goal, we present an automated analysis framework running inside the browser, which uses selective force execution paired with lightweight dynamic taint tracking to find traces in the analyzed handlers that end in sinks allowing for code-execution or state alterations. We use path constraints extracted from the program traces and augment them with Exploit Templates, i.e., additional constraints, ascertaining that a valid assignment that solves all these constraints produces a code-invoking or state-manipulating behavior. Based on these constraints, we use Z3 to generate postMessages aimed at triggering the insecure functionality to prove exploitability, and validate our findings at scale. We use this framework to conduct the most comprehensive experiment studying the security issues of postMessage handlers found throughout the top 100,000 most influential sites yet, which allows us to find potentially exploitable data flows in 252 unique handlers out of which 111 were automatically exploitable.

Conference / Medium

ACM CCS 2020

Date published

2020-11

Date last modified

2020-07-29 17:21:40