DjangoChecker: Applying extended taint tracking and server side parsing for detection of context-sensitive XSS flaws

5Citations
Citations of this article
21Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Cross-site scripting (XSS) flaws are a class of security flaws that permit the injection of malicious code into a web application. In simple situations, these flaws can be caused by missing input sanitizations. Sometimes, however, all application inputs are sanitized, but the sanitizations are not appropriate for the browser contexts of the sanitized values. Using an incorrect sanitizer can make the application look protected, when it is in fact vulnerable as if no sanitization was used, creating a context-sensitive XSS flaw. To discover context-sensitive XSS flaws, we introduce DjangoChecker. DjangoChecker combines extended dynamic taint tracking with a model browser for context analysis. We demonstrate the practical application of DjangoChecker on eight mature web applications based on Django, discovering previously unknown flaws in seven of the eight applications, including highly severe flaws that allow arbitrary JavaScript execution in the seven flawed applications.

Cite

CITATION STYLE

APA

Steinhauser, A., & Tůma, P. (2019). DjangoChecker: Applying extended taint tracking and server side parsing for detection of context-sensitive XSS flaws. Software - Practice and Experience, 49(1), 130–148. https://doi.org/10.1002/spe.2649

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free