TitleAutomatic creation of SQL injection and cross-site scripting attacks
Publication TypeConference Paper
Year of Publication2009
AuthorsKieżun A, Guo PJ, Jayaraman K, Ernst MD
Conference NameICSE 2009, Proceedings of the 31st International Conference on Software Engineering
Pagination199–209
Date or Month PublishedMay
Conference LocationVancouver, BC, Canada
AbstractWe present a technique for finding security vulnerabilities in Web applications. SQL Injection (SQLI) and cross-site scripting (XSS) attacks are widespread forms of attack in which the attacker crafts the input to the application to access or modify user data and execute malicious code. In the most serious attacks (called second-order, or persistent, XSS), an attacker can corrupt a database so as to cause subsequent users to execute malicious code. \par This paper presents an automatic technique for creating inputs that expose SQLI and XSS vulnerabilities. The technique generates sample inputs, symbolically tracks taints through execution (including through database accesses), and mutates the inputs to produce concrete exploits. Ours is the first analysis of which we are aware that precisely addresses second-order XSS attacks. \par Our technique creates real attack vectors, has few false positives, incurs no runtime overhead for the deployed application, works without requiring modification of application code, and handles dynamic programming-language constructs. We implemented the technique for PHP, in a tool Ardilla. We evaluated Ardilla on five PHP applications and found 68 previously unknown vulnerabilities (23 SQLI, 33 first-order XSS, and 12 second-order XSS).
Downloadshttps://groups.csail.mit.edu/pag/ardilla/ Experimental data https://homes.cs.washington.edu/~mernst/pubs/create-attacks-icse2009.pdf PDF https://homes.cs.washington.edu/~mernst/pubs/create-attacks-icse2009-sli... slides (PDF)
Citation KeyKiezunGJE2009