Cross Channel Scripting and Code Injection Attacks on Web and Cloud-Based Applications: A Comprehensive Review
Abstract
:1. Introduction
1.1. Vulnerability Classes
- XCS: These attacks are common in embedded devices since they reveal numerous services beyond HTTP. Cross channel scripting bugs are much more difficult to discover than CSRF (cross-site request forgery) and XSS because they include several communication channels [8].
- RXCS (reverse cross channel scripting): When a web interface/program is used as a benchmark to attack a further service on the network device it is known as reverse cross channel scripting. RXCS attacks are mainly used for unauthorized copying, transfer, or retrieval of data that is protected by access control.
- CSRF (cross-site request forgeries): These vulnerabilities enable an adversary to reveal information to the device by using a remote site as a stepping stone.
- Cross-site scripting: These vulnerabilities are commonly found in web-based applications, where most of the interfaces and devices are vulnerable to XSS, including those that perform some input checking.
- File security: Devices such as Samsung photo frame allow an adversary to interpret protected information without any authentication [8]. On this device, the web interface will be compromised by abusing the log file, even if it is protected by the password.
- Authentication: Most of the devices authenticate users in clear-text and without HTTPS [8]. This causes security devices such as cameras to be compromised.
1.2. XCS Threat Model
- To insert malicious code on the web server, an adversary uses network protocols, which are classified as non-web channels.
- Web apps are used to send the malicious code from the server to the user’s browser. When the victim’s computer grants them access to the fraudulent online content, malware instruction is executed with his authorization [11].
- Confidential information is being filtered. Data extrusion is another term for this. When an organization’s data are stolen, transmitted, or acquired from the systems without sufficient authorization, this is a security breach [12].
- Redirecting Victims: By introducing bogus login credentials into the site, an adversary deceives the client into giving up accessibility to his or her private information.
- IP spoofing: If an adversary and a victim share a LAN, an adversary may utilize phishing to attack victims and initiate an MITM exploit for all network interactions [13].
1.3. Motivation and Contributions
- This article presents a comprehensive survey aimed to monitor, recognize, and mitigate XCS attacks in web-based and cloud-based applications.
- Various XCS attacks are explored that inject real malicious attack vectors on insecure web applications.
- Several vulnerabilities on embedded devices are discussed.
- Web application vulnerability scanner tools are also listed and discussed.
- Finally, research gaps and future research directions are presented for the research community.
2. Related Work
3. Vulnerabilities in Embedded Devices
3.1. Vulnerabilities on IP Camera and Phone
3.2. Vulnerabilities on Lights-Out Management and Digital Photo Frames
3.3. Vulnerabilities on Router, Switch, and Printer
3.4. Log-Based XCS
- Active management technology (AMT) by Intel;
- Dell remote access controller (DRAC) by Dell;
- Remote supervisor adapter (RSA) by IBM.
- Step 1:
- An adversary aims to log into the LOM device of a supervised system. As an alternative to attempting to guess login credentials, an adversary enters a payload, which contains the malicious code as the username.
- Step 2:
- The logging system will capture and save these user credentials in the log file of the LOM device. The login form present in the system does not escape the malicious information and communicates with the log file to mitigate web-based attacks.
- Step 3:
- A malevolent code is accomplished by an admin browser of a LOM system when he/she views or interprets the log file. The malevolent code could be explored to append the rogue into the LOM. Accordingly, access is granted to an adversary.
3.5. Attack on Peer-to-Peer Channel
3.6. XCS Attacks on Smartphones and Online Social Networks
4. Reverse Cross Channel Scripting (RXCS)
4.1. RXCS Attacks on Facebook
4.2. RXCS Attacks on Twitter
5. Tools Used
6. Detection of Cross Channel Scripting Attacks
6.1. Content Sanitization
6.2. Black Box Scanner Tools
6.3. Detection Approaches for XCS on the Client Side
6.4. S2XS2: Server Side Approach to Mitigate Web-Based Threats
6.5. XCS-SAFE: Mitigation of XCS Attacks
6.6. Web-Application Proxy
7. Detection and Mitigation of Cross Channel Scripting Attacks
7.1. Mitigation of Cross Channel Scripting Attacks
- Website infection: Embedded smart devices or XCS exploits are used to implant harmful content into a web application. A general populace website, an administrative site, or an embedded gadget can all be attacked with malware.
- Browsing malware content: The following step is to wait for a client to browse a hostile or compromised website. The client could then be restricted from visiting the infested site or viewing an inappropriate payload via a number of methods, including prohibiting particular types of content from being executed and keeping a collection of potentially dangerous websites, similar to the no-script browser plugin.
- Ghost injection: A ghost script injection in an XCS attack can take the following forms: A submission form with an element that would accommodate HTML, an invalid login, and a file renaming. All input/output data that that server will manage can be stolen by the embedded device for the server vendor. As a result, securing this may be tough.
- Payload execution: In the last stage of the XCS exploit, the adversary payload is executed in the context of admin access. When an administrator reads the compromised site, a dangerous code contained in it is mistakenly executed. As a result, settings are reconfigured for the creation adviser’s accounts, data are ex-filtrated from the interface to an opponent server, and some other hosts on the web are attacked.
7.2. Fingerprints for XCS Detection
7.3. Site Firewall
8. Analysis of XCS Attacks
9. Research Gaps and Future Directions
9.1. Research Gaps
- Most of the existing XCS defensive approaches are unable to provide safe input handling and encoding mechanisms at the client and server sides of the web-based application.
- An automated process is essential to differentiate between JavaScript to the malicious script [49].
- There is no proper defensive solution capable of detecting and preventing all XCS attacks, such as reflected, stored, and encoding attacks.
- A secure XSS defensive algorithm needs to possess the list of malicious scripts and domains to decrease the rate of false positives and negatives.
- In existing approaches, effective policy checks are not implemented to increase XCS detection speed and mitigation process [64].
9.2. Future Directions
- To detect and prevent the danger of future XCS attacks, a new security architecture should be built that encrypts all input data fields with known vulnerabilities at the client side. This method can also be used to detect malicious scripts on the server side.
- Adaptive analyzers can be designed to evaluate the runtime flow analysis to classify XCS attacks more efficiently.
- Generalized XCS defensive techniques can be developed at the client side to maintain the performance of systems. This can improve the web surfing experience without introducing additional overheads.
- Input validation on the client and server sides has a limited influence on more complicated data flow sources. Some difficult-to-find vulnerabilities, on the other hand, have several execution branches and file associations. As a result, the threat analysis of various execution codes is an important research direction.
- There should be an attempt to apply the XCS training and fingerprinting technique to other types of threats, such as SQL injection and modification assaults. However, a revolutionary approach that is closely related to deep learning can be used to detect and prevent cross channel scripting assaults, as well as more in-depth code audit, to increase performance and accuracy.
10. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Acknowledgments
Conflicts of Interest
References
- Gupta, S.; Gupta, B. Cross-Site Scripting (XSS) attacks and defense mechanisms: Classification and state-of-the-art. Int. J. Syst. Assur. Eng. Manag. 2015, 8, 512–530. [Google Scholar] [CrossRef]
- Nagpal, B.; Chauhan, N.; Singh, N. SECSIX: Security engine for CSRF, SQL injection and XSS attacks. Int. J. Syst. Assur. Eng. Manag. 2017, 8, 631–644. [Google Scholar] [CrossRef]
- Rodríguez, G.E.; Torres, J.G.; Flores, P.; Benavides, D.E. Cross-site scripting (XSS) attacks and mitigation: A survey. Comput. Netw. 2020, 166, 106960. [Google Scholar] [CrossRef]
- Nunes, P.; Medeiros, I.; Fonseca, J.C.; Neves, N.; Correia, M.; Vieira, M. Benchmarking static analysis tools for web security. IEEE Trans. Reliab. 2018, 67, 1159–1175. [Google Scholar] [CrossRef]
- Singh, D.; Biswal, A.K.; Samanta, D.; Singh, D.; Lee, H.N. Juice Jacking: Security Issues and Improvements in USB Technology. Sustainability 2022, 14, 939. [Google Scholar] [CrossRef]
- Mishra, B.; Agarwal, A.; Goel, A.; Ansari, A.A.; Gaur, P.; Singh, D.; Lee, H.N. Privacy Protection Framework for Android. IEEE Access 2022, 10, 7973–7988. [Google Scholar] [CrossRef]
- Bojinov, H.; Bursztein, E.; Boneh, D. XCS: Cross channel scripting and its impact on web applications. In Proceedings of the 16th ACM Conference on Computer and Communications Security, Chicago, IL, USA, 9–13 November 2009; ACM: New York, NY, USA, 2009; pp. 420–431. [Google Scholar]
- Bojinov, H.; Bursztein, E.; Lovett, E.; Boneh, D. Embedded management interfaces: Emerging massive insecurity. BlackHat USA 2009, 1, 14. [Google Scholar]
- Gupta, B.B.; Perez, G.M.; Agrawal, D.P.; Gupta, D. Handbook of Computer Networks and Cyber Security; Springer: Berlin/Heidelberg, Germany, 2020. [Google Scholar]
- Kaur, M.; Singh, D.; Kumar, V.; Gupta, B.B.; Abd El-Latif, A.A. Secure and Energy Efficient-Based E-Health Care Framework for Green Internet of Things. IEEE Trans. Green Commun. Netw. 2021, 5, 1223–1231. [Google Scholar] [CrossRef]
- Bojinov, H.; Bursztein, E.; Boneh, D. The emergence of cross channel scripting. Commun. ACM 2010, 53, 105–113. [Google Scholar] [CrossRef]
- Ali, R.; Beg, M.S. Applications of Soft Computing for the Web; Springer: Berlin/Heidelberg, Germany, 2017. [Google Scholar]
- Varadharajan, V.; Bansal, S. Data security and privacy in the internet of things (iot) environment. In Connectivity Frameworks for Smart Devices; Springer: Berlin/Heidelberg, Germany, 2016; pp. 261–281. [Google Scholar]
- Lai, J.Y.; Wu, J.S.; Chen, S.J.; Wu, C.H.; Yang, C.H. Designing a taxonomy of web attacks. In Proceedings of the 2008 International Conference on Convergence and Hybrid Information Technology, Daejeon, Korea, 28–30 August 2008; IEEE: New York, NY, USA, 2008; pp. 278–282. [Google Scholar]
- Gupta, S.; Gupta, B.; Chaudhary, P. Hunting for DOM-Based XSS vulnerabilities in mobile cloud-based online social network. Future Gener. Comput. Syst. 2018, 79, 319–336. [Google Scholar] [CrossRef]
- Marashdih, A.W.; Zaaba, Z.F. Cross Site Scripting: Removing Approaches in Web Application. Procedia Comput. Sci. 2017, 124, 647–655. [Google Scholar] [CrossRef]
- Ayeni, B.K.; Sahalu, J.B.; Adeyanju, K.R. Detecting Cross-Site Scripting in Web Applications Using Fuzzy Inference System. J. Comput. Netw. Commun. 2018, 2018, 8159548. [Google Scholar] [CrossRef]
- Pan, Y.; Sun, F.; Teng, Z.; White, J.; Schmidt, D.C.; Staples, J.; Krause, L. Detecting web attacks with end-to-end deep learning. J. Internet Serv. Appl. 2019, 10, 1–22. [Google Scholar] [CrossRef] [Green Version]
- Chaudhary, P.; Gupta, B.B.; Gupta, S. A Framework for Preserving the Privacy of Online Users Against XSS Worms on Online Social Network. Int. J. Inf. Technol. Web Eng. (IJITWE) 2019, 14, 85–111. [Google Scholar] [CrossRef]
- Madhusudhan, R. Cross Channel Scripting (XCS) Attacks in Web Applications: Detection and Mitigation Approaches. In Proceedings of the 2018 2nd Cyber Security in Networking Conference (CSNet), Paris, France, 24–26 October 2018; IEEE: New York, NY, USA, 2018; pp. 1–3. [Google Scholar]
- Madhusudhan, R. Mitigation of Cross-Site Scripting Attacks in Mobile Cloud Environments. International Symposium on Security in Computing and Communication; Springer: Berlin/Heidelberg, Germany, 2018; pp. 76–87. [Google Scholar]
- Alam, M.T.; Rasheed, K. Predicting Web Vulnerabilities in Web Applications Based on Machine Learning. In Proceedings of the Intelligent Technologies and Applications: First International Conference, INTAP 2018, Bahawalpur, Pakistan, 23–25 October 2018; Revised Selected Papers. Springer: Berlin/Heidelberg, Germany, 2019; p. 473. [Google Scholar]
- Babiker, M.; Karaarslan, E.; Hoscan, Y. Web application attack detection and forensics: A survey. In Proceedings of the 2018 6th International Symposium on Digital Forensic and Security (ISDFS), Antalya, Turkey, 22–25 March 2018; IEEE: New York, NY, USA, 2018; pp. 1–6. [Google Scholar]
- Kumar, A.; Gupta, A.; Mittal, P.; Gupta, P.K.; Varghese, S. Prevention of XSS attack using Cryptography & API integration with Web Security. Sanya, Prevention of XSS attack using Cryptography & API integration with Web Security. In Proceedings of the International Conference on Innovative Computing & Communication (ICICC) 2021, New Delhi, India, 25 April 2021. [Google Scholar]
- Kalim, A.; Jha, C.K.; Tomar, D.S.; Sahu, D.R. Novel Detection Technique For Framejacking Vulnerabilities In Web Applications. In Proceedings of the 2021 2nd International Conference on Computation, Automation and Knowledge Management (ICCAKM), Dubai, United Arab Emirates, 19–21 January 2021; pp. 265–270. [Google Scholar] [CrossRef]
- Falana, O.J.; Ebo, I.O.; Tinubu, C.O.; Adejimi, O.A.; Ntuk, A. Detection of Cross-Site Scripting Attacks using Dynamic Analysis and Fuzzy Inference System. In Proceedings of the 2020 International Conference in Mathematics, Computer Engineering and Computer Science (ICMCECS), Ayobo, Nigeria, 18–21 March 2020; pp. 1–6. [Google Scholar] [CrossRef]
- Gui, J.; Chen, Z.; Yu, X.; Lumezanu, C.; Chen, H. Anomaly Detection on Web-User Behaviors Through Deep Learning. In Proceedings of the International Conference on Security and Privacy in Communication Systems, Washington, WA, USA, 21–23 October; Springer: Berlin/Heidelberg, Germany, 2020; pp. 467–473. [Google Scholar]
- Shashidhara, R.; Madhusudhan, R. Identifying and Mitigating Against XSS Attacks in Web Applications. In Cloud Security; CRC Press: Boca Raton, FL, USA, 2021; pp. 175–187. [Google Scholar]
- Shashidhara, R.; Kantharaj, V.; Bhavya, K.; Lingareddy, S. Cross Channel Scripting Attacks (XCS) in Web Applications. In International Conference on Innovative Computing and Communications; Springer: Berlin/Heidelberg, Germany, 2022; pp. 387–397. [Google Scholar]
- Atat, R.; Liu, L.; Chen, H.; Wu, J.; Li, H.; Yi, Y. Enabling cyber-physical communication in 5G cellular networks: Challenges, spatial spectrum sensing, and cyber-security. IET Cyber-Phys. Syst. Theory Appl. 2017, 2, 49–54. [Google Scholar] [CrossRef]
- Wu, J.; Guo, S.; Huang, H.; Liu, W.; Xiang, Y. Information and communications technologies for sustainable development goals: State-of-the-art, needs and perspectives. IEEE Commun. Surv. Tutorials 2018, 20, 2389–2406. [Google Scholar] [CrossRef] [Green Version]
- Akrout, R.; Alata, E.; Kaaniche, M.; Nicomette, V. An automated black box approach for web vulnerability identification and attack scenario generation. J. Braz. Comput. Soc. 2014, 20, 1. [Google Scholar] [CrossRef] [Green Version]
- Mitropoulos, D.; Stroggylos, K.; Spinellis, D.; Keromytis, A.D. How to Train Your Browser: Preventing XSS Attacks Using Contextual Script Fingerprints. ACM Trans. Priv. Secur. (TOPS) 2016, 19, 2. [Google Scholar] [CrossRef]
- Ranganathan, C.; Ganapathy, S. Key dimensions of business-to-consumer web sites. Inf. Manag. 2002, 39, 457–465. [Google Scholar] [CrossRef]
- Wurzinger, P.; Platzer, C.; Ludl, C.; Kirda, E.; Kruegel, C. SWAP: Mitigating XSS attacks using a reverse proxy. In Proceedings of the 2009 ICSE Workshop on Software Engineering for Secure Systems, Washington, DC, USA, 19–21 January 2021; IEEE Computer Society: New York, NY, USA, 2009; pp. 33–39. [Google Scholar]
- Fonseca, J.; Vieira, M.; Madeira, H. Evaluation of web security mechanisms using vulnerability & attack injection. IEEE Trans. Dependable Secur. Comput. 2013, 11, 440–453. [Google Scholar]
- Fonseca, J.; Seixas, N.; Vieira, M.; Madeira, H. Analysis of field data on web security vulnerabilities. IEEE Trans. Dependable Secur. Comput. 2013, 11, 89–100. [Google Scholar] [CrossRef]
- Razzaq, A.; Latif, K.; Ahmad, H.F.; Hur, A.; Anwar, Z.; Bloodsworth, P.C. Semantic security against web application attacks. Inf. Sci. 2014, 254, 19–38. [Google Scholar] [CrossRef]
- Huang, C.; Liu, J.; Fang, Y.; Zuo, Z. A study on Web security incidents in China by analyzing vulnerability disclosure platforms. Comput. Secur. 2016, 58, 47–62. [Google Scholar] [CrossRef]
- Durai, K.N.; Subha, R.; Haldorai, A. A Novel Method to Detect and Prevent SQLIA Using Ontology to Cloud Web Security. Wirel. Pers. Commun. 2021, 117, 2995–3014. [Google Scholar] [CrossRef]
- Tekerek, A. A novel architecture for web-based attack detection using convolutional neural network. Comput. Secur. 2021, 100, 102096. [Google Scholar] [CrossRef]
- Lakshmi, L.; Reddy, M.P.; Santhaiah, C.; Reddy, U.J. Smart Phishing Detection in Web Pages using Supervised Deep Learning Classification and Optimization Technique ADAM. Wirel. Pers. Commun. 2021, 118, 3549–3564. [Google Scholar] [CrossRef]
- Chaudhary, P.; Gupta, B.B.; Chang, X.; Nedjah, N.; Chui, K.T. Enhancing big data security through integrating XSS scanner into fog nodes for SMEs gain. Technol. Forecast. Soc. Chang. 2021, 168, 120754. [Google Scholar] [CrossRef]
- Aliero, M.S.; Ghani, I.; Qureshi, K.N.; Rohani, M.F. An algorithm for detecting SQL injection vulnerability using black-box testing. J. Ambient. Intell. Humaniz. Comput. 2020, 11, 249–266. [Google Scholar] [CrossRef]
- Mishra, S.; Sharma, S.K.; Alowaidi, M.A. Analysis of security issues of cloud-based web applications. J. Ambient. Intell. Humaniz. Comput. 2021, 12, 7051–7062. [Google Scholar] [CrossRef]
- Zhang, X.; Zhou, Y.; Pei, S.; Zhuge, J.; Chen, J. Adversarial examples detection for XSS attacks based on generative adversarial networks. IEEE Access 2020, 8, 10989–10996. [Google Scholar] [CrossRef]
- Liu, M.; Zhang, B.; Chen, W.; Zhang, X. A survey of exploitation and detection methods of XSS vulnerabilities. IEEE Access 2019, 7, 182004–182016. [Google Scholar] [CrossRef]
- Praseed, A.; Thilagam, P.S. DDoS attacks at the application layer: Challenges and research perspectives for safeguarding web applications. IEEE Commun. Surv. Tutor. 2018, 21, 661–685. [Google Scholar] [CrossRef]
- Hydara, I.; Sultan, A.B.M.; Zulzalil, H.; Admodisastro, N. Current state of research on cross-site scripting (XSS)–A systematic literature review. Inf. Softw. Technol. 2015, 58, 170–186. [Google Scholar] [CrossRef]
- Parwani, D.; Dutta, A.; Shukla, P.; Tahiliyani, M. Various techniques of DDoS attacks detection & prevention at cloud: A survey. Orient. J. Comput. Sci. Technol. 2015, 8, 110–120. [Google Scholar]
- Wu, T.Y.; Chen, C.M.; Sun, X.; Liu, S.; Lin, J.C.W. A countermeasure to SQL injection attack for cloud environment. Wirel. Pers. Commun. 2017, 96, 5279–5293. [Google Scholar] [CrossRef]
- Gupta, S.; Gupta, B.B. XSS-secure as a service for the platforms of online social network-based multimedia web applications in cloud. Multimed. Tools Appl. 2018, 77, 4829–4861. [Google Scholar] [CrossRef]
- Chaudhary, P.; Gupta, B. A novel framework to alleviate dissemination of XSS worms in online social network (OSN) using view segregation. Neural Netw. World 2017, 27, 5. [Google Scholar] [CrossRef]
- Zhou, Y.; Wang, P. An ensemble learning approach for XSS attack detection with domain knowledge and threat intelligence. Comput. Secur. 2019, 82, 261–269. [Google Scholar] [CrossRef]
- Mokbal, F.M.M.; Dan, W.; Imran, A.; Jiuchuan, L.; Akhtar, F.; Xiaoxi, W. MLPXSS: An integrated XSS-based attack detection scheme in web applications using multilayer perceptron technique. IEEE Access 2019, 7, 100567–100580. [Google Scholar] [CrossRef]
- Shuaibu, B.M.; Norwawi, N.M.; Selamat, M.H.; Al-Alwani, A. Systematic review of web application security development model. Artif. Intell. Rev. 2015, 43, 259–276. [Google Scholar] [CrossRef]
- Tariq, I.; Sindhu, M.A.; Abbasi, R.A.; Khattak, A.S.; Maqbool, O.; Siddiqui, G.F. Resolving cross-site scripting attacks through genetic algorithm and reinforcement learning. Expert Syst. Appl. 2021, 168, 114386. [Google Scholar] [CrossRef]
- Kirda, E.; Kruegel, C.; Vigna, G.; Jovanovic, N. Noxes: A client-side solution for mitigating cross-site scripting attacks. In Proceedings of the 2006 ACM Symposium on Applied Computing, New York, NY, USA, 23–27 April 2006; ACM: New York, NY, USA, 2006; pp. 330–337. [Google Scholar]
- Shahriar, H.; Zulkernine, M. S2XS2: A server side approach to automatically detect XSS attacks. Dependable, Autonomic and Secure Computing (DASC). In Proceedings of the 2011 IEEE Ninth International Conference, Sydney, NSW, Australia, 12–14 December 2011; IEEE: New York, NY, USA, 2011; pp. 7–14. [Google Scholar]
- Sarmah, U.; Bhattacharyya, D.; Kalita, J.K. A survey of detection methods for XSS attacks. J. Netw. Comput. Appl. 2018, 118, 113–143. [Google Scholar] [CrossRef]
- Khoury, N.; Zavarsky, P.; Lindskog, D.; Ruhl, R. An analysis of black-box web application security scanners against stored SQL injection. Privacy, Security, Risk and Trust (PASSAT) and 2011 IEEE Third Inernational Conference on Social Computing (SocialCom). In Proceedings of the 2011 IEEE Third International Conference, Boston, MA, USA, 9–11 October 2011; IEEE: New York, NY, USA, 2011; pp. 1095–1101. [Google Scholar]
- Shahriar, H.; Zulkernine, M. Injecting comments to detect JavaScript code injection attacks. Computer Software and Applications Conference Workshops (COMPSACW). In Proceedings of the 2011 IEEE 35th Annual, Munich, Germany, 19–21 January 2021; IEEE: New York, NY, USA, 2011; pp. 104–109. [Google Scholar]
- Kamel, N.; Lanet, J.L. Risks induced by Web applications on smart cards. J. Inf. Secur. Appl. 2013, 18, 148–156. [Google Scholar] [CrossRef]
- Mitropoulos, D.; Louridas, P.; Polychronakis, M.; Keromytis, A.D. Defending Against Web Application Attacks: Approaches, Challenges and Implications. IEEE Trans. Dependable Secur. Comput. 2017, 16, 188–203. [Google Scholar] [CrossRef]
Detection and Prevention Techniques | Strengths | Weaknesses |
---|---|---|
Black Box Scanners [32] | Imitates external attacks from attackers and furnishes cost-effective mechanisms that configure web application firewalls | Cannot be forwarded to specific modules, leads to complex systems |
SiteFirewall [7] | Can effectively mitigates XCS attacks | Unable to prevent content loading from external resources |
Server-Side Detection [19] | Can detect XCS attacks by estimating the variation between an HTTP request and its response message | Needs an additional training phase for gathering a larger number of scripts |
Contextual Fingerprints [33] | Efficient script detection and unaffected web user experience | If a generated fingerprint is altered maliciously, then new fingerprint generation is necessary |
Server approach to detect XCS attacks [34] | Boundary insertion to enclose data generated and policy generation to verify attacker inserted content | Requires additional time for policy check and consequently degrades XCS detection probability |
SWAP [35] | Has the ability to detect variations between benign and injected malicious codes | Unable to detect many web attacks |
Vulnerability and Attack Injector Tool (VAIT) [36] | IDS for SQL attacks | Unable to detect XCS attacks |
Attack Vector Injection [37] | Prevents XSS and SQL attacks | Unable to prevent RXCS and XCS attacks |
Ontological Prototype [38] | Capable of detecting sophisticated attacks | More false positives |
Machine Learning Model [39] | Acts as a filter and has the ability to efficiently mitigate web attacks | Signature-based model |
Web Classifiers [3] | Uses AI techniques to mitigate web attacks | Unable to protect against RXCS attacks |
Ontology-Based Model [40] | Detects SQLIA web vulnerability efficiently | Unable to mitigate DOM-based XSS attacks |
XSS Attack Vectors Approach [28] | XSS attack vectors with a secure XSS layer to mitigate XSS and XCS attacks | Unable to prevent server-side attacks |
Convolution Neural Network (CNN) [41] | Efficiently detects web attacks using anomaly-based detection type | Unable to protect reflected XSS attacks |
Listwise Approach [42] | Efficiently detects phishing websites | Unable to protect against injection attacks |
Convolution Neural Network (CNN) Method [43] | Prevents privacy breaches of users | Unable to protect against SQL injection attacks |
Black Box Testing [44] | Capable of analyzing attacked page responses | Unable to protect against CSRF attacks |
Identifying Cloud-Based Web Applications [45] | Detects several cloud-based vulnerabilities | Personal and private data commitments increase the risk to data confidentiality |
MCTS-T Algorithm [46] | A generative adversarial network (GAN) was used to optimize a detector with improved detection rate | Unable to predict adversarial attacks on the server side |
Static and dynamic analysis [47] | Efficiently detects stored, reflected, DOM-based, and phishing attacks | The authors fail to investigate the approaches to mitigate XCS, SQL injection, RXCS, and CSRF attacks. |
DDoS Mitigation Approach [48] | Detects and prevents DDoS and flooding attacks on web applications | Injection and modification attacks are still possible on web applications. Fails to provide defensive mechanism for XSS attacks. |
Manufacturer | Device | Type | XCS | RXCS |
---|---|---|---|---|
Linksys | SPA-942 | IP Phone | ✓ | × |
Dell | DRAC | Lights-Out Management | ✓ | × |
IBM | RSA2 | Lights-Out Management | ✓ | × |
Buffalo | Linkstation | Network Attached Storage | ✓ | × |
Lacie | Ethernet Disk | Network Attached Storage | ✓ | × |
Linksys | NMH-305 | Network Attached Storage | ✓ | × |
QNAP | TS-109 | Network Attached Storage | ✓ | × |
Samsung | SPF-85v | Photo Frame | × | ✓ |
HP | HP 4250 | Printer | × | ✓ |
HP | HP 9000 | Printer | × | ✓ |
Linksys | WRT54G2 | Router | ✓ | × |
Allied Telesync | AT-FS750 | Switch | ✓ | × |
Attack Vector | XCS Pattern |
---|---|
HTML malicious attributes | |
Mutated XCS | ”/> |
onError | |
External source script vectors | |
Event triggered scripts | |
Explicate Attack vectors | |
onClick | |
Scanners | Vendors | Version | Scanning | VulnerabilityDetected | Merits | Demerits |
---|---|---|---|---|---|---|
AppScan | IBM | 7.5 | All Checks | Stored XSS | Scans open source software with accuracy | Detects only XSS vectors |
WVS | Acunetix | 8.0 | Stored XSS | File Inclusion | Better integration | Scanning become slow on large websites |
WebInspect | HP | 7.5 | All checks | SQL Injection | Easy to use | Installation is a bit tricky |
HailStorm Pro | Cenzic | 9.0 | PCI Infrastructure | XCS, JavaScript | Easily scans and shares reports | No cloud-based platform |
SECURE | McAfee | 4.0 | Denial-of-Service | XSS and XCS | While the computer is booting, it does not slow it down | Not efficient |
QualysGuard PCI | Qualys | 5.0 | PCI | XCS | Able to complete outer scans with confidence | Fewer false positives |
NeXpose | Rapid7 | 8.0 | All Checks | SQL Injection | Optimizes the testing cycles | Risk |
File Inclusion | ||||||
QA Edition | N-Stalker | 5.8 | PCI Infrastructure | XCS and SQL attack | Queries against inventory are easy | The database can be fragile |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
M, I.; Kaur, M.; Raj, M.; R, S.; Lee, H.-N. Cross Channel Scripting and Code Injection Attacks on Web and Cloud-Based Applications: A Comprehensive Review. Sensors 2022, 22, 1959. https://doi.org/10.3390/s22051959
M I, Kaur M, Raj M, R S, Lee H-N. Cross Channel Scripting and Code Injection Attacks on Web and Cloud-Based Applications: A Comprehensive Review. Sensors. 2022; 22(5):1959. https://doi.org/10.3390/s22051959
Chicago/Turabian StyleM, Indushree, Manjit Kaur, Manish Raj, Shashidhara R, and Heung-No Lee. 2022. "Cross Channel Scripting and Code Injection Attacks on Web and Cloud-Based Applications: A Comprehensive Review" Sensors 22, no. 5: 1959. https://doi.org/10.3390/s22051959
APA StyleM, I., Kaur, M., Raj, M., R, S., & Lee, H. -N. (2022). Cross Channel Scripting and Code Injection Attacks on Web and Cloud-Based Applications: A Comprehensive Review. Sensors, 22(5), 1959. https://doi.org/10.3390/s22051959