Next Article in Journal
Security Requirements and Challenges of 6G Technologies and Applications
Next Article in Special Issue
Two-Way Feature Extraction for Speech Emotion Recognition Using Deep Learning
Previous Article in Journal
An Image Augmentation Method Based on Limited Samples for Object Tracking Based on Mobile Platform
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Review

Cross Channel Scripting and Code Injection Attacks on Web and Cloud-Based Applications: A Comprehensive Review

1
School of Engineering and Applied Sciences, Bennett University, Greater Noida 201310, India
2
School of Electrical Engineering and Computer Science, Gwangju Institute of Science and Technology, Gwangju 61005, Korea
*
Author to whom correspondence should be addressed.
Sensors 2022, 22(5), 1959; https://doi.org/10.3390/s22051959
Submission received: 26 December 2021 / Revised: 22 February 2022 / Accepted: 24 February 2022 / Published: 2 March 2022

Abstract

:
Cross channel scripting (XCS) is a common web application vulnerability, which is a variant of a cross-site scripting (XSS) attack. An XCS attack vector can be injected through network protocol and smart devices that have web interfaces such as routers, photo frames, and cameras. In this attack scenario, the network devices allow the web administrator to carry out various functions related to accessing the web content from the server. After the injection of malicious code into web interfaces, XCS attack vectors can be exploited in the client browser. In addition, scripted content can be injected into the networked devices through various protocols, such as network file system, file transfer protocol (FTP), and simple mail transfer protocol. In this paper, various computational techniques deployed at the client and server sides for XCS detection and mitigation are analyzed. Various web application scanners have been discussed along with specific features. Various computational tools and approaches with their respective characteristics are also discussed. Finally, shortcomings and future directions related to the existing computational techniques for XCS are presented.

1. Introduction

Web applications (apps) are now widely accepted as one of the best platforms for delivering information over the Internet. These apps provide access to a variety of online services, such as social networking sites, e-mails, Internet banking, and e-commerce applications, that employ several technologies and web components [1,2]. The ease with which attackers may gain a foothold and the widespread availability of online attack development tools are fueling a surge in web application vulnerabilities.
Commercial and technology-related websites were commonly targeted, according to Symantec’s Security Report for 2020. Cross-site scripting (XSS) is a type of cyber threat in which a browser application’s loopholes are exploited in order to inject a malicious script. This means that stealing cookies, phishing, or hacking an organization’s entire network might compromise users’ data [3]. Websites connected to tech were nearly twice as likely to be hacked as those devoted for commerce. An attacker could impersonate a person by using a forged credential. The opponent gains access to constrained zones, increasing the number of attack opportunities. As a result, attackers are attempting to target high-traffic technological websites, which is where virus purveyors are currently focusing their efforts [4].
The huge number of communication technologies can make it difficult to defend against web-based apps on consumers’ electrical devices [5]. For instance, a website might utilize the Server Message Block protocols to upload a program to a network storage media, monitor its rights via the web interface, and then distribute it through the File Transfer Protocol. In a previous study, many of the consumer electronic devices inspected were vulnerable to some sort of scripting attacks [6]. A malicious person uses a basic network mail transfer protocol as an exploit vector in XCS. Several devices in a shared environment permit users to store information via the SMB protocol. As a result, the adversary can implant harmful information including malware scripts [7]. The scenario of XCS payload execution and various attack types are depicted in Figure 1.

1.1. Vulnerability Classes

Many vulnerabilities are present in web-based management interfaces. Some of them are classified as follows.
  • XCS: These attacks are common in embedded devices since they reveal numerous services beyond HTTP. Cross channel scripting bugs are much more difficult to discover than CSRF (cross-site request forgery) and XSS because they include several communication channels [8].
  • RXCS (reverse cross channel scripting): When a web interface/program is used as a benchmark to attack a further service on the network device it is known as reverse cross channel scripting. RXCS attacks are mainly used for unauthorized copying, transfer, or retrieval of data that is protected by access control.
  • CSRF (cross-site request forgeries): These vulnerabilities enable an adversary to reveal information to the device by using a remote site as a stepping stone.
  • Cross-site scripting: These vulnerabilities are commonly found in web-based applications, where most of the interfaces and devices are vulnerable to XSS, including those that perform some input checking.
  • File security: Devices such as Samsung photo frame allow an adversary to interpret protected information without any authentication [8]. On this device, the web interface will be compromised by abusing the log file, even if it is protected by the password.
  • Authentication: Most of the devices authenticate users in clear-text and without HTTPS [8]. This causes security devices such as cameras to be compromised.

1.2. XCS Threat Model

XCS flaws leverage communication protocols and web applications to implant security vulnerabilities into web pages that are executed in their security environment. This scripting will be used by the adversary to transmit a dangerous payload to an authorized user [9,10]. Cross channel scripting refers to web-based assaults launched through a non-web medium (XCS), which allows hackers to insert client-side scripting into websites, after which an adversary can transmit a harmful code through XCS.
The scenario of an XCS attack is shown in Figure 2. An XCS attack is described through the following steps:
  • To insert malicious code on the web server, an adversary uses network protocols, which are classified as non-web channels.
  • Web apps are used to send the malicious code from the server to the user’s browser. When the victim’s computer grants them access to the fraudulent online content, malware instruction is executed with his authorization [11].
XCS could be used to launch a variety of threats. The following is a list of them:
  • Confidential information is being filtered. Data extrusion is another term for this. When an organization’s data are stolen, transmitted, or acquired from the systems without sufficient authorization, this is a security breach [12].
  • Redirecting Victims: By introducing bogus login credentials into the site, an adversary deceives the client into giving up accessibility to his or her private information.
  • IP spoofing: If an adversary and a victim share a LAN, an adversary may utilize phishing to attack victims and initiate an MITM exploit for all network interactions [13].

1.3. Motivation and Contributions

Cross channel scripting attacks occur almost daily. Recently, famous social networks such as Twitter, Facebook, and Google, have become part of XCS vulnerabilities. In addition, XCS attack vectors were found in Yahoo, PayPal, Justin.tv, Orkut, Hotmail, a universal search engine of the UK parliament website, and many more [1]. The contributions of this article include:
  • This article presents a comprehensive survey aimed to monitor, recognize, and mitigate XCS attacks in web-based and cloud-based applications.
  • Various XCS attacks are explored that inject real malicious attack vectors on insecure web applications.
  • Several vulnerabilities on embedded devices are discussed.
  • Web application vulnerability scanner tools are also listed and discussed.
  • Finally, research gaps and future research directions are presented for the research community.
The rest of the paper is organized as follows: Section 2 presents the related work. Section 3 discusses vulnerabilities in embedded devices. Section 4 demonstrates reverse cross channel scripting (RXCS). Section 5 lists the tools used to find XCS attacks. The XCS detection techniques are illustrated in Section 6. Mitigation techniques, the concept of contextual fingerprints, and the use of site firewalls are presented in Section 7. Section 8 presents the analysis of XCS attacks. Section 9 discusses the research gaps and future directions. Section 10 concludes the paper.

2. Related Work

The security of consumer electronic web interfaces is the most vulnerable to XCS attacks. The cross channel scripting attacks often produce striking results, such as control of the whole device or a substantial subsystem of the device [7].
In 2008, Lai et al. [14] proposed a new taxonomy of web attacks that is focused on HTTP methods. In addition, they focused on SQL injection and modification attacks. However, they failed to cover other web vulnerabilities such as XSS, XCS, CSRF, and RXCS attacks. In 2009, Bojinov et al. [7] proposed an approach titled “XCS: Cross channel scripting and its impact on web applications” to exploit XCS attacks on consumer electronic devices. Furthermore, the researchers ignored the smaller exploits as they believed that the most significant threats will come from easily accessible web interfaces that are bridged to the user’s browser. In addition, they proposed a client-side defense mechanism to mitigate XCS attacks. However, the authors only focused on XCS, RXCS, and CSRF attacks, and the proposed mechanism is vulnerable to injection attacks. Bojinov et al. [11] demonstrated that commercially available consumer electronic devices with networking functionalities such as network-attached storage devices, modern cameras, printers, digital photo frames, and wireless routers are vulnerable to cross channel scripting attacks.
Gupta et al. [15] presented a cloud-based framework that removes XSS vulnerabilities caused due to the injection of HTML5 attack vectors in web applications. In addition, this approach mitigates the insertion of malicious vectors in the script nodes of a DOM tree. In 2017, Marashdih et al. [16] also presented methods and tools that are used to remove the attack vectors of XCS from PHP source code.
In 2018, Ayeni et al. [17,18] implemented a novel solution to identify cross channel scripting attacks in web applications using a fuzzy inference system. This method was implemented based on a fuzzy logic to find web application security flaws and to achieve some experimental results, and this approach recorded a 0.01% reduction in the false positive rate as well as a 15% improvement in accuracy. This is noticeably less than that identified in previous works.
In 2019, Chaudhary et al. [19] developed an approach for the preservation of users’ privacy against cross-site scripting worms on social networks. This security framework generates all of the requests and forms an access control list. Furthermore, this access insertion checks for removing malevolent vulnerabilities. After authentication in the recognition phase, vulnerabilities will be received from the extracted points. Furthermore, this approach sanitizes compressed clustered templates in the context-aware system.
In addition, Madhusudhan et al. [20] presented a secure XCS approach to deal with malign scripts, which reaches the browser from possible paths. Furthermore, they have designed the attack discovery and mitigation approach known as the secure XSS layer. Furthermore, In 2018, Madhusudhan et al. [21] proposed an approach for cross channel scripting (XCS) attacks in web applications. They listed and presented XCS detection and mitigation mechanisms.
Alam et al. [22] introduced a machine learning framework for predicting web vulnerabilities in web applications. The framework deploys the classification on various classifiers of ML algorithms to determine XCS and XSS vulnerabilities from the web applications. Several inspections have been carried out in their study to know the system’s performance. Furthermore, they built six classifiers with a meta classifier on the training set of files presented by text features and metrics. The proposed NMPREDICTOR was examined on the datasets of three web-based applications, and gave superior quality vulnerabilities identified in Moodle, PHP MyAdmin, and Drupal. Later, Babiker et al. [23] proposed a study to investigate various methods used to detect attacks on web applications via intrusion detection systems, firewalls, honeypots, and forensic techniques based on machine learning. However, they failed to target particular attack vectors related to XCS, XSS, SQL injection, etc.
Kumar et al. [24] provided security against XSS attacks by encrypting the API key authentication level. It helped to avoid the direct access of API. Additionally, the request for script code execution was converted into plain text so that it could not be executed over the browser. Kalim et al. [25] identified the variants of jacking vulnerabilities using machine learning techniques. The abnormal behaviors were classified using J48, Naïve Bayes, and LogiBoost. Falana et al. [26] used fuzzy inference and dynamic analysis to detect the XSS attacks. The points of injection were observed through the scanning of the website. After that, via an HTTP request, an attack vector was launched to a web application. Finally, the existence of an attack was predicted by the HTTP response. Gui et al. [27] utilized deep learning to identify the abnormal behavior of web users. This method achieved 96% of recall and precision.
In 2021, Shashidhara et al. [28] presented a novel approach to identify cross-site scripting attacks using a safe XSS detection layer at the client side. Recently, Kantharaj et al. [29] demonstrated various approaches to detect and mitigate cross channel scripting attacks from modern web applications.
The researchers also proposed some well-known methodologies and tools to detect cross channel scripting attacks from vulnerable embedded devices used in web-based management interfaces [1,21,30,31]. A detailed comprehensive survey on XCS detection and mitigation techniques proposed by different researchers is presented in Table 1. We also identified the strengths and weaknesses of these XCS mitigation techniques.

3. Vulnerabilities in Embedded Devices

This section describes vulnerabilities found in various embedded devices. In [8], the authors conducted a secure embedded web-based management interface project at the Stanford security lab. They investigated the security of embedded management interfaces, and their investigation revealed that most of the embedded devices are used for web-based management interfaces containing significant vulnerabilities. Bojinov et al. [8] found vulnerabilities in some devices; they also suggested some well-known approaches and tools for detecting cross channel scripting attacks from vulnerable embedded devices in web-based management interfaces, which are illustrated in Figure 3.

3.1. Vulnerabilities on IP Camera and Phone

A sort of CCTV (closed circuit television), also known as video surveillance, is the desired and cost-effective way of attaining secrecy in residential and workplaces. The IP cameras provide a web-based management interface through which the possessor can configure IP cameras and sight the videos that have been captured.
In IP cameras, vulnerability can be exploited by constraining an administrator (admin) to sight dangerous content in the form. Then, conforming to those particular forms spontaneously, the adversary is acting with the interest of the admin [42].
IP phones are used for voice communications on the Internet or local area networks. First of all, we do not have to use a public switched telephone network for making calls, which reduces the cost of phone calls. IP phones have a web interface and as likely to happen, pervasiveness on the network will result in a considerable, exploitable realm of targets. Using a registered username, the adversary can make a session initiation protocol call to an IP phone and insert a malicious script to the call log. Once the log is sighted by an admin, the script will be executed in the admin’s browser with the device privileges. An adversary must know the device phone number to exploit this vulnerability [49].

3.2. Vulnerabilities on Lights-Out Management and Digital Photo Frames

Lights-out management (LOM) consists of programs and a hardware component that allow for remote operations such as rebooting, troubleshooting, shutdown, alarm setting, and operating system re-installation options through a web interface.
Bojinov et al. [8] identified login XCS with DRAC-4 LOM (Dell’s remote access controller). To exploit the vulnerability in DRAC-4, an adversary has to access the login page of the device. When a login is unsuccessful, the failed user name is stored in the DRAC-4 log, which allows an adversary to use user credentials to insert malicious content into the system log. Once the system log is viewed by an admin, the script automatically executes in the admin’s browser with the device privileges.
The digital photo frames permit a user to display a sequence of photos in a single frame, which are substantially connected using a wireless network to web interfaces for configuration and setup.
A digital photo frame allows an adversary to save the malicious script in a device, which is exploited by the client who eventually visits the interface and clicks a button in the photo frame, due to the absence of input validation [43]. This type of vulnerability is exploited by saving malicious content in an unchecked input field.

3.3. Vulnerabilities on Router, Switch, and Printer

The router is a connecting device that routes data packets along with the network. Routers are located at gateways, places where two or more networks connect. Generally, each has a web-based interface that permits the network administrator to configure several options including wireless encryption, network address translation (NAT), port forwarding, and MAC filtering. To grant end users to configure these options, they substantially run an internal server.
To exploit vulnerability in the router, the adversary attempts to log in to the device. An adversary can restore malicious settings to the router device by using the Linksys router configuration restore option, which is known as Backup File XCS attack [50]. This is extremely easy since the backup file does not contain a MAC address to safeguard legitimacy. The malicious script injection can occur when a cautiously constructed restore file is used; this causes an arbitrary script to be executed in the admin’s browser of the next page view.
A switch serves as a controller, enabling networked devices to talk to each other efficiently. Most of the network switches facilitate a web interface for switch configuration, which includes options such as IP-based security filtering, SNMP communities, and AAA (authentication, authorization, and accounting) protocols. Using the console configuration interface of this device, an adversary can inject malicious JavaScript into the switch name, which is known as the console XCS attack. Later, the web interface is viewed by an admin, and the malicious script can be executed in the admin’s browser.
Most printers have a web interface in which a client user could remotely sight the printer status, configure it, or reboot it. Modern web-based printers have several advanced features, which include support for administration and multiple network protocols.
Bojinov et al. [8] identified an RXCS attack risk on a printer device. Without knowing the IP address assigned to the printer, an adversary can launch an RXCS attack. A compromised printer device allows an adversary to modify mail control settings, due to lack of request validation. Upon changing the email control settings, the adversary can command the device by sending mails to it. This attack can occur by forcing an authorized admin to view the malevolent content, and later, an adversary can act on behalf of the admin.

3.4. Log-Based XCS

When the system software is corrupted, the admin of the system requires local ingress to the console to reboot the operating system. These circumstances arise in data centers, where the admin can diagnose it. The need for real involvement is problematic in the case of service level agreement (SLA), since it increases the downtime drastically. To direct this problem, most of the vendors have designed firmware components known as lights-out management (LOM) modules, which can be externally acquired by an admin. Most of the lights-out management systems allow a web interface for the admin to achieve remote access.
Bojinov et al. [11] inspected the web interfaces of three commonly used light-out management modules:
  • Active management technology (AMT) by Intel;
  • Dell remote access controller (DRAC) by Dell;
  • Remote supervisor adapter (RSA) by IBM.
The researchers found some cross channel scripting vulnerabilities on these light-out management modules. After that, the vendors of this module took several security measures to prevent unauthorized log-in into light-out management modules. These security measures involve several forms of user authentication, the use of the secure-socket layer of defense against a range of network attacks, and substantial logging of the user’s activities. The researchers also found that this vulnerability implies using RSA and DRAC by accessing the interface of a web on the affected machine [51]. This XCS attack makes use of the log files to insert malicious scripts into the storage devices. This vulnerability has been described by the following steps:
Step 1:
An adversary aims to log into the LOM device of a supervised system. As an alternative to attempting to guess login credentials, an adversary enters a payload, which contains the malicious code as the username.
Step 2:
The logging system will capture and save these user credentials in the log file of the LOM device. The login form present in the system does not escape the malicious information and communicates with the log file to mitigate web-based attacks.
Step 3:
A malevolent code is accomplished by an admin browser of a LOM system when he/she views or interprets the log file. The malevolent code could be explored to append the rogue into the LOM. Accordingly, access is granted to an adversary.

3.5. Attack on Peer-to-Peer Channel

The network-attached storage (NAS) server allows the web clients to download BitTorrent information via the embedded device. This device is configured by the web-based interface. A BitTorrent file contains file information with a hash to track URLs. This helps an attacker to find peer entities. Many cross channel scripting attack vectors were found in BitTorrent clients [7], but an interesting fact is that an XCS attack vector results from a peer-to-to-peer (P2P) channel. Here, an attacker crafts torrent data that behave as malevolent content. When the web client tries to obtain torrent information from the browser, the web-based interface notifies the record indices and allows the client browser to exploit malevolent payloads present in the file. More details of the attack on the P2P channel are illustrated in Figure 4, which shows the complete overview of a P2P attack.
In the peer-to-peer (P2P) attack context, the web clients are not aware of the fact that BitTorrent has a malevolent content before BitTorrent is fetched. The P2P attack starts as soon as BitTorrent is fetched.

3.6. XCS Attacks on Smartphones and Online Social Networks

Mobile devices enable the download of different application services through third-party vendors such as commercial websites and Google Play store. The source applications that are downloaded from third parties are problematic. Therefore, mobile devices are continuously at risk of installing malevolent applications, which gain authorization of the devices or steal sensitive data such as browser cookies, passwords, and credit/debit card numbers. Location-based attacks, Bluetooth attacks, SMS-based attacks, Spyware, and Grayware are possible attacks in mobile devices [44].
Mobile operating systems such as Android and WebOS uses JavaScript code to develop the application services. This script code is more prone to cross-site scripting vulnerabilities. Recently, Gupta et al. [52] verified a few Smartphones that were developed using JavaScript and demonstrated that cross-site scripting attacks are still possible in smartphones. Furthermore, a recent report described Palm Pre, which leads to a cross channel scripting vector that inserts it as malicious code via content [1].
Online social networks (OSN) are continuously suffering from the impact of XCS attacks [52]. Recently, famous social networks such as Twitter, Facebook, and Google have become victims to cross channel scripting attacks. Furthermore, cross channel scripting attack vectors were seized in the UK parliament site, Yahoo website, PayPal, Hotmail, Justin.tv, Orkut website, and many more [53].

4. Reverse Cross Channel Scripting (RXCS)

In this section, RXCS attacks on various social networks such as Facebook and Twitter are discussed, which use the web interface to launch a series of problems on a web channel. The main goal of this attack is the unauthorized transfer of users’ confidential information that should not be shared, since it has been guarded with an access control technique [7]. Indeed, popular websites such as Facebook, Google, Twitter, and e-bay provide a web-based API to third-party applications, which leads to cross channel scripting attack opportunities. The application developer assumes that the cloud service provides safe and secure data for third-party applications. However, every cloud provider has its sanitization mechanism, which is generally not explicitly documented. The unpredictability between supplied information and expected information can result in reverse XCS [7].

4.1. RXCS Attacks on Facebook

In Facebook, the information furnished to third-party applications is not sanitized, that is, Facebook sanitizes the information at display time. The terms of service and conditions of Facebook say that third-party vendor applications are not meant to output the information fetched from the application programming interface directly. Correspondingly, web applications are not meant to keep the user information. Although some applications will store or display the information, Facebook can monitor interface usage details to intercept the terms of service violation [54].
Suppose we have the application to display the statistics of Facebook users, such as favorite page, games, videos, or movies; then it is enough to inject a malicious code in the favorite page and it will eventually be spammed to all users of Facebook that view the application.
In detail, a crafted attack vector would be injected into a viral page of Facebook. The Facebook users who click on this malicious link reflect the same code and then the user’s browser is under attack [55]. This compromised web page can be used for phishing attacks and malware spreading.

4.2. RXCS Attacks on Twitter

In Twitter, data sanitation is completed at the input, so all information given to third-party vendor applications is sanitized by an HTML escaping mechanism. The filtering policy used in Twitter is the opposite of the Facebook sanitation policy. Bojinov et al. [7] described that if an application needs to manage raw content, then it should use sanitized information. Suppose an application wants to output information; it should be re-escape information. This re-escape, un-escape process, is error-prone and tedious, which leads to RXCS attacks. In the XCS attack vector, mousing over the malicious link results in a pop-up, which displays the logged-in user’s cookies. The adversary later incorporates a reverse cross channel scripting component that forces Twitter users to retweet a piece of code [8].

5. Tools Used

This section lists various tools that are used in embedded devices to detect vulnerabilities. The audit of each embedded device was carried out in three phases by researchers at Stanford. First, they performed a general analysis using the open-source tool known as NMap (network mapper), which has a free utility for auditing and network discovery [56]. Furthermore, the Nessus scanner provides the Nessus attack scripting language (NASL). This is a simple language used to demonstrate individual threats and potential attacks. Next, they checked the capabilities of the web-based management interfaces using Mozilla Firefox and its extensions, such as edit cookies, Firebug, and tamper data. Furthermore, the researchers came up with a custom tool for cross-site request forgery inspection. In the final step, the Stanford researchers Bojinov et al. tested for cross channel scripting attacks using command-line tools and handwritten scripts such as smbclient [45,57]. Table 2 lists the type of vulnerability found for each embedded device. Furthermore, the possible XCS attack vectors that can be injected into the vulnerable web applications and their patterns are listed in Table 3.

6. Detection of Cross Channel Scripting Attacks

Several methods for detecting and mitigating vulnerabilities are presented in this section. These methods are content sanitization, black-box scanner tools, and various detection and mitigation approaches.

6.1. Content Sanitization

This is a method of securing secret information in a non-production database. The purpose of a XCS defense system is to assure that all data supplied to the client browser are appropriately sanitized. Static analyzers will perform flow analysis to uncover probable XCS issues. All website interfaces, particularly permanent storage systems, should be tracked using this method. When infected material is displayed on the website without being sanitized, this triggers the alarm [3].

6.2. Black Box Scanner Tools

Black box scanners imitate adversary attacks, giving efficient means for detecting a variety of XCS flaws. The Web Application Vulnerability Scanner and AppScan are two examples of scanners. In order to obtain a code, the scanner attempts to traverse all different possibilities in web apps. To begin a scanning activity with this scanner, the client must first input the online site URL and login credentials. The client must then select the detection technique for analyzing the profile before starting the scan.
The scanning cycle, which includes the three major components crawling, attack, and analysis, is a tool that scans the output of web apps to see if a threat has been recognized or not. The majority of scanners employ an automation technique that aims to create a graph that reflects the entire web-page navigation system. The construction of a graph is highly dynamic, and it is used to detect various weaknesses. This automated approach proposed by Akrout et al. [32] for vulnerabilities’ identification using black-box scanners is shown in Figure 5.
Table 3 lists the eight scanners, along with their manufacture version, scanning profiles utilized, and the type of bug discovered. Header injection, XPath injection, cross-frame scripting, path traversal, malicious file upload, open redirects, and SMTP injection were all discovered as XCS flaws in the scanning testbed.

6.3. Detection Approaches for XCS on the Client Side

Kirada et al. [47,58] presented Noxes, a web firewall, as an innovative method for mitigating XCS online applications. Noxes is unique in that it is the first consumer solution to enable cross-site scripting prevention. This approach enables the detection module, which reduces the number of alert notifications and successfully alleviates security weaknesses in which an attacker targets sensitive information, such as session identifiers and passwords.

6.4. S2XS2: Server Side Approach to Mitigate Web-Based Threats

With boundary injection, Shahriar et al. [59] established an automated system to uncover XCS flaws in servers. They also developed trustworthy aspects for data that correlated with response generation to detect attacks, as well as a platform utility to implant the barrier and produce a guideline for JSP applications dynamically.

6.5. XCS-SAFE: Mitigation of XCS Attacks

Sarmah et al. [60] presented the XCS-SAFE framework, which is a server-side technique for mitigating cross channel scripting threats from malevolent known vulnerabilities. This approach is based on the concept of incorporating scripts and sanitization capabilities into the program to prevent malicious attack vectors.

6.6. Web-Application Proxy

Wurzinger et al. [35] described the secure web application proxy, a method for mitigating cross channel scripting vulnerabilities. In this approach, The proxy acts as a firewall among apps and the Internet. If no scripting components are identified, this decodes all scripting variables, recovers all legitimate patterns, and sends an HTML response to the client. If the script element detects harmful vectors, instead of sending a response, this strategy can raise an alarm of a cross channel scripting assault. As a result, utilizing a reverse proxy, these techniques efficiently prevent XCS threats [49].

7. Detection and Mitigation of Cross Channel Scripting Attacks

In this section, first, mitigation of cross channel scripting attacks is presented. Thereafter, the use of fingerprints to prevent XCS attacks is discussed. Lastly, the use of a site firewall is discussed to protect the web applications from attacks.

7.1. Mitigation of Cross Channel Scripting Attacks

Various stages such as web infection, injection, and payload execution were suggested in [7] to mitigate the XCS attacks.
  • Website infection: Embedded smart devices or XCS exploits are used to implant harmful content into a web application. A general populace website, an administrative site, or an embedded gadget can all be attacked with malware.
  • Browsing malware content: The following step is to wait for a client to browse a hostile or compromised website. The client could then be restricted from visiting the infested site or viewing an inappropriate payload via a number of methods, including prohibiting particular types of content from being executed and keeping a collection of potentially dangerous websites, similar to the no-script browser plugin.
  • Ghost injection: A ghost script injection in an XCS attack can take the following forms: A submission form with an element that would accommodate HTML, an invalid login, and a file renaming. All input/output data that that server will manage can be stolen by the embedded device for the server vendor. As a result, securing this may be tough.
  • Payload execution: In the last stage of the XCS exploit, the adversary payload is executed in the context of admin access. When an administrator reads the compromised site, a dangerous code contained in it is mistakenly executed. As a result, settings are reconfigured for the creation adviser’s accounts, data are ex-filtrated from the interface to an opponent server, and some other hosts on the web are attacked.

7.2. Fingerprints for XCS Detection

Fingerprints are identities that show the components in the scripts as well as the context in which they are being executed by the client. An admin creates fingerprints on the host nSign [33]. Following that, the client’s browser securely obtains all of the server’s produced fingerprints. Finally, the scripting detection layer matches fingerprints sent with fingerprints acquired during surfing. The fingerprint generation using nSign is shown in Figure 6.

7.3. Site Firewall

In this subsection, we will look into Site Firewall, which is used to protect web apps from cross channel scripting attacks. Site Firewall is an XCS prevention method that focuses on the implementation stage of payloads. This method makes it harder to use the user browser to steal data from a server. A Site Firewall obtains webpage rules from online content, enabling the site to filter harmful content sent by both its web server and unauthorized Internet connections [7].
An embedded system might expressly indicate the data offered by an interface originating from the device organically and probably from the manufacturer’s site by employing a Site Firewall component in the victim’s browser. As depicted in Figure 7, the client’s browser could prevent connections to certain other sites, making it even harder to steal private data.

8. Analysis of XCS Attacks

In this section, a detailed analysis of XCS attacks is presented. Cross channel scripting is a multifaceted malicious attack vector that leads to huge client-side and social engineering attacks. This scripting mechanism can be used to steal confidential data such as session IDs, valuable data, and login credentials such as user names and passwords. For organizations, XCS has serious implications from the financial and legal points of view.
To reduce the possibility of XCS threats, the security system should encrypt all field names and block all symbols effectively at the human input. XCS attacks are caused by self-contained devices with advanced capabilities and obsolete libraries included in computer code. A defensive architecture includes security headers and session attributes that are set correctly as part of an XCS.
Well-known methodologies that were used to detect cross channel scripting and some web-based attacks are analyzed in this section. Table 2 lists XCS and RXCS vulnerabilities found in embedded devices such as IP phones, routers, and switches, which are commonly used for web-based management interfaces. Table 3 describes the capability of well-known black-box scanners with scanning web profiles to detect XCS and other dangerous web vulnerabilities. A detailed comparison of existing techniques to detect different web application vulnerability classes such as cross-site scripting (XSS), cross channel scripting (XCS), reverse cross channel scripting, cross-site request forgery (CSRF), SQL injection, and information leakage attacks is presented in Table 4.
The first column states the researchers of existing techniques and tools proposed to detect web-based attacks. The techniques proposed by Bau et al. and Mitropoulos et al. [33] are able to detect all web-based vulnerabilities except RXCS attacks. As we can see in Table 5, the methods of Kirda et al. [58], Khoury et al. [61], and Akrout et al. [32] can find only three classes of web-based attacks from vulnerable applications. Other detection techniques proposed by Bojinov et al. [8], Shaihriar and Zulkernine [62], and Gupta and Gupta [1] detect four types of web vulnerabilities.

9. Research Gaps and Future Directions

In this section, various research gaps and future directions are discussed.

9.1. Research Gaps

The existing XCS defensive approaches have the following limitations:
  • Most of the existing XCS defensive approaches are unable to provide safe input handling and encoding mechanisms at the client and server sides of the web-based application.
  • An automated process is essential to differentiate between JavaScript to the malicious script [49].
  • There is no proper defensive solution capable of detecting and preventing all XCS attacks, such as reflected, stored, and encoding attacks.
  • A secure XSS defensive algorithm needs to possess the list of malicious scripts and domains to decrease the rate of false positives and negatives.
  • In existing approaches, effective policy checks are not implemented to increase XCS detection speed and mitigation process [64].

9.2. Future Directions

Web applications have emerged rapidly with modern technologies and computational algorithms. There are numerous server-side cross channel scripting detection and mitigation strategies, but their defense mechanisms have not been fully practical due to their processing overhead. Additionally, several XCS defensive techniques at the client side degrade the performance of the systems, resulting in a deficient web surfing experience. Therefore, it is still an open area of research. Following are some key future research directions:
  • To detect and prevent the danger of future XCS attacks, a new security architecture should be built that encrypts all input data fields with known vulnerabilities at the client side. This method can also be used to detect malicious scripts on the server side.
  • Adaptive analyzers can be designed to evaluate the runtime flow analysis to classify XCS attacks more efficiently.
  • Generalized XCS defensive techniques can be developed at the client side to maintain the performance of systems. This can improve the web surfing experience without introducing additional overheads.
  • Input validation on the client and server sides has a limited influence on more complicated data flow sources. Some difficult-to-find vulnerabilities, on the other hand, have several execution branches and file associations. As a result, the threat analysis of various execution codes is an important research direction.
  • There should be an attempt to apply the XCS training and fingerprinting technique to other types of threats, such as SQL injection and modification assaults. However, a revolutionary approach that is closely related to deep learning can be used to detect and prevent cross channel scripting assaults, as well as more in-depth code audit, to increase performance and accuracy.

10. Conclusions

In this review paper, cross channel scripting threats attacks were discussed, which are among the most serious web application vulnerabilities. It has been determined that this is a significant problem for today’s online applications. We looked at eight different types of consumer networking devices from a variety of vendors and found that all of them had serious XCS flaws. Embedded devices with smart capabilities, as well as outdated libraries in software code, are the source of XCS. Furthermore, due to the many Internet protocols, these devices are frequently susceptible to external assaults. In addition, this article described various state-of-art mechanisms based on cross channel scripting attacks and identified research gaps. This research article provided a list of all strategies, techniques, and tools used in current online applications to identify and mitigate cross channel scripting attacks and their variants. It is concluded that the audit of each embedded device is done in three phases. Initially, a general analysis was achieved using the open-source tool known as NMap that has a free utility for auditing and network discovery. Furthermore, the Nessus scanner provided an NASL language to demonstrate individual threats and potential attacks. Various capabilities of the web-based management interfaces were evaluated using Mozilla Firefox and its extensions such as edit cookies, Firebug, and tamper data. A custom tool for cross-site request forgery inspection was also studied. XCS attacks were also evaluated using command-line tools and handwritten scripts such as smbclient. Various possible XCS attack vectors that can be injected into the vulnerable web applications and their patterns were also studied.

Author Contributions

Conceptualization, I.M.; methodology and software, M.K.; formal analysis, M.R.; investigation, S.R.; data curation, H.-N.L. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported in part by the National Research Foundation of Korea (NRF) Grant funded by the Korean government (MSIP)(NRF-2021R1A2B5B03002118) and this research was supported by the Ministry of Science and ICT (MSIT), Korea, under the ITRC (Information Technology Research Center) support program (IITP-2021-0-01835) supervised by the IITP (Institute of Information & Communications Technology Planning & Evaluation).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Acknowledgments

The authors would like to thank Bennett University for providing the resources.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Gupta, S.; Gupta, B. Cross-Site Scripting (XSS) attacks and defense mechanisms: Classification and state-of-the-art. Int. J. Syst. Assur. Eng. Manag. 2015, 8, 512–530. [Google Scholar] [CrossRef]
  2. Nagpal, B.; Chauhan, N.; Singh, N. SECSIX: Security engine for CSRF, SQL injection and XSS attacks. Int. J. Syst. Assur. Eng. Manag. 2017, 8, 631–644. [Google Scholar] [CrossRef]
  3. Rodríguez, G.E.; Torres, J.G.; Flores, P.; Benavides, D.E. Cross-site scripting (XSS) attacks and mitigation: A survey. Comput. Netw. 2020, 166, 106960. [Google Scholar] [CrossRef]
  4. Nunes, P.; Medeiros, I.; Fonseca, J.C.; Neves, N.; Correia, M.; Vieira, M. Benchmarking static analysis tools for web security. IEEE Trans. Reliab. 2018, 67, 1159–1175. [Google Scholar] [CrossRef]
  5. Singh, D.; Biswal, A.K.; Samanta, D.; Singh, D.; Lee, H.N. Juice Jacking: Security Issues and Improvements in USB Technology. Sustainability 2022, 14, 939. [Google Scholar] [CrossRef]
  6. Mishra, B.; Agarwal, A.; Goel, A.; Ansari, A.A.; Gaur, P.; Singh, D.; Lee, H.N. Privacy Protection Framework for Android. IEEE Access 2022, 10, 7973–7988. [Google Scholar] [CrossRef]
  7. Bojinov, H.; Bursztein, E.; Boneh, D. XCS: Cross channel scripting and its impact on web applications. In Proceedings of the 16th ACM Conference on Computer and Communications Security, Chicago, IL, USA, 9–13 November 2009; ACM: New York, NY, USA, 2009; pp. 420–431. [Google Scholar]
  8. Bojinov, H.; Bursztein, E.; Lovett, E.; Boneh, D. Embedded management interfaces: Emerging massive insecurity. BlackHat USA 2009, 1, 14. [Google Scholar]
  9. Gupta, B.B.; Perez, G.M.; Agrawal, D.P.; Gupta, D. Handbook of Computer Networks and Cyber Security; Springer: Berlin/Heidelberg, Germany, 2020. [Google Scholar]
  10. Kaur, M.; Singh, D.; Kumar, V.; Gupta, B.B.; Abd El-Latif, A.A. Secure and Energy Efficient-Based E-Health Care Framework for Green Internet of Things. IEEE Trans. Green Commun. Netw. 2021, 5, 1223–1231. [Google Scholar] [CrossRef]
  11. Bojinov, H.; Bursztein, E.; Boneh, D. The emergence of cross channel scripting. Commun. ACM 2010, 53, 105–113. [Google Scholar] [CrossRef]
  12. Ali, R.; Beg, M.S. Applications of Soft Computing for the Web; Springer: Berlin/Heidelberg, Germany, 2017. [Google Scholar]
  13. Varadharajan, V.; Bansal, S. Data security and privacy in the internet of things (iot) environment. In Connectivity Frameworks for Smart Devices; Springer: Berlin/Heidelberg, Germany, 2016; pp. 261–281. [Google Scholar]
  14. Lai, J.Y.; Wu, J.S.; Chen, S.J.; Wu, C.H.; Yang, C.H. Designing a taxonomy of web attacks. In Proceedings of the 2008 International Conference on Convergence and Hybrid Information Technology, Daejeon, Korea, 28–30 August 2008; IEEE: New York, NY, USA, 2008; pp. 278–282. [Google Scholar]
  15. Gupta, S.; Gupta, B.; Chaudhary, P. Hunting for DOM-Based XSS vulnerabilities in mobile cloud-based online social network. Future Gener. Comput. Syst. 2018, 79, 319–336. [Google Scholar] [CrossRef]
  16. Marashdih, A.W.; Zaaba, Z.F. Cross Site Scripting: Removing Approaches in Web Application. Procedia Comput. Sci. 2017, 124, 647–655. [Google Scholar] [CrossRef]
  17. Ayeni, B.K.; Sahalu, J.B.; Adeyanju, K.R. Detecting Cross-Site Scripting in Web Applications Using Fuzzy Inference System. J. Comput. Netw. Commun. 2018, 2018, 8159548. [Google Scholar] [CrossRef]
  18. Pan, Y.; Sun, F.; Teng, Z.; White, J.; Schmidt, D.C.; Staples, J.; Krause, L. Detecting web attacks with end-to-end deep learning. J. Internet Serv. Appl. 2019, 10, 1–22. [Google Scholar] [CrossRef] [Green Version]
  19. Chaudhary, P.; Gupta, B.B.; Gupta, S. A Framework for Preserving the Privacy of Online Users Against XSS Worms on Online Social Network. Int. J. Inf. Technol. Web Eng. (IJITWE) 2019, 14, 85–111. [Google Scholar] [CrossRef]
  20. Madhusudhan, R. Cross Channel Scripting (XCS) Attacks in Web Applications: Detection and Mitigation Approaches. In Proceedings of the 2018 2nd Cyber Security in Networking Conference (CSNet), Paris, France, 24–26 October 2018; IEEE: New York, NY, USA, 2018; pp. 1–3. [Google Scholar]
  21. Madhusudhan, R. Mitigation of Cross-Site Scripting Attacks in Mobile Cloud Environments. International Symposium on Security in Computing and Communication; Springer: Berlin/Heidelberg, Germany, 2018; pp. 76–87. [Google Scholar]
  22. Alam, M.T.; Rasheed, K. Predicting Web Vulnerabilities in Web Applications Based on Machine Learning. In Proceedings of the Intelligent Technologies and Applications: First International Conference, INTAP 2018, Bahawalpur, Pakistan, 23–25 October 2018; Revised Selected Papers. Springer: Berlin/Heidelberg, Germany, 2019; p. 473. [Google Scholar]
  23. Babiker, M.; Karaarslan, E.; Hoscan, Y. Web application attack detection and forensics: A survey. In Proceedings of the 2018 6th International Symposium on Digital Forensic and Security (ISDFS), Antalya, Turkey, 22–25 March 2018; IEEE: New York, NY, USA, 2018; pp. 1–6. [Google Scholar]
  24. Kumar, A.; Gupta, A.; Mittal, P.; Gupta, P.K.; Varghese, S. Prevention of XSS attack using Cryptography & API integration with Web Security. Sanya, Prevention of XSS attack using Cryptography & API integration with Web Security. In Proceedings of the International Conference on Innovative Computing & Communication (ICICC) 2021, New Delhi, India, 25 April 2021. [Google Scholar]
  25. Kalim, A.; Jha, C.K.; Tomar, D.S.; Sahu, D.R. Novel Detection Technique For Framejacking Vulnerabilities In Web Applications. In Proceedings of the 2021 2nd International Conference on Computation, Automation and Knowledge Management (ICCAKM), Dubai, United Arab Emirates, 19–21 January 2021; pp. 265–270. [Google Scholar] [CrossRef]
  26. Falana, O.J.; Ebo, I.O.; Tinubu, C.O.; Adejimi, O.A.; Ntuk, A. Detection of Cross-Site Scripting Attacks using Dynamic Analysis and Fuzzy Inference System. In Proceedings of the 2020 International Conference in Mathematics, Computer Engineering and Computer Science (ICMCECS), Ayobo, Nigeria, 18–21 March 2020; pp. 1–6. [Google Scholar] [CrossRef]
  27. Gui, J.; Chen, Z.; Yu, X.; Lumezanu, C.; Chen, H. Anomaly Detection on Web-User Behaviors Through Deep Learning. In Proceedings of the International Conference on Security and Privacy in Communication Systems, Washington, WA, USA, 21–23 October; Springer: Berlin/Heidelberg, Germany, 2020; pp. 467–473. [Google Scholar]
  28. Shashidhara, R.; Madhusudhan, R. Identifying and Mitigating Against XSS Attacks in Web Applications. In Cloud Security; CRC Press: Boca Raton, FL, USA, 2021; pp. 175–187. [Google Scholar]
  29. Shashidhara, R.; Kantharaj, V.; Bhavya, K.; Lingareddy, S. Cross Channel Scripting Attacks (XCS) in Web Applications. In International Conference on Innovative Computing and Communications; Springer: Berlin/Heidelberg, Germany, 2022; pp. 387–397. [Google Scholar]
  30. Atat, R.; Liu, L.; Chen, H.; Wu, J.; Li, H.; Yi, Y. Enabling cyber-physical communication in 5G cellular networks: Challenges, spatial spectrum sensing, and cyber-security. IET Cyber-Phys. Syst. Theory Appl. 2017, 2, 49–54. [Google Scholar] [CrossRef]
  31. Wu, J.; Guo, S.; Huang, H.; Liu, W.; Xiang, Y. Information and communications technologies for sustainable development goals: State-of-the-art, needs and perspectives. IEEE Commun. Surv. Tutorials 2018, 20, 2389–2406. [Google Scholar] [CrossRef] [Green Version]
  32. Akrout, R.; Alata, E.; Kaaniche, M.; Nicomette, V. An automated black box approach for web vulnerability identification and attack scenario generation. J. Braz. Comput. Soc. 2014, 20, 1. [Google Scholar] [CrossRef] [Green Version]
  33. Mitropoulos, D.; Stroggylos, K.; Spinellis, D.; Keromytis, A.D. How to Train Your Browser: Preventing XSS Attacks Using Contextual Script Fingerprints. ACM Trans. Priv. Secur. (TOPS) 2016, 19, 2. [Google Scholar] [CrossRef]
  34. Ranganathan, C.; Ganapathy, S. Key dimensions of business-to-consumer web sites. Inf. Manag. 2002, 39, 457–465. [Google Scholar] [CrossRef]
  35. Wurzinger, P.; Platzer, C.; Ludl, C.; Kirda, E.; Kruegel, C. SWAP: Mitigating XSS attacks using a reverse proxy. In Proceedings of the 2009 ICSE Workshop on Software Engineering for Secure Systems, Washington, DC, USA, 19–21 January 2021; IEEE Computer Society: New York, NY, USA, 2009; pp. 33–39. [Google Scholar]
  36. Fonseca, J.; Vieira, M.; Madeira, H. Evaluation of web security mechanisms using vulnerability & attack injection. IEEE Trans. Dependable Secur. Comput. 2013, 11, 440–453. [Google Scholar]
  37. Fonseca, J.; Seixas, N.; Vieira, M.; Madeira, H. Analysis of field data on web security vulnerabilities. IEEE Trans. Dependable Secur. Comput. 2013, 11, 89–100. [Google Scholar] [CrossRef]
  38. Razzaq, A.; Latif, K.; Ahmad, H.F.; Hur, A.; Anwar, Z.; Bloodsworth, P.C. Semantic security against web application attacks. Inf. Sci. 2014, 254, 19–38. [Google Scholar] [CrossRef]
  39. Huang, C.; Liu, J.; Fang, Y.; Zuo, Z. A study on Web security incidents in China by analyzing vulnerability disclosure platforms. Comput. Secur. 2016, 58, 47–62. [Google Scholar] [CrossRef]
  40. Durai, K.N.; Subha, R.; Haldorai, A. A Novel Method to Detect and Prevent SQLIA Using Ontology to Cloud Web Security. Wirel. Pers. Commun. 2021, 117, 2995–3014. [Google Scholar] [CrossRef]
  41. Tekerek, A. A novel architecture for web-based attack detection using convolutional neural network. Comput. Secur. 2021, 100, 102096. [Google Scholar] [CrossRef]
  42. Lakshmi, L.; Reddy, M.P.; Santhaiah, C.; Reddy, U.J. Smart Phishing Detection in Web Pages using Supervised Deep Learning Classification and Optimization Technique ADAM. Wirel. Pers. Commun. 2021, 118, 3549–3564. [Google Scholar] [CrossRef]
  43. Chaudhary, P.; Gupta, B.B.; Chang, X.; Nedjah, N.; Chui, K.T. Enhancing big data security through integrating XSS scanner into fog nodes for SMEs gain. Technol. Forecast. Soc. Chang. 2021, 168, 120754. [Google Scholar] [CrossRef]
  44. Aliero, M.S.; Ghani, I.; Qureshi, K.N.; Rohani, M.F. An algorithm for detecting SQL injection vulnerability using black-box testing. J. Ambient. Intell. Humaniz. Comput. 2020, 11, 249–266. [Google Scholar] [CrossRef]
  45. Mishra, S.; Sharma, S.K.; Alowaidi, M.A. Analysis of security issues of cloud-based web applications. J. Ambient. Intell. Humaniz. Comput. 2021, 12, 7051–7062. [Google Scholar] [CrossRef]
  46. Zhang, X.; Zhou, Y.; Pei, S.; Zhuge, J.; Chen, J. Adversarial examples detection for XSS attacks based on generative adversarial networks. IEEE Access 2020, 8, 10989–10996. [Google Scholar] [CrossRef]
  47. Liu, M.; Zhang, B.; Chen, W.; Zhang, X. A survey of exploitation and detection methods of XSS vulnerabilities. IEEE Access 2019, 7, 182004–182016. [Google Scholar] [CrossRef]
  48. Praseed, A.; Thilagam, P.S. DDoS attacks at the application layer: Challenges and research perspectives for safeguarding web applications. IEEE Commun. Surv. Tutor. 2018, 21, 661–685. [Google Scholar] [CrossRef]
  49. Hydara, I.; Sultan, A.B.M.; Zulzalil, H.; Admodisastro, N. Current state of research on cross-site scripting (XSS)–A systematic literature review. Inf. Softw. Technol. 2015, 58, 170–186. [Google Scholar] [CrossRef]
  50. Parwani, D.; Dutta, A.; Shukla, P.; Tahiliyani, M. Various techniques of DDoS attacks detection & prevention at cloud: A survey. Orient. J. Comput. Sci. Technol. 2015, 8, 110–120. [Google Scholar]
  51. Wu, T.Y.; Chen, C.M.; Sun, X.; Liu, S.; Lin, J.C.W. A countermeasure to SQL injection attack for cloud environment. Wirel. Pers. Commun. 2017, 96, 5279–5293. [Google Scholar] [CrossRef]
  52. Gupta, S.; Gupta, B.B. XSS-secure as a service for the platforms of online social network-based multimedia web applications in cloud. Multimed. Tools Appl. 2018, 77, 4829–4861. [Google Scholar] [CrossRef]
  53. Chaudhary, P.; Gupta, B. A novel framework to alleviate dissemination of XSS worms in online social network (OSN) using view segregation. Neural Netw. World 2017, 27, 5. [Google Scholar] [CrossRef]
  54. Zhou, Y.; Wang, P. An ensemble learning approach for XSS attack detection with domain knowledge and threat intelligence. Comput. Secur. 2019, 82, 261–269. [Google Scholar] [CrossRef]
  55. Mokbal, F.M.M.; Dan, W.; Imran, A.; Jiuchuan, L.; Akhtar, F.; Xiaoxi, W. MLPXSS: An integrated XSS-based attack detection scheme in web applications using multilayer perceptron technique. IEEE Access 2019, 7, 100567–100580. [Google Scholar] [CrossRef]
  56. Shuaibu, B.M.; Norwawi, N.M.; Selamat, M.H.; Al-Alwani, A. Systematic review of web application security development model. Artif. Intell. Rev. 2015, 43, 259–276. [Google Scholar] [CrossRef]
  57. Tariq, I.; Sindhu, M.A.; Abbasi, R.A.; Khattak, A.S.; Maqbool, O.; Siddiqui, G.F. Resolving cross-site scripting attacks through genetic algorithm and reinforcement learning. Expert Syst. Appl. 2021, 168, 114386. [Google Scholar] [CrossRef]
  58. Kirda, E.; Kruegel, C.; Vigna, G.; Jovanovic, N. Noxes: A client-side solution for mitigating cross-site scripting attacks. In Proceedings of the 2006 ACM Symposium on Applied Computing, New York, NY, USA, 23–27 April 2006; ACM: New York, NY, USA, 2006; pp. 330–337. [Google Scholar]
  59. Shahriar, H.; Zulkernine, M. S2XS2: A server side approach to automatically detect XSS attacks. Dependable, Autonomic and Secure Computing (DASC). In Proceedings of the 2011 IEEE Ninth International Conference, Sydney, NSW, Australia, 12–14 December 2011; IEEE: New York, NY, USA, 2011; pp. 7–14. [Google Scholar]
  60. Sarmah, U.; Bhattacharyya, D.; Kalita, J.K. A survey of detection methods for XSS attacks. J. Netw. Comput. Appl. 2018, 118, 113–143. [Google Scholar] [CrossRef]
  61. Khoury, N.; Zavarsky, P.; Lindskog, D.; Ruhl, R. An analysis of black-box web application security scanners against stored SQL injection. Privacy, Security, Risk and Trust (PASSAT) and 2011 IEEE Third Inernational Conference on Social Computing (SocialCom). In Proceedings of the 2011 IEEE Third International Conference, Boston, MA, USA, 9–11 October 2011; IEEE: New York, NY, USA, 2011; pp. 1095–1101. [Google Scholar]
  62. Shahriar, H.; Zulkernine, M. Injecting comments to detect JavaScript code injection attacks. Computer Software and Applications Conference Workshops (COMPSACW). In Proceedings of the 2011 IEEE 35th Annual, Munich, Germany, 19–21 January 2021; IEEE: New York, NY, USA, 2011; pp. 104–109. [Google Scholar]
  63. Kamel, N.; Lanet, J.L. Risks induced by Web applications on smart cards. J. Inf. Secur. Appl. 2013, 18, 148–156. [Google Scholar] [CrossRef]
  64. Mitropoulos, D.; Louridas, P.; Polychronakis, M.; Keromytis, A.D. Defending Against Web Application Attacks: Approaches, Challenges and Implications. IEEE Trans. Dependable Secur. Comput. 2017, 16, 188–203. [Google Scholar] [CrossRef]
Figure 1. XCS payload execution and attack types.
Figure 1. XCS payload execution and attack types.
Sensors 22 01959 g001
Figure 2. XCS threat model.
Figure 2. XCS threat model.
Sensors 22 01959 g002
Figure 3. Embedded devices used in web-based management interfaces.
Figure 3. Embedded devices used in web-based management interfaces.
Sensors 22 01959 g003
Figure 4. Overview of a P2P XCS attack.
Figure 4. Overview of a P2P XCS attack.
Sensors 22 01959 g004
Figure 5. Vulnerabilities’ identification using black-box scanners.
Figure 5. Vulnerabilities’ identification using black-box scanners.
Sensors 22 01959 g005
Figure 6. XCS attack prevention using contextual fingerprints.
Figure 6. XCS attack prevention using contextual fingerprints.
Sensors 22 01959 g006
Figure 7. Browser and device interaction with Site Firewall.
Figure 7. Browser and device interaction with Site Firewall.
Sensors 22 01959 g007
Table 1. Comparison of XCS detection and prevention techniques.
Table 1. Comparison of XCS detection and prevention techniques.
Detection and Prevention
Techniques
Strengths

Weaknesses

Black Box Scanners [32]Imitates external attacks from attackers and furnishes cost-effective mechanisms that configure web application firewallsCannot be forwarded to specific modules, leads to complex systems
SiteFirewall [7]Can effectively mitigates XCS attacksUnable to prevent content loading from external resources
Server-Side Detection [19]Can detect XCS attacks by estimating the variation between an HTTP request and its response messageNeeds an additional training phase for gathering a larger number of scripts
Contextual Fingerprints [33]Efficient script detection and unaffected web user experienceIf a generated fingerprint is altered maliciously, then new fingerprint generation is necessary
Server approach to detect XCS attacks [34]Boundary insertion to enclose data generated and policy generation to verify attacker inserted contentRequires additional time for policy check and consequently degrades XCS detection probability
SWAP [35]Has the ability to detect variations between benign and injected malicious codesUnable to detect many web attacks
Vulnerability and Attack Injector Tool (VAIT) [36]IDS for SQL attacksUnable to detect XCS attacks
Attack Vector Injection [37]Prevents XSS and SQL attacksUnable to prevent RXCS and XCS attacks
Ontological Prototype [38]Capable of detecting sophisticated attacksMore false positives
Machine Learning Model [39]Acts as a filter and has the ability to efficiently mitigate web attacksSignature-based model
Web Classifiers [3]Uses AI techniques to mitigate web attacksUnable to protect against RXCS attacks
Ontology-Based Model [40]Detects SQLIA web vulnerability efficientlyUnable to mitigate DOM-based XSS attacks
XSS Attack Vectors Approach [28]XSS attack vectors with a secure XSS layer to mitigate XSS and XCS attacksUnable to prevent server-side attacks
Convolution Neural Network (CNN) [41]Efficiently detects web attacks using anomaly-based detection typeUnable to protect reflected XSS attacks
Listwise Approach [42]Efficiently detects phishing websitesUnable to protect against injection attacks
Convolution Neural Network (CNN) Method [43]Prevents privacy breaches of usersUnable to protect against SQL injection attacks
Black Box Testing [44]Capable of analyzing attacked page responsesUnable to protect against CSRF attacks
Identifying Cloud-Based Web Applications [45]Detects several cloud-based vulnerabilitiesPersonal and private data commitments increase the risk to data confidentiality
MCTS-T Algorithm [46]A generative adversarial network (GAN) was used to optimize a detector with improved detection rateUnable to predict adversarial attacks on the server side
Static and dynamic analysis [47]Efficiently detects stored, reflected, DOM-based, and phishing attacksThe authors fail to investigate the approaches to mitigate XCS, SQL injection, RXCS, and CSRF attacks.
DDoS Mitigation Approach [48]Detects and prevents DDoS and flooding attacks on web applicationsInjection and modification attacks are still possible on web applications. Fails to provide defensive mechanism for XSS attacks.
Table 2. Device vulnerability list.
Table 2. Device vulnerability list.
ManufacturerDeviceTypeXCSRXCS
LinksysSPA-942IP Phone×
DellDRACLights-Out Management×
IBMRSA2Lights-Out Management×
BuffaloLinkstationNetwork Attached Storage×
LacieEthernet DiskNetwork Attached Storage×
LinksysNMH-305Network Attached Storage×
QNAPTS-109Network Attached Storage×
SamsungSPF-85vPhoto Frame×
HPHP 4250Printer×
HPHP 9000Printer×
LinksysWRT54G2Router×
Allied TelesyncAT-FS750Switch×
Table 3. XCS attack vectors.
Table 3. XCS attack vectors.
Attack VectorXCS Pattern
< B O D Y = " j a v a s c r i p t : a l e r t ( X C S ) " >
< I M G S R C = " j a v a s c r i p t : a l e r t ( X C S ) ; " >
HTML malicious attributes < I M G S R C = j s : a l e r t ( S t r i n g . C h a r C o d e ( 87 , 67 , 57 ) ) >
< I M G S R C = / o n e r r o r = " a l e r t ( S t r i n g . f r o m C h a r C o d e ( 87 , 67 , 57 ) ) " > < / i m g >
Mutated XCS”/> , < / S c R i P t > a l e r t ( 111 ) < t i t l e > < s c r i p t > a l e r t ( 111 )
< / s c r i p t > < / S C R I P T > a l e r t ( 111 )
onError < i m g s r c = x c s . p n g o n e r r o r = a l e r t ( A t t a c k ! ) >
< S C R I P T S R C = h t t p : / / h a c k e r s / x c s . j s < / S C R I P T >
External source script vectors < S C R I P T / X C S S R C = " h t t p : / / h a . c k e r s . o r g / x c s . j s " > < / S C R I P T >
< S C R I P T = f t p : / / h a c k e r / x c s . j s ? < B >
< a o n m o u s e o v e r = " a l e r t ( d o c u m e n t . c o o k i e ) " > x c s < / a >
Event triggered scripts < I M G S R C = # = " a l e r t ( x c s ) " >
Explicate Attack vectors < B R S I Z E = " & a l e r t ( X C S ) " >
< B A S E H R E F = " j a v a s c r i p t : a l e r t ( X C S ) ; / / " >
onClick < a h r e f = o n c l i c k = " w i n d o w . l o c a t i o n A t t a c k e r S i t e / W e l c o m e . j s p ? i n p u t ; " >
C l i c k h e r e f o r t h e i P h o n e < / a >
Table 4. Report of scanners with merits and demerits.
Table 4. Report of scanners with merits and demerits.
ScannersVendorsVersionScanningVulnerabilityDetectedMeritsDemerits
AppScanIBM7.5All ChecksStored XSSScans open source software with accuracyDetects only XSS vectors
WVSAcunetix8.0Stored XSSFile InclusionBetter integrationScanning become slow on large websites
WebInspectHP7.5All checksSQL InjectionEasy to useInstallation is a bit tricky
HailStorm ProCenzic9.0PCI InfrastructureXCS, JavaScriptEasily scans and shares reportsNo cloud-based platform
SECUREMcAfee4.0Denial-of-ServiceXSS and XCSWhile the computer is booting, it does not slow it downNot efficient
QualysGuard PCIQualys5.0PCIXCSAble to complete outer scans with confidenceFewer false positives
NeXposeRapid78.0All ChecksSQL InjectionOptimizes the testing cyclesRisk
File Inclusion
QA EditionN-Stalker5.8PCI InfrastructureXCS and SQL attackQueries against inventory are easyThe database can be fragile
Table 5. Comparison of existing techniques to detect web application vulnerabilities.
Table 5. Comparison of existing techniques to detect web application vulnerabilities.
Ref.YearXSSXCSRXCSCSRFSQL InjectionInfo Leakage
[58]2006××××
[8]2009××
[20]2018××
[28]2021×
[62]2011××
[61]2011×××
[63]2013×××
[32]2014×××
[1]2015××
[33]2016×
[15]2017×××
[16]2017×××
[19]2018×
[17]2018××
[21]2019×
[52]2019××
[28]2020×××
[44]2021××××
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

M, I.; Kaur, M.; Raj, M.; R, S.; Lee, H.-N. Cross Channel Scripting and Code Injection Attacks on Web and Cloud-Based Applications: A Comprehensive Review. Sensors 2022, 22, 1959. https://doi.org/10.3390/s22051959

AMA Style

M I, Kaur M, Raj M, R S, Lee H-N. Cross Channel Scripting and Code Injection Attacks on Web and Cloud-Based Applications: A Comprehensive Review. Sensors. 2022; 22(5):1959. https://doi.org/10.3390/s22051959

Chicago/Turabian Style

M, Indushree, Manjit Kaur, Manish Raj, Shashidhara R, and Heung-No Lee. 2022. "Cross Channel Scripting and Code Injection Attacks on Web and Cloud-Based Applications: A Comprehensive Review" Sensors 22, no. 5: 1959. https://doi.org/10.3390/s22051959

APA Style

M, I., Kaur, M., Raj, M., R, S., & Lee, H. -N. (2022). Cross Channel Scripting and Code Injection Attacks on Web and Cloud-Based Applications: A Comprehensive Review. Sensors, 22(5), 1959. https://doi.org/10.3390/s22051959

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop