Recently, Google revealed about the vulnerabilities derived from side-channels built into the web platform. Read on to know more…
Google has implemented new security measures across several key services after it was revealed that user information could be leaked through browser side-channel attacks. Security researcher @terjanq recently disclosed that personal data across multiple products owned by the Mountain View tech giant were susceptible to cache probing attacks — a way of exploiting a cross-site leak (XS-Leak) vulnerability.
A recent article from Google revealed that attackers are increasingly leveraging a specific class of vulnerabilities derived from side-channels built into the web platform, to extract sensitive data out of any web application. Dubbed cross-site leaks (XS-Leaks), this new class of vulnerability highlights new challenges for the security of web infrastructure.
Risk Factors
An XS-Leak takes advantage of a browser side-channel in order to exploit websites that are normally protected from cross-site scripting (XSS). The result, in some situations, can have the same impact as an XSS vulnerability.
At-risk information included a user’s search history, private emails, tokens and credit card numbers, contacts, books read, and generally most data that’s fed into Google-owned websites. Services affected included Gmail, Google Search, Google Search, Google Bookmarks, My Activity, and YouTube, among others.
Side-Channel Attacks
Attackers use the existing side-channels on the web to leak sensitive information about the users from other web applications, such as details about their local environment or their internal networks.
Lately, a team of security researchers had discovered new side-channel attacks dubbed PLATYPUS attacks that could allow attackers to access the sensitive data on Intel CPUs. Researchers from the University of California and Tsinghua University also reported a series of critical vulnerabilities dubbed Side-channel AttackeD DNS or SAD DNS attacks that could lead to a revival of DNS cache poisoning attacks.
Google’s XS Support
To encourage research into the issue of cross-site leaks of user information, Google has recently set up a new site for XS-Leaks. It is basically a collection of browser-based side-channel attack vectors.
These attack vectors highlight a set of challenges for web browser developers and security engineers, enabling the development of a comprehensive defense mechanism. The XS-Leaks wiki site basically includes information about the principles behind cross-site leaks, common attacks, and proposes defense mechanisms to stop these attacks.
Additional Info
The site is an open knowledge base to which the security community is invited to participate, and where experts can share information about offensive and defensive techniques.
XS-Leaks takes advantage of the web’s core principle of composability. It allows websites to interact with each other and abuse legitimate mechanisms to infer information about the user. Each attack described on the site is accompanied by an overview of security features such as Cross-Origin Opener Policy, Cross-Origin Resource Policy, Fetch Metadata Request Headers, and SameSite cookies that can thwart or mitigate it.
Conclusion
Recent discoveries suggest that side-channel attacks are still in the development phase and their true potential in XS-Leak attacks is yet to be realized. It is believed that projects such as the XS-Leak wiki can help prevent or mitigate these attacks by providing appropriate frameworks and guidelines for security teams to counter such cyber threats.