[Webkit-unassigned] [Bug 192628] New: Service Worker <script> interception allows exploiting unexploitable XSSI

bugzilla-daemon at webkit.org bugzilla-daemon at webkit.org
Wed Dec 12 08:52:40 PST 2018


https://bugs.webkit.org/show_bug.cgi?id=192628

            Bug ID: 192628
           Summary: Service Worker <script> interception allows exploiting
                    unexploitable XSSI
           Product: WebKit
           Version: WebKit Nightly Build
          Hardware: Unspecified
                OS: Unspecified
            Status: NEW
          Severity: Normal
          Priority: P2
         Component: Service Workers
          Assignee: webkit-unassigned at lists.webkit.org
          Reporter: prakashsharma97 at hotmail.com

What is XSSI?
> Cross Site Script Inclusion (XSSI) is an attack technique (or a vulnerability) that enables attackers to steal data of certain types across origin boundaries, by including target data using SCRIPT tag in an attacker's Web page.

Steps to reproduce:
Please visit https://cm2.pw/poc/chrome/xssi and you should see an alert with email.

Things worth noting here are;
- The initial <script> url, if requested directly, doesn't produce any output
- We're using Service Worker to intercept the request and send POST request instead
- The returned content is valid JavaScript. Thus we're able to read `email`.
- We can also add request headers like 'Accept', added for demonstration purpose.


Actual results:
<script> can be intercepted to send custom request like POST with other headers.

It's now possible to read cross-domain responses if it's a valid JavaScript no matter the request method (i.e Simple requests). Further, we can observe several applications respond with 'Content-type' specified in 'Accept' header. Service Worker now makes them prone to XSSI as it allows sending 'Accept' (safelisted) header with <script> tag and read side effects, if any.


Expected results:
<script> is expected to send default request with default headers.

-- 
You are receiving this mail because:
You are the assignee for the bug.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.webkit.org/pipermail/webkit-unassigned/attachments/20181212/a25c4bae/attachment.html>


More information about the webkit-unassigned mailing list