Blogs & Stories

SpiderLabs Blog

Attracting more than a half-million annual readers – is the security community’s go-to destination for technical breakdowns of the latest threats, critical vulnerability disclosures and cutting-edge research.

The Web IS Vulnerable: XSS on the Battlefront (Part 1)

<SCRIPT> var str1 = "http://"; var str2 = ""; var str3 = "/beacon.html"; var result = str1 + str2 + str3; window.location=result</SCRIPT>

For those of you who were not able to make it to our talk at Blackhat USA, this blog post provides an overview of the information presented. &nbsp;This was a joint presentation by Trustwave SpiderLabs Research Team and Microsoft's Security Research and Defense Team.

Screen Shot 2013-08-15 at 11.41.35 AM

This is part 1 of a 2 part blog post. &nbsp;In this installment, we will discuss example XSS attacks captured in the wild and also some statistics. &nbsp;In part 2, we will discuss XSS Defense Techniques.

XSS: Vulnerability Prevalence

OWASP Top 10 2013

The latest OWASP Top 10 Web Applications Risk Project lists the following risk graphic for XSS:


As you can see from this graphic, the PREVALENCE of XSS across all applications tested is VERY WIDESPREAD.

Trustwave Global Security Report

In the latest Trustwave Global Security Report, the SpiderLabs App-Pentest Team generated the following list of top vulnerabiities identified in the last year during their engagements:

Trustwave-GSR-Top-VulnsAgain, XSS is listed as the top vulnerability identified.

XSS: Attack Liklihood

The previous section provided metrics to support the theory that we already know - XSS vulnerabilities are rampant. &nbsp;What we wanted to focus on for our research was this - HOW are XSS vulnerabilities being exploited in the wild? &nbsp;

XSS Attack Data Sources

In order to find real-world attack data, we analyzed a variety of resources:

  • Webserver/proxy logs
  • Webapplication firewall logs
  • URLshortening services
  • Spame-mails
  • Chatrooms, IRC traffic
  • Commentson pages
  • URLreputation services

&nbsp;All of this data together yielded approximately:

  • 100s TB of raw data
  • 10s TB of URLs

XSS Attack Data Analysis

So, how did we analyze this data for XSS attacks? &nbsp;Greg created a toolset called detectXSSlib:

  • Generalpurpose library written in C
  • Basedon a subset of OWASP CRS rules (IE XSS Filters)
  • Optimizedfor performance
  • Rulesselected on the base of empirical data
  • Commandline tool provided (xssscan)
  • Easyto integrate with other components
  • nginxmodule PoCprovided
The xssscan comamnd line tool can be used like this:
# ./xssscan&nbsp;xssscan ver 1.0 (c) 2013 Greg Wroblewski&nbsp;Command line tool for detection of XSS attacks in URLs. Based on ModSecurity rules from OWASP CRS.Optimized for performance and large scale data mining.&nbsp;Usage:xssscan [-t] [-r] [-x] <URL>xssscan [-a] [-d] [-r] [-x] -f <TEXT_FILE_WITH_URLS>&nbsp;Options:&nbsp;-a - in output replace host names with;-d - deduplicate URLs by same host name&nbsp;-r - show rule number for detected XSS (for statistics or debugging)&nbsp;-t - show tokens of parsed URL (useful for debugging only)&nbsp;-x - list only URLs where XSS was not detected (default: was detected)# ./xssscan -f /var/log/apache2/access.log172.16.209.1 - - [24/Jul/2013:10:40:40 -0400] "GET /wordpress/?s=%3Cscript%3Eprompt%28%22TEST%22%29%3B%3C%2Fscript%3EHTTP/1.1" 200 2155 """Mozilla/5.0 (Macintosh; Intel Mac OS X 10.8; rv:22.0) Gecko/20100101 Firefox/22.0"

Sanitized Example Attack Data&nbsp;

Sanitized XSS attack data is found here in Greg's GitHub Repo. &nbsp;Here is a small snippet of real-world attack data:;autoplay=1%22%20frameborder=%220%22%20allowfullscreen%3E%3C/iframe%3E%3Chtml%3E%3C%2fSCRIPT%3E&searchmode=anyword;%22%3E%3C/IFRAME%3E%3Cfont+color%3D%22red%22+size%3D%225%22%3EXSSD+BY%3A%3C%2Ffont%3E%3Cbr%3E%3Cfont+color%3D%22green%22+size%3D%2210%22%3E%3Cblink%3E+Anonymous+Squad+No.+035+%3C%2Fblink%3E%3C%2Ffont%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cfont+color%3D%22red%22%3EWe+are+Anonymous+%3Cbr%3E%3Cbr%3EWe+are+Legion+%3Cbr%3E%3Cbr%3EWe+do+not+FORGIVE%3Cbr%3E%3Cbr%3EWe+do+not+FORGET%3Cbr%3E%3Cbr%3EEXPECT+US!!!+%3Cbr%3E%3Cbr%3E%3C%2Ffont%3E%3Cfont+color%3D%22green%22+size%3D%225%22%3EGREETINGS+TO+%3A%3C%2Ffont%3E%3Cbr%3E%3Cmarquee+behavior%3D%22scroll%22+direction%3D%22left%22+scrollamount%3D%222%22+scrolldelay%3D%2220%22%3E%3Ch2%3E%20Anonymous%20Squad%20No.035%20was%20Here%20%3C/h2%3E%20%3Ch2%3E%20Hacked%20by%20xR0CKTH4T%20%3C/h2%3E%20%3Ch2%3E%20We%20are%20Anonymous%20%3Cbr%3E%20We%20are%20Legion%20%3Cbr%3E%20We%20do%20not%20forgive%20%3Cbr%3E%20We%20do%20not%20forget%20%3Cbr%3E%20Expect%20us!%20%3C/h2%3E

XSS Attack Examples: Proof-of-Concept Testing


Many XSS attacks are simple probes that test for the existence of missing output encoding defenses, for example:
These tests fall into the following categories:
  • Scanning tools
  • Proof-of-concept
  • Probing
  • Scanning tools
  • Going after bug bounty
  • Internal testing

XSS Attack Examples: Defacements

Website defacements were another popular outcome for using XSS attacks. &nbsp;Here is an example attack payload:

Xss-defacement-urlThis attack resulted in a defacement similar to the following screenshot:


XSS Attack Examples: Cookie Stealing

This is the first XSS attack category that directly negatively impacts web application users. &nbsp;Here is an example attack payload:

Cookie-stealingIn line #1 - the attacker sends the XSS payload in a parameter that overrides the Referer data echoed back in the response to execute JS code. &nbsp;This code would instruct the browser to download the wwgw8k5srago.js file. &nbsp;This file contains the data in ine #2 which instructs the browser to make a request to the nwwgw8k5sra.gif URL and to pass the document.cookie DOM data as a parameter. &nbsp;If this attack is successful, the attacker can quickly use the application SessionID cookie value to log into the application at the victim user.

XSS Attack Examples: In-Session Phishing

***This example uses an XSS vulnerability in Hotmail that has since been fixed.***

If attackers can identify XSS vulnerabilities within web-based email providers, then they can send targeted Phishing emails to users. &nbsp;Take a look at the example exploit code:

Hotmail-xssIn this instance, if I was logged into Hotmail and received the Phishing email, the JS code would trigger the onerror event call and issue a jQuery call to the attacker site which would present me with the following fake login page:


If the victim fall for this attack, their credentials will be sent to the attacker's site. &nbsp;Wehave seen at least 10 different instances of this typeof attack, usually launched on e-mail providers and financial institutions,very often carefully prepared with localized login screens, well concealedpassword delivery servers, etc.

XSS Attack Examples: Data Exfiltration


With a successful attack, script runs in browser in current session of the victim. &nbsp;The scriptcould hijack and upload to attackers entire on-line content accessible fromcurrent session. &nbsp;Examples:list of contacts, e-mails, attachments, calendar, files, etc... &nbsp;Aftersuccessful upload script re-directs to phishing page to get victim'scredentials (address bar does not change!)


In one case of the attack, the script wehave seen had 10s of kB ofcode, and even included interesting left-over comments. How nice.


Thescript was able to enumeratethrough multiple pages of e-mail boxes, extract e-mail data, includingattachments, and also steal contact list. &nbsp;Script was able to:


  • Enumerate through last 60 pages worth ofe-mail
  • Extract the From, Subject, and Body of the e-mail by using the same calls aswould be triggered if user were to view the e-mails
  • Inject new script elements with sourceset to the URL containing the next chunk of the data read from the file.
  • Send data in chunks to<email>&msg= <subject+from>^^<segmentindex>^^<next segment of message body>
  • Fetch content off of inbox/sent/drafts.
  • Clean up : mark messages that were notoriginally read as unread


Theupload process was also not trivial,leveraging data chunking.

Data-stealing-2XSS Attack Statistics

# of Successful XSS Attacks per TLD&nbsp;

Screen Shot 2013-08-15 at 6.12.34 PM

We have seen at least one sample of working attack for almost every single TLD out there.

Successful XSS Attacks Over Time


Theintensity of attacks remained on the constantlevel over the time we were able to monitor them consistently.

Prevalence of XSS Attacks&nbsp;(based on Alexa Top N list)

Screen Shot 2013-08-15 at 6.21.39 PM

Wellover 6% of top 1,000 websites had a successful XSS attack.

Part 1 Conclusion

As we have outlined in Part 1 of this blog post, XSS attacks are real. &nbsp;They range in severity and impact depending on what your business model is and who your customers are however outcomes such as account hijacking and data exfiltration are serious issues.

How do we protect against XSS attacks? &nbsp;Stay tuned for Part 2 where I will provide an overview of tactical XSS defenses which can be used in production to help mitigate exposures.

Recent SpiderLabs Blog Posts

Jan 23, 2019

Living of the LAN