WebSocket Hijack, Post-Quantum Side-Channel, OWASP’s Future, OAuth Misconfigs, ZAP – ASW #231
WebSocket hijack that leads to a full workspace takeover in a cloud IDE, malicious packages flood public repos, side-channel attack on a post-quantum algorithm, looking at OWASP's evolution, OAuth misconfigs lead to account takeover, AI risk management framework, Zed Attack Proxy
Announcements
As a member of the Security Weekly community, we are pleased to offer you 20% off your InfoSec World 2023 tickets! Join a community of over 2,000 security professionals and innovators at InfoSec World on September 25th through 27th at Disney’s Coronado Springs Resort. Experience world-class learning and networking through enlightening keynotes, informative panel discussions, interactive breakout sessions, hands-on workshops, and more.
Register today at securityweekly.com/infosecworld2023 using code ISW23-SECWEEK20!
Hosts
- 1. Gitpod remote code execution 0-day vulnerability via WebSockets
Snyk shares some clever WebSocket hijacking in a CDE -- a cloud-based IDE. It might be the first WebSocket vuln we've covered, too.
- 2. Malicious package flood on PyPI might be sign of new attacks to come
The appsec angle in this that appeals to me is what controls a public package repo can create to minimize the impact of attack classes like typosquatting or even just mass creation of packages. Typosquatting isn't specific to PyPI. The article talks about the verified namespaces used in the Java world as one countermeasure.
- 3. A key post-quantum algorithm may be vulnerable to side-channel attacks
Side channel attacks are cool ways to leak information from a cryptographic system. They're often more about targeting the engineering and implementation of an algorithm as opposed to its design.
It's an area with subtleties where toolchains can introduce flaws in otherwise secure code. For example, constant-time string comparison is a common cryptographic need. And it's something that developers have to implement and review carefully because compilers love to optimize code -- and optimized code might introduce time-based side channels.
Also check out this article, which includes comments from NIST that indicate the attack doesn't appear to be a fatal flaw in the algorithm's design.
In the meantime, see how long it takes to upgrade your org's web footprint to TLS 1.3 and HTTP/2 (or, even better, HTTP/3). It's important to be prepared for new attacks, but there's a far more pressing reality of adopting new protocols in the first place.
- 4. The (de)Evolution of OWASP
More discussions about OWASP, with a desire for where it should head and a highlight on what it does well. It also points to the success of other projects like OpenSSF in order to figure out OWASP's future.
I like how it points to the cheatsheet series. Those have always been more interesting to me than the Top 10 lists. They're more actionable and more consumable for devs and appsec teams. One of the key decision points for OWASP may be to figure out who they should be serving and how best to do so.
- 5. Traveling with OAuth – Account Takeover on Booking.com
This article gives a nice, non-technical overview of OAuth authentication flows. Read it for that info alone. It also goes into flaws the researchers discovered in apps that mishandled redirect_uri parameters, enabling attackers to get servers to leak OAuth codes (the Authorization Code grant, a one-time value that the user exchanges for an access token).
- 6. AI Risk Management Framework (AI RMF 1.0)
Regardless of whatever intelligence it has, ChatGPT has surely won the marketing campaign for AI over the last few months. Everyone likes talking about examples of ChatGPT giving humorous responses, naive responses, and even appsec-oriented responses. And there's a fun game of prompt injection to probe its boundaries. But all those conversations are quite varied and don't share much consistent terminology when talking about security and privacy issues.
This work from NIST helps guide those conversions. It starts with a framing of AI risks that covers far more than appsec concerns, while still giving a way to talk about appsec concerns like impacts on phishing, malware, impersonation, and creative uses I'm sure we'll start seeing a security conferences soon.
Check out the PDF.
- 7. TOOL: OWASP Zed Attack Proxy (ZAP)
ZAP is the other web proxy that's a go-to tool for bug bounty researchers, pentesters, and other appsec folks. It's open source, supports extensions, and has active development.
- 1. The audit log hall of shame
Good timing on this one - Last week we talked about the SSO tax and I asked if it was acceptable to charge for audit/security logging. audit-logs.tax says, yes, but more interestingly to me it discusses what should be in good audit logs, and how they're different than system logs.
- 2. Is vulnerable hardware cheaper on the 2nd hand market?
There's nothing super exciting in the article itself - a few more lame basic vulnerabilities.
But...it does make me wonder if known vulnerabilities affect the price of devices like these on ebay and similar?
- 3. Cybersecurity’s 3rd rail: software liability
This is almost a BSW/ESW article, but I felt there's value in us - as appsec or software engineers - to think about the parallels to the automotive industry, and how our orgs will handle creating a "standard of care"
- 4. ML-assisted sidechannel attacks find weakness in “quantum-safe” crypto algorithm