NodeXP: NOde.js server-side JavaScript injection vulnerability DEtection and eXPloitation
Creators
- 1. Department of Informatics, Ionian University
- 2. Department of Digital Systems, University of Piraeus
- 3. Athena Research Center
Description
Web applications are widely used, and new ways for easier and cost-effective methods to develop them are constantly introduced. A common omission among the new development and implementation techniques when designing them is security; Node.js is no exception, as Server-Side JavaScript Injection (SSJI) attacks are possible due to the use of vulnerable functions and neglecting to sanitize data input provided by untrusted sources. This specific kind of injection attack stands out because it has the potential to compromise servers, where the JavaScript code is executed.
In this work, we fill a significant gap in the literature by introducing NodeXP, which, to the best of our knowledge, is the first methodology (presented as a software tool) that detects and automatically exploits SSJI vulnerabilities. Beyond the capabilities of the current state-of-the-art tools, NodeXP uses obfuscation methods, making it more stealth and adaptive to the current needs of red teaming. To this end, we provide a thorough analysis of SSJI attacks and the foundation upon which they rely on, along with concrete examples to facilitate the reader to comprehend the underlying concepts. Finally, we evaluate NodeXP, compare it to its peers, and discuss its efficacy.
Files
NodeXP__NOde_js_server_side_JavaScript_injection_vulnerability_DEtection_and_eXPloitation (1).pdf
Files
(369.0 kB)
Name | Size | Download all |
---|---|---|
md5:3560ae28e9516d0c5c4aa948b88a00b4
|
369.0 kB | Preview Download |