Abstract

Cross channel scripting (XCS) is a common web application vulnerability, which is a variant of a cross-site scripting (XSS) attack. An XCS attack vector can be injected through network protocol and smart devices that have web interfaces such as routers, photo frames, and cameras. In this attack scenario, the network devices allow the web administrator to carry out various functions related to accessing the web content from the server. After the injection of malicious code into web interfaces, XCS attack vectors can be exploited in the client browser. In addition, scripted content can be injected into the networked devices through various protocols, such as network file system, file transfer protocol (FTP), and simple mail transfer protocol. In this paper, various computational techniques deployed at the client and server sides for XCS detection and mitigation are analyzed. Various web application scanners have been discussed along with specific features. Various computational tools and approaches with their respective characteristics are also discussed. Finally, shortcomings and future directions related to the existing computational techniques for XCS are presented.

Highlights

  • Academic Editors: Piyush KumarWeb applications are widely accepted as one of the best platforms for delivering information over the Internet

  • Most of the vendors have designed firmware components known as lights-out management (LOM) modules, which can be externally acquired by an admin

  • Many cross channel scripting attack vectors were found in BitTorrent clients [7], but an interesting fact is that an XCS attack vector results from a peer-to-to-peer (P2P) channel

Read more

Summary

Introduction

Web applications (apps) are widely accepted as one of the best platforms for delivering information over the Internet. These apps provide access to a variety of online services, such as social networking sites, e-mails, Internet banking, and e-commerce applications, that employ several technologies and web components [1,2]. Cross-site scripting (XSS) is a type of cyber threat in which a browser application’s loopholes are exploited in order to inject a malicious script. This means that stealing cookies, phishing, or hacking an organization’s entire network might compromise users’ data [3].

Vulnerability Classes
XCS Threat Model
Motivation and Contributions
Related Work
Vulnerabilities in Embedded Devices
Vulnerabilities on IP Camera and Phone
Vulnerabilities on Lights-Out Management and Digital Photo Frames
Vulnerabilities on Router, Switch, and Printer
Log-Based XCS
Attack on Peer-to-Peer Channel
XCS Attacks on Smartphones and Online Social Networks
RXCS Attacks on Facebook
RXCS Attacks on Twitter
Tools Used
Content Sanitization
Black Box Scanner Tools
Detection Approaches for XCS on the Client Side
S2XS2: Server Side Approach to Mitigate Web-Based Threats
XCS-SAFE
Web-Application Proxy
Mitigation of Cross Channel Scripting Attacks
Fingerprints for XCS Detection
Site Firewall
Analysis of XCS Attacks
Research Gaps
Future Directions
Findings
10. Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call