Proceedings of the 2018 World Wide Web Conference on World Wide Web - WWW '18 2018
DOI: 10.1145/3178876.3186090
|View full text |Cite
|
Sign up to set email alerts
|

Large-Scale Analysis of Style Injection by Relative Path Overwrite

Abstract: Relative Path Overwrite (RPO) is a recent technique to inject style directives into sites even when no style sink or markup injection vulnerability is present. It exploits differences in how browsers and web servers interpret relative paths (i.e., path confusion) to make a HTML page reference itself as a stylesheet; a simple text injection vulnerability along with browsers' leniency in parsing CSS resources results in an attacker's ability to inject style directives that will be interpreted by the browser. Eve… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(8 citation statements)
references
References 20 publications
0
8
0
Order By: Relevance
“…Another body of work focuses on the issues related to the inclusion of third-party subresources and trackers in webpages [4,7,31,32,35,41]. Arshad et al [5] perform the rst large-scale analysis of scriptless CSS injection. They show that around 9% of 10k most popular websites contain at least one vulnerable page, out of which more than one third can be exploited.…”
Section: Related Workmentioning
confidence: 99%
“…Another body of work focuses on the issues related to the inclusion of third-party subresources and trackers in webpages [4,7,31,32,35,41]. Arshad et al [5] perform the rst large-scale analysis of scriptless CSS injection. They show that around 9% of 10k most popular websites contain at least one vulnerable page, out of which more than one third can be exploited.…”
Section: Related Workmentioning
confidence: 99%
“…Resources of type iframe are, essentially, equivalent to scripts used for drive-by attacks [31,32]. The other resource types can be misused only for attempting to inject malware in the browser, by exploiting vulnerabilities in the browser code for handling the corresponding resources [33][34][35][36].…”
Section: Data Collection and Methodologymentioning
confidence: 99%
“…Another research found that because of the browser failing to ask permission, websites were able to read the battery status and profile users accordingly [30]. Previous studies [8], [9], [10] focused on adoption of response headers in general or in particular such as Content Security Policy [11], [12] and Referrer Policy [13]. Studies showed that unless these policies are used correctly both by server-side and client-side, they do not protect against possible attacks.…”
Section: Related Workmentioning
confidence: 99%
“…Previous studies focused on the adoption of response headers and their security and privacy implications [8], [9], [10], [11], [12], [13]. In other work [14], [15], researchers proposed sandboxing scripts as a countermeasure to data leakage.…”
Section: Introductionmentioning
confidence: 99%