Feeds

Mozilla unveils cure for Web 2.0 world run amok

Putting XSS worms on notice

Protecting against web application threats using SSL

The Mozilla Foundation has unveiled an early version of its Firefox browser that it says could virtually eliminate one of the most common attack forms now menacing the web.

It implements an inchoate technology the foundation calls CSP, short for the Content Security Policy specification. It allows web developers to embed a series of HTML headers into their sites that by default block some of the most abused features from being offered. Newer versions of Firefox, and other browsers if they adopt the standard, would then enforce those policies across the site's entire domain.

The primary aim of CSP is to immunize websites from attacks based on XSS, or cross-site scripting. The exploits frequently target javascript, Adobe Flash and other user-supplied content that allows attackers to inject malicious content and code into trusted websites. Administrators then have the option of whitelisting only the types of content they need to make their sites work as designed.

"A lot of the big sites who are dealing with user content and who are seeing some of these problems with cross-site scripting, we've heard excitement from them," said Johnathan Nightingale, whose official title at Mozilla is human shield. "It's hard to filter out all the potentially bad things that a malicious user can include."

The CSP preview builds are designed to give web developers a sneak peek at the specification and chime in with suggestions for making it better. Mozilla hopes it will become an open standard and is already shepherding it through the World Wide Web Consortium.

Over the past few years, XSS attacks have emerged as one of the most common ways to exploit web surfers and Web 2.0 sites alike. A recent rash of Twitter worms relied on XSS vulnerabilities in the microblogging site. Such self-replicating attacks date back to at least 2005, when the so-called Samy Worm knocked MySpace out of commission by adding more than 1 million users to the creator's friends list.

CSP has the ability to do more than stamp out XSS. By erecting a wall in front of a company's intranet and other protected resources, CSP could insulate organizations from so-called DNS rebinding attacks. Those techniques use HTML sleight of hand to trick web browsers behind an organization's firewall into attacking routers and other vital targets.

Of course, all of this is still no more than a gleam in the eyes of Mozilla developers. For it to catch on, large websites will have to invest heavily in it, and given Mozilla's still-modest market share, that will almost certainly require other browser suppliers (read: Microsoft) to get on board.

That's an awful lot of ifs. Still, CSP is worth watching - and if you're a web developer, even playing around with. If it works as intended, it could prove to be one of the more promising solutions for a Web 2.0 world that's built first and is only later, if ever, patched. ®

Reducing the cost and complexity of web vulnerability management

More from The Register

next story
Early result from Scots indyref vote? NAW, Jimmy - it's a SCAM
Anyone claiming to know before tomorrow is telling porkies
TOR users become FBI's No.1 hacking target after legal power grab
Be afeared, me hearties, these scoundrels be spying our signals
Jihadi terrorists DIDN'T encrypt their comms 'cos of Snowden leaks
Intel bods' analysis concludes 'no significant change' after whistle was blown
Home Depot: 56 million bank cards pwned by malware in our tills
That's about 50 per cent bigger than the Target tills mega-hack
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
NORKS ban Wi-Fi and satellite internet at embassies
Crackdown on tardy diplomatic sysadmins providing accidental unfiltered internet access
UK.gov lobs another fistful of change at SME infosec nightmares
Senior Lib Dem in 'trying to be relevant' shocker. It's only taxpayers' money, after all
Critical Adobe Reader and Acrobat patches FINALLY make it out
Eight vulns healed, including XSS and DoS paths
Spies would need SUPER POWERS to tap undersea cables
Why mess with armoured 10kV cables when land-based, and legal, snoop tools are easier?
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.