Squarcina, M., Adão, P., Lorenzo Veronese, & Matteo Maffei. (2023). Cookie Crumbles: Breaking and Fixing Web Session Integrity. In J. Calandrino & C. Troncoso (Eds.), SEC ’23: Proceedings of the 32nd USENIX Conference on Security Symposium (pp. 5539–5556). USENIX Association. https://doi.org/10.34726/5329
SEC '23: Proceedings of the 32nd USENIX Conference on Security Symposium
-
ISBN:
978-1-939133-37-3
-
Date (published):
26-Oct-2023
-
Event name:
SEC '23: 32nd USENIX Conference on Security Symposium
en
Event date:
9-Aug-2023 - 11-Aug-2023
-
Event place:
Anaheim, United States of America (the)
-
Number of Pages:
18
-
Publisher:
USENIX Association, Berkeley
-
Peer reviewed:
Yes
-
Keywords:
web security; web measurement; cookies; attacks; vulnerability; session integrity; system security
en
Abstract:
Cookies have a long history of vulnerabilities targeting their confidentiality and integrity. To address these issues, new mechanisms have been proposed and implemented in browsers and server-side applications. Notably, improvements to the Secure attribute and cookie prefixes aim to strengthen cookie integrity against network and same-site attackers, whereas SameSite cookies have been touted as the solution to CSRF. On the server, token-based protections are considered an effective defense for CSRF in the synchronizer token
pattern variant. In this paper, we question the effectiveness of these protections and study the real-world security implications of cookie integrity issues, showing how security mechanisms previously considered robust can be bypassed, exposing Web applications to session integrity attacks such as session fixation and cross-origin request forgery (CORF). These flaws are not only implementation-specific bugs but are also caused by compositionality issues of security mechanisms or vulnerabilities in the standard. Our research contributed to 12 CVEs, 27 vulnerability disclosures, and updates to the cookie standard. It comprises (i) a thorough cross-browser evaluation of cookie integrity issues, that results in new attacks originating from implementation or specification inconsistencies, and (ii) a security analysis of the top 13 Web frameworks, exposing session integrity vulnerabilities in 9 of them. We discuss our responsible disclosure and propose practical mitigations.
en
Project title:
Foundations and Tools for Client-Side Web Security: 771527 (Europäischer Forschungsrat (ERC)) Forschungszentrum für Cybersicherheit und Datenschutz in Wien: ViSP (Wirtschaftsagentur Wien Ein Fonds der Stadt Wien) Fixing the Broken Bridge Between Mobile Apps and the Web: ICT22-060 (WWTF Wiener Wissenschafts-, Forschu und Technologiefonds)
-
Project (external):
Austrian Research Promotion Agency (FFG Fundação para a Ciência e a Tecnologia Fundação para a Ciência e a Tecnologia European Commission