DISTINCT: Identity Theft using In-Browser Communications in Dual-Window Single Sign-On

Louis Jannett, Vladislav Mladenov, Christian Mainka, Jörg Schwenk
{"title":"DISTINCT: Identity Theft using In-Browser Communications in Dual-Window Single Sign-On","authors":"Louis Jannett, Vladislav Mladenov, Christian Mainka, Jörg Schwenk","doi":"10.1145/3548606.3560692","DOIUrl":null,"url":null,"abstract":"Single Sign-On (SSO) protocols like OAuth 2.0 and OpenID Connect 1.0 are cornerstones of modern web security, and have received much academic attention. Users sign in at a trusted Identity Provider (IdP) that subsequently allows many Service Providers (SPs) to verify the users' identities. Previous research concentrated on the standardized - called textbook SSO in this paper - authentication flows, which rely on HTTP redirects to transfer identity tokens between the SP and IdP. However, modern web applications like single page apps may not be able to execute the textbook flow because they lose the local state in case of HTTP redirects. By using novel browser technologies, such as postMessage, developers designed and implemented SSO protocols that were neither documented nor analyzed thoroughly. We call them dual-window SSO flows. In this paper, we provide the first comprehensive evaluation of dual-window SSO flows. In particular, we focus on the In-Browser Communication (InBC) used to exchange authentication tokens between SPs and IdPs in iframes and popups. We automate our analysis by developing Distinct - a tool that dynamically analyzes the JavaScript code executing as part of the SSO flow. Distinct translates the flow into a sequence diagram depicting all communicating entities and their exchanged messages, highlights insecure communication channels, and quantifies novel threats in dual-window SSO flows. We found that 56% of the SPs in the Tranco top 1k list support dual-window SSO. Surprisingly, 28% of the SPs implemented dual-window SSO without using official SDKs, leading to identity theft and XSS in 31% of these self-implemented SPs.","PeriodicalId":435197,"journal":{"name":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","volume":"4 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3548606.3560692","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

Single Sign-On (SSO) protocols like OAuth 2.0 and OpenID Connect 1.0 are cornerstones of modern web security, and have received much academic attention. Users sign in at a trusted Identity Provider (IdP) that subsequently allows many Service Providers (SPs) to verify the users' identities. Previous research concentrated on the standardized - called textbook SSO in this paper - authentication flows, which rely on HTTP redirects to transfer identity tokens between the SP and IdP. However, modern web applications like single page apps may not be able to execute the textbook flow because they lose the local state in case of HTTP redirects. By using novel browser technologies, such as postMessage, developers designed and implemented SSO protocols that were neither documented nor analyzed thoroughly. We call them dual-window SSO flows. In this paper, we provide the first comprehensive evaluation of dual-window SSO flows. In particular, we focus on the In-Browser Communication (InBC) used to exchange authentication tokens between SPs and IdPs in iframes and popups. We automate our analysis by developing Distinct - a tool that dynamically analyzes the JavaScript code executing as part of the SSO flow. Distinct translates the flow into a sequence diagram depicting all communicating entities and their exchanged messages, highlights insecure communication channels, and quantifies novel threats in dual-window SSO flows. We found that 56% of the SPs in the Tranco top 1k list support dual-window SSO. Surprisingly, 28% of the SPs implemented dual-window SSO without using official SDKs, leading to identity theft and XSS in 31% of these self-implemented SPs.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
DISTINCT:在双窗口单点登录中使用浏览器内通信进行身份盗窃
像OAuth 2.0和OpenID Connect 1.0这样的单点登录(SSO)协议是现代网络安全的基石,已经受到了很多学术界的关注。用户在受信任的身份提供者(IdP)处登录,随后允许许多服务提供者(sp)验证用户的身份。以前的研究主要集中在标准化的认证流程上,本文称之为教科书式的单点登录,该流程依赖于HTTP重定向在SP和IdP之间传输身份令牌。然而,像单页应用程序这样的现代web应用程序可能无法执行教科书流,因为它们在HTTP重定向的情况下会丢失本地状态。通过使用新颖的浏览器技术(如postMessage),开发人员设计并实现了既没有记录也没有彻底分析的SSO协议。我们称之为双窗口SSO流。在本文中,我们首次对双窗口SSO流进行了全面的评估。我们特别关注浏览器内通信(InBC),该通信用于在iframe和弹出框中的sp和idp之间交换身份验证令牌。我们通过开发Distinct(一个动态分析作为SSO流一部分执行的JavaScript代码的工具)来实现分析的自动化。Distinct将流转换为描述所有通信实体及其交换消息的序列图,突出显示不安全的通信通道,并量化双窗口SSO流中的新威胁。我们发现Tranco前1000名列表中56%的sp支持双窗口SSO。令人惊讶的是,28%的服务提供商在没有使用官方sdk的情况下实现了双窗口SSO,导致31%的这些自行实现的服务提供商出现身份盗窃和跨站攻击。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
P-Verifier: Understanding and Mitigating Security Risks in Cloud-based IoT Access Policies When Frodo Flips: End-to-End Key Recovery on FrodoKEM via Rowhammer Poster: MUSTARD - Adaptive Behavioral Analysis for Ransomware Detection Poster: Fingerprint-Face Friction Based Earable Authentication A Run a Day Won't Keep the Hacker Away: Inference Attacks on Endpoint Privacy Zones in Fitness Tracking Social Networks
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1