Threat CC.AuC.DFrXSS.3

URI: CC.AuC.DFrXSS.3

Package: VulnerabilityCVSS

< prev | next >

Description: Reflected XSS exploit on Client via Service injected via client input Data from FlowsFrom: an attacker who can inject malicious content into input Data flowing to Client from FlowsFrom can exploit a bug in Service to send a harmful script to the client browser. We assume this will make the browser leak authentication credentials, such as a password or session key.

Threat Type: Primary Threat

Matching Pattern:

CC.AuC.DFrXSS.3
MP-DFrXSS

Finds human using a web browser that uses a service with a host, where the browser receives from another process (not the service) data not created by either the browser or its user , plus the client channel between the browser and the service which must go via an IP subnet, and optionally the service and service host managers.

        (empty)

        (empty)

        (empty)

CSG-PatchingAtService

Use a systematic procedure for regular security patching of software used (including hosted process Service) on device SHost, and have a contingency plan included in the system operating policies and practices for HostManager to manually apply patches immediately for Service should the need for them become urgent.

CSG-PatchingAtService-Implementation

Represents a situation in which software patches have been applied manually by HostManager to eliminate vulnerabilities in process Service. This strategy represents activation of a contingency plan at runtime, and can be selected to discover what effect this would have on risk levels, allowing this to be used for decision support calculations. Note that this should only be considered if a suitable software patch is available. To implement this at runtime, signal the responsible user HostManager.

CSG-SuspendServiceVulnerableToXSS

Service Service may be temporarily disabled by the manager of its host HostManager to prevent a known vulnerability being exploited in a cross-site scripting attack. This strategy represents a contingency plan, which can be used to reduce risk from some threats but it may triggers other threats representing possible side effects, depending on how likely it is that the contingency plan will need to be activated.

CSG-SuspendServiceVulnerableToXSS-Implementation-Runtime

Process Service has been disabled by the manager of its host HostManager to prevent it being exploited in a cross-site scripting attack. This strategy represents activation of a contingency plan at runtime, and can be selected to discover what effect this would have on risk levels, allowing this to be used for decision support calculations. To activate it at runtime, signal user HostManager who is responsible for managing device SHost where Service is running. The Disabled Process control should be deselected only when the process has been restarted.

CSG-XSSPreventionAtService

The XSS Sanitisation control means the service Service has been implemented using an XSS-safe language and framework including XSS detection code scanners.