Connect with us

Cyber Security

‘Hidden Property Abusing’ Allows Attacks on Node.js Applications

Avatar

Published

on

A team of researchers from Georgia Tech find a new attack technique that targets properties in Node.js and plan to publicly release a tool that has already identified 13 new vulnerabilities.

A team made up of security researchers from the Georgia Institute of Technology has found a way to exploit Node.js applications by manipulating the hidden properties used to track internal program states, the group plans to announce at the virtual Black Hat USA security conference next week.

The novel attack technique, dubbed Hidden Property Abusing, allows a remote attacker to inject new values into Node.js programs through passing objects that the framework, under the right circumstances, will treat as internal data. Using a tool to analyze a sample of 60 major Node.js components, the researchers found 13 vulnerabilities — ranging from SQL injection to the ability to bypass input validation.

The tool, dubbed Lynx, will be released at during the virtual Black Hat USA security conference, says Feng Xiao, the primary researcher and a doctoral student in the School of Computer Science at Georgia Tech.

“Our attacks focuses on certain program states or properties defined by the developers, such as the user ID or other program features,” he says. “We found that this attack pattern is pretty common, but they can be complex to find, so we built the tool to help others.”

Hidden Property Abusing takes advantage of developers’ assumption that the internal program states are unreachable by an external attacker. The root cause of the problem is that “[a]fter the input data is converted to objects, Node.js treats them as legitimate objects like any other internal ones,” the researchers state in a yet-to-be-published paper on the topic. 

The attack technique is similar to JavaScript Prototype Pollution, in which an attacker modifies a prototype object that is then merged, changing the base prototype of an object — changes that are then propagated to other JavaScript objects based on that prototype. In the case of Hidden Property Abusing, however, the prototype is not changed, but the properties inherited from a prototype can be overwritten, the researchers say.

“These parameters sometimes associate with some critical program states, but nobody knows their existence until an attacker exploits them, so that is why we call them hidden properties,” Feng says. The research team consists of six students and Wenke Lee, a professor of computer science at Georgia Tech.

Node.js is an extremely popular platform for running JavaScript code in a server environment for cloud-enabled applications, with more than 51% of developers claiming to use Node.js on a regular basis, according to the 2020 StackOverflow Developer Survey. Some 70% of developers have designated Node.js as their primary application platform, according to security firm Snyk’s open source technologies survey. Companies from Netflix to Trello to Microsoft’s LinkedIn use, or have used, Node.js as a framework for some of part of their services.

Making the impact worse, Node.js relies heavily on dependencies. A single component can import dozens of other components, and if one of those packages are vulnerable, the original component will be vulnerable as well. In a recent report, software security firm Veracode found that the average JavaScript program imported 377 libraries.

“[D]ue to the heavy reuse phenomenon in the Node.js ecosystem, a huge number of Node.js applications may be impacted if a widely-used module is found to be vulnerable,” the report states.

The Georgia Tech researchers’ attack technique takes advantage of the fact that communications between the server and client sides of a Node.js application are usually done with JavaScript objects, because of built-in features that make such communications easier and allow for more complex data structures to be passed between components.

However, if an attacker can send objects with extra properties, they can enumerate hidden possibilities that could then be manipulated to attack the application. Hidden properties often represent the internal program state and changing them can have an impact on the program’s security, the researchers say.

“In our analysis, we find the replaced property can be any data, such as a critical function or a key program state,” the report states. “Thus, the attacker may abuse the propagation process … of a hidden property to powerfully manipulate critical program logic associated with the compromised property.”

To help developers identify potential attack vectors in their own Node.js application, the research team has created a tool, dubbed Lynx, that will be released during the Black Hat Security Briefings in early August. The tool identifies potential vulnerable properties by propagating fake parameters to enumerate and track the use of properties in the code.

“Lynx combines the advantages of static and dynamic analysis to track property propagation, identify hidden properties, and generate corresponding concrete exploits,” the paper states.

The 13 vulnerabilities disclosed by the team were discovered using the tool to evaluate 60 popular Node.js programs. Using Lynx, the group found 318 candidates for hidden properties, with more than two-thirds of the programs containing such properties. Then, using dynamic analysis, the researchers were able to identify likely vulnerable properties.

“For Lynx, we track the data flows of the user and we statically analyze the propagation to find potential data dependencies that the attacker could create,” Feng says. “Two groups of people should use the tools: The developers who develop APIs can use ours tools to attacks their own program and fix the program by building or deleting these hidden properties, and security researchers — white-hat hackers — can use the tools to find potential issues in open source programs.”

Related Content:

 

 

Register now for this year’s fully virtual Black Hat USA, scheduled to take place August 1–6, and get more information about the event on the Black Hat website. Click for details on conference information and to register.

Veteran technology journalist of more than 20 years. Former research engineer. Written for more than two dozen publications, including CNET News.com, Dark Reading, MIT’s Technology Review, Popular Science, and Wired News. Five awards for journalism, including Best Deadline … View Full Bio

Recommended Reading:

More Insights

Source: https://www.darkreading.com/vulnerabilities—threats/hidden-property-abusing-allows-attacks-on-nodejs-applications/d/d-id/1338509?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Cyber Security

Digitally Signed Bandook Trojan Reemerges in Global Spy Campaign

Avatar

Published

on

The administrator of your personal data will be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detailed information on the processing of personal data can be found in the privacy policy. In addition, you will find them in the message confirming the subscription to the newsletter.

Source: https://threatpost.com/digitally-signed-bandook-trojan-spy-campaign/161676/

Continue Reading

Cyber Security

MacOS Users Targeted By OceanLotus Backdoor

Avatar

Published

on

The administrator of your personal data will be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detailed information on the processing of personal data can be found in the privacy policy. In addition, you will find them in the message confirming the subscription to the newsletter.

Source: https://threatpost.com/macos-users-targeted-oceanlotus-backdoor/161655/

Continue Reading

Cyber Security

Pandemic, A Driving Force in 2021 Financial Crime

Avatar

Published

on

The administrator of your personal data will be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detailed information on the processing of personal data can be found in the privacy policy. In addition, you will find them in the message confirming the subscription to the newsletter.

Source: https://threatpost.com/2021-financial-crime-covid-19/161665/

Continue Reading

Big Data

Contactless payments market to reach US$ 26.3 billion by 2027

Avatar

Published

on

Contactless Payments Market To Reach US$ 26.3 Billion By 2027

The global contactless payments market is expected to surpass US$ 26.3 Billion by 2027 end, registering a CAGR of 12.9% during the forecast period of 2019 to 2027), as highlighted in a report published by Coherent Market Insights.

Increasing demand for contactless payments from the retail sector is expected to drive market growth during the forecast period. Retailers are modernizing their brick-and-mortar stores to offer secure services to customers and establishing online stores to increase revenue.

They are adopting advanced technologies such as big data analytics and cloud computing to increase their presence in the market. Retail manufacturers are using contactless payments methods that provide many benefits, such as reduced transaction time, increased operational efficiency, increased revenue, minimized cost, and others. Contactless payment methods at retail stores reduce transaction process and queue in counter.

Moreover, governments are also focusing on introducing new payment methods in order to increase productivity and remain competitive in the market. For instance, in December 2016, the government of India launched BHIM app for Unified Payment Interface (UPI). The common UPIbased BHIM app allows the user to send and receive money through their mobile phones by linking their bank accounts. For instance, according to Coherent Market Insights’ analysis, the number of transactions done through the Bharat Interface for Money (BHIM) app reached 18.8 million in February 2020.

Contactless Payments Market – Impact of Coronavirus (Covid-19) Pandemic

According to Coherent Market Insight‘s study, globally, most of the countries are affected by COVID-19 and most of the countries have announced lockdown.Contactless payment have become more preferred payment method, as it requires less physical interactions.

Smartphone based payment interface and digital wallets are the potential solutions to contain the spread of coronavirus pandemic. Moreover, recent developments in digital payments have encouraged the use of contactless payment methods during this pandemic. For instance, in April 2020, Upgrade Inc., a U.S.-based loan company, launched new contactless credit card. The new credit card provides high transaction limit than other payment methods.

Moreover, bank authorities and card network in Germany, U.K., Austria, and other countries have set higher transaction limit, as people are staying at home and prefer shopping through payment cards only. For instance, U.K Finance Limited increased the transaction limit for contactless payment cards starting from 30 Euros to 45 Euros. This, in turn, increases demand for contactless payment solutions.

Key Trends and Analysis of the Global Contactless Payments Market:

  • Europe held dominant position in the global contactless payments market in 2019 and is expected to retain its dominance throughout the forecast period. This is owing to increasing payment through smart cards. For instance, according to the Electronic Transactions Association (ETA), contactless payments through Mastercard and Maestro increased by 145% in Europe in 2018. Furthermore, in 2019, according to Coherent Market Insights’ analysis, the transactions through contactless payment methods reached 651 million in the U.K.
  • Asia Pacific is expected to show significant growth over the forecast period. The increasing adoption of contactless payment methods from retail industry is fueling the market growth. Retailers are modernizing their conventional payment methods with contactless payment methods, in order to improve productivity and efficiency in the business.
  • Among device type, the smartphone segment held dominant position in the market in 2019 and is expected to retain its dominance during the forecast period. This is owing to increasing demand for live streaming from consumers. For instance, the online video streaming market is expected to exceed US$ 70,000 million in 2021 from US$ 30,000 million in 2016.
  • Major players operating in the global contactless payments market include Thales Group, Infineon Technologies AG, Ingenico Group, Wirecard, VeriFone, Inc., Giesecke+Devrient GmbH, IDEMIA, Track Innovations LTD., Identiv, Inc., CPI Card Group Inc., Setomatic Systems, Valitor, PAX, PINPAD, Mobeewave, alcineo, and Paycor, Inc.

Source: https://www.fintechnews.org/contactless-payments-market-to-reach-us-26-3-billion-by-2027/

Continue Reading
Cleantech4 hours ago

800,000+ People Risk Water Shutoffs In The Great Lakes State

Cleantech5 hours ago

Shared Micromobility Is Replacing Car Trips

Cleantech6 hours ago

Renewables = 20% of US Electricity Generation in First 3 Quarters

Cleantech11 hours ago

Volkswagen Orders KUKA Robots For ID. Buzz, And Other Volkswagen Group News

Cleantech11 hours ago

The Corporate Carbon Accounting Market

Cleantech11 hours ago

You Should Care About Transportation Emissions. Here’s Why

SaaS11 hours ago

What is Video Search and How Can it Help Your Business?

Cyber Security13 hours ago

Digitally Signed Bandook Trojan Reemerges in Global Spy Campaign

Amb Crypto13 hours ago

Ethereum long-term Price Analysis: 30 November

Amb Crypto14 hours ago

Bitcoin’s price could one day be $500,000: Gemini’s Winklevoss brothers

SaaS14 hours ago

How Can iPaaS Help Your Digital Marketing?

Aerospace14 hours ago

2020 SpaceNews Awards Virtual Event

Cleantech14 hours ago

The Renewable Energy Cows Come Home, Now With Green Ammonia

Amb Crypto14 hours ago

What does Bitcoin’s Sentiment say about its future?

Globe NewsWire14 hours ago

European Energy completes third quarter of 2020 with significant growth across the board

Amb Crypto15 hours ago

Monero, Polkadot, Compound Price Analysis: 30 November

Amb Crypto15 hours ago

Former Chief Digital Officer of Luxury brand LVMH joins Ledger 

Cleantech15 hours ago

EV Aftermarket Virtual Trade Show (Show & Tell) Is Today — Join Us!

Cyber Security15 hours ago

MacOS Users Targeted By OceanLotus Backdoor

Cleantech15 hours ago

Townie Path Go! E-Bike: A Premium, Sturdy Electric Bike For Commuters & Fun

Cyber Security15 hours ago

Pandemic, A Driving Force in 2021 Financial Crime

Aerospace15 hours ago

FCC Chairman Ajit Pai to leave agency in January

SaaS15 hours ago

Generative Media: The Future of Visual Marketing

Amb Crypto15 hours ago

Bitcoin SV long-term Price Analysis: 30 November

Automotive16 hours ago

Tesla gains permission to begin second phase of deforestation at Giga Berlin

Aerospace16 hours ago

SES to provide satellite connectivity for U.S. military ‘internet of things’

Aerospace16 hours ago

Launchspace Technologies proposes debris mitigation and collection constellations

SaaS16 hours ago

How Long It Roughly Takes to Close a Deal in SaaS. And Why.

Cleantech16 hours ago

Renewables = 70% of New US Power Capacity in 2020, Solar = 43%

Big Data16 hours ago

Capital on Tap apuesta por el software Modellica Originations de GDS Modellica para evaluar los procesos de solicitudes de tarjetas de crédito

Trending