Cloud-application add-ons are microservices that extend the functionality of the core applications. Many application vendors have opened their APIs for third-party developers and created marketplaces for add-ons (also add-ins or apps). This is a relatively new phenomenon, and its effects on the application security have not been widely studied. It seems likely that some of the add-ons have lower code quality than the core applications themselves and, thus, may bring in security vulnerabilities. We found that many such add-ons are vulnerable to cross-site scripting (XSS). The attacker can take advantage of the document-sharing and messaging features of the cloud applications to send malicious input to them. The vulnerable add-ons then execute client-side JavaScript from the carefully crafted malicious input. In a major analysis effort, we systematically studied 300 add-ons for three popular application suites, namely Microsoft Office Online, G Suite and Shopify, and discovered a significant percentage of vulnerable add-ons in each marketplace. We present the results of this study, as well as analyze the add-on architectures to understand how the XSS vulnerabilities can be exploited and how the threat can be mitigated.
翻译:云应用添加器是扩展核心应用程序功能的微服务。 许多应用供应商已经为第三方开发商打开了它们的API, 并创建了添加器( 包括添加器或应用程序) 市场。 这是一个相对较新的现象, 它对应用安全的影响尚未广泛研究。 似乎有些添加器的代码质量比核心应用程序本身低, 因而可能带来安全脆弱性。 我们发现许多这类添加器容易被跨站脚本( XSS ) 。 攻击者可以利用云应用的文档共享和传递功能向它们发送恶意输入。 脆弱的添加器随后从精心设计的恶意输入中执行客户端的 JavaScript 。 在一项重大分析工作中, 我们系统研究了三种流行应用套件的300 个添加器, 即微软办公室在线、 G Suite 和 软化, 并发现在每个市场都有相当大比例的脆弱添加器。 我们介绍了这项研究的结果, 并分析了添加的架构, 以了解如何利用 XSS 脆弱性和如何减轻威胁。