Dark Mode
Capec-462 Detail
Cross-Domain Search Timing
Detailed Software Typical Severity: Medium
Parents: 54
Threats: T291
| External ID | Source | Link | Description |
|---|---|---|---|
| CAPEC-462 | capec | https://capec.mitre.org/data/definitions/462.html | |
| CWE-385 | cwe | http://cwe.mitre.org/data/definitions/385.html | |
| CWE-352 | cwe | http://cwe.mitre.org/data/definitions/352.html | |
| CWE-208 | cwe | http://cwe.mitre.org/data/definitions/208.html | |
| REF-399 | reference_from_CAPEC | http://scarybeastsecurity.blogspot.com/2009/12/cross-domain-search-timing.html | Chris Evans, Cross-Domain Search Timing, 2009--12---11 |
Explore
-
Determine service to send cross domain requests to: The adversary first determines which service they will be sending the requests to
Experiment
-
Send and time various cross domain requests: Adversaries will send a variety of cross domain requests to the target, timing the time it takes for the target to respond. Although they won't be able to read the response, the adversary can use the time to infer information about what the service did upon receiving the request.
| Techniques |
|---|
| Using a GET request, leverage the "img" tag in conjunction with "onload() / onerror()" javascript events to time a response |
| Using a POST request, leverage the "iframe" element and use the "onload()" event to time a response |
Exploit
-
Infer information from the response time: After obtaining reponse times to various requests, the adversary will compare these times and infer potentially sensitive information. An example of this could be asking a service to retrieve information and random usernames. If one request took longer to process, it is likely that a user with that username exists, which could be useful knowledge to an adversary.
| Techniques |
|---|
| Compare timing of different requests to infer potentially sensitive information about a target service |
- Ability to issue GET / POST requests cross domainJava Script is enabled in the victim's browserThe victim has an active session with the site from which the attacker would like to receive informationThe victim's site does not protect search functionality with cross site request forgery (CSRF) protection
- Ability to issue GET / POST requests cross domain
| Low |
|---|
| Some knowledge of Java Script |
| Confidentiality |
|---|
| Read Data |
Not present