Skip to main navigation Skip to search Skip to main content

Abusing locality in shared web hosting

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

8 Scopus citations

Abstract

The increasing popularity of the World Wide Web has made more and more individuals and companies to identify the need of acquiring a Web presence. The most common way of acquiring such a presence is through Web hosting companies and the most popular hosting solution is shared Web hosting. In this paper we investigate the workings of shared Web hosting and we point out the potential lack of session isolation between domains hosted on the same physical server. We present two novel server-side attacks against session storage which target the logic of a Web application instead of specific logged-in users. Due to the lack of isolation, an attacker with a domain under his control can force arbitrary sessions to co-located Web applications as well as inspect and edit the contents of their existing active sessions. Using these techniques, an attacker can circumvent authentication mechanisms, elevate his privileges, steal private information and conduct attacks that would be otherwise impossible. Finally, we test the applicability of our attacks against common open-source software and evaluate their effectiveness in the presence of generic server-side countermeasures.

Original languageEnglish
Title of host publicationProceedings of the 4th Workshop on European Workshop on System Security, EUROSEC'11
PublisherAssociation for Computing Machinery
ISBN (Print)9781450306133
DOIs
StatePublished - Apr 10 2011

Publication series

NameProceedings of the 4th Workshop on European Workshop on System Security, EUROSEC'11

Keywords

  • Serverside attacks
  • Session identifiers
  • Session storage
  • Web applications

Fingerprint

Dive into the research topics of 'Abusing locality in shared web hosting'. Together they form a unique fingerprint.

Cite this