Security Chasms of WASM August 3, 2018 – Version 1.0

Security Chasms of WASM August 3, 2018 – Version 1.0

NCC Group Whitepaper Security Chasms of WASM August 3, 2018 – Version 1.0 Prepared by Brian McFadden Tyler Lukasiewicz Jeff Dileo Justin Engler Abstract WebAssembly is a new technology that allows web developers to run native C/C++ on a webpage with near-native performance. This paper provides a basic introduc- tion to WebAssembly and examines the security risks that a developer may take on by using it. We cover several examples exploring the theoretical security implications of WebAssembly. We also cover Emscripten, which is currently the most popular Web- Assembly compiler toolchain. Our assessment of Emscripten includes its implemen- tation of compiler-and-linker-level exploit mitigations as well as the internal harden- ing of its libc implementation, and how its augmentation of WASM introduces new attack vectors and methods of exploitation. We also provide examples of memory corruption exploits in the Wasm environment. Under certain circumstances, these exploits could lead to to hijacking control flow or even executing arbitrary JavaScript within the context of the web page. Finally, we provide a basic outline of best prac- tices and security considerations for developers wishing to integrate WebAssembly into their product. Table of Contents 1 Introduction . 3 2 The WebAssembly Platform . 4 2.1 WebAssembly in a nutshell ............................................................ 4 2.2 Functions In WebAssembly ............................................................ 4 2.3 The Linear Memory Model ............................................................ 5 2.4 Function Pointers in WebAssembly ..................................................... 5 3 Emscripten and practical exploit scenarios . 7 3.1 Workflow overview ................................................................... 7 3.2 Compiler/Library level exploit mitigations ............................................... 7 3.3 Possible Vulnerabilities ................................................................ 8 4 New Techniques . 10 4.1 Buffer Overflow -> XXS ............................................................... 10 4.2 Indirect function calls -> XSS .......................................................... 10 4.3 Server-side Remote Code Execution ................................................... 17 5 Conclusion . 18 5.1 Emscripten Development Team ........................................................ 18 5.2 Emscripten Developers ............................................................... 18 5.3 Further Research ..................................................................... 19 2 | Security Chasms of WASM NCC Group 1 Introduction WebAssembly is a new technology being developed by a W3C Community Group. WebAssembly allows developers to take their native C/C++ code to the browser, where it can be run with near-native performance by the end user. WebAssembly is already widely supported in the latest versions of all major browsers and is currently being implemented in many web based services. Notable examples include 3D model rendering, interface design, and visual data processing. WebAssembly is still in the very early stages of its development and developers will likely be finding new use cases well into the future. Therefore, security researchers and developers should clearly understand the concepts on which this new technology is built and how they hold up from a security perspective. After all, native code is often associated with crippling exploits such as Shellshock and Heartbleed, ROP chains, format string vulnerabilities, and a long list of exploits, their mitigations, and the techniques used to circumvent those mitigations. With images of 0x9090909090 in our heads, we may even become nervous (or excited) about a new world of native exploits on the browser. Our goal is to provide a basic introduction to WebAssembly and examine the actual security risks that a developer may take on by using it. We will cover the low-level semantics of WebAssembly, including the Javascript API, the linear memory model, and the use of tables as function pointers. We will cover several examples that explore the theoretical security implications of WebAssembly. We will also cover Emscripten, which is currently the most popular WebAssembly compiler toolchain. Our assessment of Emscripten will include its implementation of compiler-and-linker-level exploit mitigations as well as the internal hardening of its libc implementation, and how it’s augmentation of WebAssembly introduces new attack vectors and methods of exploitation. As part of this we will also provide examples of memory corruption exploits in the WebAssembly environment. Under certain circumstances, these exploits may lead to hijacking control flow or even executing arbitrary JavaScript within the context of a web page. We will provide a basic outline of best practices and security considerations for developers wishing to integrate WebAssembly into their product. We will also lay out long term goals for Emscripten, which could mitigate many of the vulnerabilities discussed in this paper as well as future vulnerabilities. Finally, we discuss future research opportunities that will augment the work done in this paper. 3 | Security Chasms of WASM NCC Group 2 The WebAssembly Platform 2.1 WebAssembly in a nutshell WebAssembly (Wasm) is a machine language (It probably should have been named ”WebBytecode”) de- signed to run on a limited virtual machine (think JVM, not VMware). This virtual machine can then be embedded into other programs (especially browsers). The Wasm virtual machine is carefully isolated from the rest of the program or system, and is only able to communicate with its host program via specially enumerated imports and exports. Most programs will not be written directly by the author in Wasm, or even in one of its more user-friendly text formats. Instead, the goal is that other languages can be compiled into Wasm. Wasm is Turing complete and supports many of the features you’d expect from a low-level language. 2.2 Functions In WebAssembly A WebAssembly binary is a sequence of operation codes (opcodes). In x86 world, these opcodes are represented by assembly code so that they can be read and understood by humans. In the WebAssembly world, this human readable representation is called the text format of WebAssembly. In the text format, WebAssembly code is represented by S-expressions. By using the official WebAssembly Binary Toolkit, S- expressions can be compiled directly into WebAssembly and vise versa. Other text representations are also available, but we’ll stick to S-expressions for the rest of this paper. The fundamental unit of code in WebAssembly is a Module.A WebAssembly.Module object contains state- less WebAssembly code that can be efficiently shared with Workers, cached in IndexedDB and instantiated multiple times. WebAssembly binaries, which usually have the file extension .wasm, are fetched by the browser and compiled into a Module. The WebAssembly JavaScript API wraps exported WebAssembly code with JavaScript functions that can be called like any other JavaScript function. Let’s take a look at a function in WebAssembly. 1 (module 2 (func $add (param $x i32)(param $y i32)(result i32) 3 get_local $x 4 get_local $y 5 i32.add 6 ) 7 (export "add" (func $add)) 8 ) WebAssembly is, in its simplest form, is a stack machine. All of its arithmetic operations work by popping values off of the top of the stack, performing some operation on them, and pushing the result onto the top of the stack. The return value of a function is whatever value is on the top of the stack when that function goes out of scope. Functions defined in WebAssembly can be exported and after the WebAssembly module has been compiled and instantiated, exported functions can be referenced and called from JavaScript. The above module declares a function that takes two parameters, adds them together, and returns the result. This function is then exported with the name ‘‘add’’. Now that we have an exported WebAssembly function, we need to compile it into a binary, and load it into a module that can be used by JavaScript. We can use the command line utility wat2wasm, from the WebAssembly Binary Toolkit to create a .wasm file. We can then use the following function to fetch thefile and return an instance. An instance is a single running copy of a module. 1 function fetchAndInstantiate("/add.wasm", importObject){ 2 return fetch(url).then(response => response.arrayBuffer() 4 | Security Chasms of WASM NCC Group 3 ).then(bytes => 4 WebAssembly.instantiate(bytes, importObject) 5 ).then(results => 6 results.instance 7 ); 8 } 2.3 The Linear Memory Model In the low-level memory model of WebAssembly, memory is represented as a contiguous range of untyped bytes called Linear Memory. This memory can be allocated either by JavaScript via the WebAssembly.Memory method or by WebAssembly. The amount of memory allocated is decided by the developer, with the smallest unit of memory being a page (64 KB). Memory is also dynamic, so it can be expanded if necessary via the memory.grow method. Figure 1: WASM instructions access linear memory and functions (from function tables) via indices. The true addresses of the Linear Memory and the data within it are hidden from WebAssembly. In other words, WebAssembly cannot directly access the contents of memory. Instead, WebAssembly will request data at an index of the linear memory, and the browser takes care of figuring out the actual address. This is part of the reason why WebAssembly

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    19 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us