October 28, 2024 By Jonathan Reed 3 min read

CISA and the FBI are increasingly focusing on proactive cybersecurity and cyber resilience measures. Conjointly, the agencies recently released a new Secure by Design alert aimed at eliminating cross-site Scripting (XSS) vulnerabilities, which have long been exploited to compromise both data and user trust.

Cross-site scripting vulnerabilities occur when a web application improperly handles user input, allowing attackers to inject malicious scripts into web pages that are then executed by unsuspecting users. These vulnerabilities are dangerous because they don’t attack the application itself but exploit user trust in a legitimate website.

Understanding cross-site scripting vulnerabilities

When an attacker successfully exploits an XSS vulnerability, they can hijack user sessions, steal sensitive information such as login credentials or even alter website content to trick users into providing personal data. For instance, XSS can be used to install malware on a user’s device, display phishing attack forms or redirect users to malicious websites.

A prime example of this is the 2024 data breach orchestrated by the hacker group “ResumeLooters.” By leveraging both SQL injection and XSS vulnerabilities, the group compromised over 65 job-listing and retail sites, stealing the personal information of over 2 million job seekers. The attackers injected malicious scripts into legitimate sites, which allowed them to harvest names, email addresses, phone numbers and more.

Another well-known XSS exploitation attack includes the 2019 breach of Fortnite. In this incident, intruders used a retired web page with an XSS vulnerability to target over 200 million users. The breach allowed hackers to steal in-game currency and eavesdrop on player conversations.

The secure-by-design approach

CISA’s latest secure-by-design alert emphasizes proactive defense mechanisms for eliminating XSS vulnerabilities. The agency urges developers and software manufacturers to adopt secure coding practices. At the core of this approach is the idea of building security into the design and architecture of applications from the ground up rather than as an afterthought.

The alert provides developers with a guide on how to prevent XSS vulnerabilities through techniques such as input validation, output encoding and the use of content security policies (CSP). These principles align with the broader secure-by-design framework, which advocates for secure product development that minimizes exploitable weaknesses.

Secure-by-design alerts trend

This latest alert on XSS vulnerabilities follows a series of previous secure-by-design recommendations from CISA, each tackling a specific category of vulnerabilities. These include alerts on SQL injection, OS command injection, directory traversal and security design improvements for SOHO devices. Each of these alerts addresses the importance of secure coding practices, emphasizing input validation, safe handling of user data and proactive vulnerability management.

For example, the alert on SQL injection vulnerabilities highlights the risk of improperly sanitized database queries, which can allow attackers to execute arbitrary commands on a database. Meanwhile, the OS command injection alert warns about attackers using vulnerable input fields to execute unauthorized operating system commands, potentially leading to full system compromise.

In all these alerts, CISA stresses the need for organizations to adhere to secure-by-design principles. These include comprehensive code reviews, automated testing and incorporating security into the software development lifecycle (also known as DevSecOps). The goal is to shift cyber efforts from reactive defense to proactive protection, ensuring that vulnerabilities like XSS, SQL injection and directory traversal are identified and remediated before they can be exploited.

Design with security in mind

By following CISA’s guidelines on eliminating XSS vulnerabilities and adopting secure coding practices, developers can significantly reduce the risk of exploitation, protect user data and ensure the long-term integrity of their applications. With this latest alert, CISA and the FBI are reminding us that security should never be an afterthought — it must be an integral part of the development process from day one.

More from News

FYSA – Adobe Cold Fusion Path Traversal Vulnerability

2 min read - Summary Adobe has released a security bulletin (APSB24-107) addressing an arbitrary file system read vulnerability in ColdFusion, a web application server. The vulnerability, identified as CVE-2024-53961, can be exploited to read arbitrary files on the system, potentially leading to unauthorized access and data exposure. Threat Topography Threat Type: Arbitrary File System Read Industries Impacted: Technology, Software, and Web Development Geolocation: Global Environment Impact: Web servers running ColdFusion 2021 and 2023 are vulnerable Overview X-Force Incident Command is monitoring the disclosure…

Research finds 56% increase in active ransomware groups

4 min read - Any good news is welcomed when evaluating cyber crime trends year-over-year. Over the last two years, IBM’s Threat Index Reports have provided some minor reprieve in this area by showing a gradual decline in the prevalence of ransomware attacks — now accounting for only 17% of all cybersecurity incidents compared to 21% in 2021. Unfortunately, it’s too early to know if this trendline will continue. A recent report released by Searchlight Cyber shows that there has been a 56% increase in…

Cyberattack on American Water: A warning to critical infrastructure

3 min read - American Water, the largest publicly traded United States water and wastewater utility, recently experienced a cybersecurity incident that forced the company to disconnect key systems, including its customer billing platform. As the company’s investigation continues, there are growing concerns about the vulnerabilities that persist in the water sector, which has increasingly become a target for cyberattacks. The breach is a stark reminder of the critical infrastructure risks that have long plagued the industry. While the water utility has confirmed that…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today