All Your Clouds are Be­long to us – Se­cu­ri­ty Ana­ly­sis of Cloud Ma­nage­ment In­ter­faces

Juraj So­mo­rovs­ky, Mario Hei­de­rich, Meiko Jen­sen, Jörg Schwenk, Nils Grusch­ka, Luigi Lo Ia­co­no

In Pro­cee­dings of the ACM Cloud Com­pu­ting Se­cu­ri­ty Work­shop (CCSW), 2011.


Ab­stract

Cloud Com­pu­ting re­sour­ces are hand­led through con­trol in­ter­faces. It is through these in­ter­faces that the new ma­chi­ne ima­ges can be added, exis­ting ones can be mo­di­fied, and in­stan­ces can be star­ted or cea­sed. Ef­fec­tive­ly, a suc­cess­ful at­tack on a Cloud con­trol in­ter­face grants the at­ta­cker a com­ple­te power over the victim’s ac­count, with all the stored data in­clu­ded.

In this paper, we pro­vi­de a se­cu­ri­ty ana­ly­sis per­tai­ning to the con­trol in­ter­faces of a large Pu­blic Cloud (Ama­zon) and a wi­de­ly used Pri­va­te Cloud soft­ware (Eu­ca­lyp­tus). Our re­se­arch re­sults are alar­ming: in re­gards to the Ama­zon EC2 and S3 ser­vices, the con­trol in­ter­faces could be com­pro­mi­sed via the novel si­gna­tu­re wrap­ping and ad­van­ced XSS tech­ni­ques. Si­mi­lar­ly, the Eu­ca­lyp­tus con­trol in­ter­faces were vul­nerable to clas­si­cal si­gna­tu­re wrap­ping at­tacks, and had ne­ar­ly no pro­tec­tion against XSS. As a fol­low up to those dis­co­ve­ries, we ad­di­tio­nal­ly de­scri­be the coun­ter­me­a­su­res against these at­tacks, as well as in­tro­du­ce a novel ”black box” ana­ly­sis me­tho­do­lo­gy for pu­blic Cloud in­ter­faces.

The di­stri­bu­ted do­cu­ment has been pro­vi­ded by the cont­ri­bu­ting aut­hors as a means to en­su­re ti­me­ly dis­se­mi­na­ti­on of scho­lar­ly and tech­ni­cal work on a non­com­mer­ci­al basis. Co­py­right and all rights the­r­ein are main­tained by the aut­hors or by other co­py­right hol­ders, not­wi­th­stan­ding that they have of­fe­red their works here elec­tro­ni­cal­ly. It is un­ders­tood that all per­sons co­py­ing this in­for­ma­ti­on will ad­he­re to the terms and cons­traints in­vo­ked by each aut­hor's co­py­right. These works may not be re­pos­ted wi­thout the ex­pli­cit per­mis­si­on of the co­py­right hol­der.

[pdf]

Tags: Cloud Se­cu­ri­ty, XML Si­gna­tu­re Wrap­ping, XSS