Visible to the public Dangers and Prevalence of Unprotected Web Fonts

TitleDangers and Prevalence of Unprotected Web Fonts
Publication TypeConference Paper
Year of Publication2019
AuthorsMueller, Tobias, Klotzsche, Daniel, Herrmann, Dominik, Federrath, Hannes
Conference Name2019 International Conference on Software, Telecommunications and Computer Networks (SoftCOM)
Date PublishedSept. 2019
PublisherIEEE
ISBN Number978-953-290-088-0
Keywordsattack surface, CDNs, composability, compositionality, cryptographic fingerprints verification, cryptography, fingerprint identification, fonts, Google, Human Behavior, human factors, integrity, Internet, malicious font, malicious script, maliciously modified version, Metrics, online front-ends, pubcrawl, resilience, Resiliency, security-conscious users, software package, software packages, software vendors, SRI support, stylesheets, subresource integrity mechanism, unprotected Web fonts, web, Web Browser Security, Web sites
Abstract

Most Web sites rely on resources hosted by third parties such as CDNs. Third parties may be compromised or coerced into misbehaving, e.g. delivering a malicious script or stylesheet. Unexpected changes to resources hosted by third parties can be detected with the Subresource Integrity (SRI) mechanism. The focus of SRI is on scripts and stylesheets. Web fonts cannot be secured with that mechanism under all circumstances. The first contribution of this paper is to evaluates the potential for attacks using malicious fonts. With an instrumented browser we find that (1) more than 95% of the top 50,000 Web sites of the Tranco top list rely on resources hosted by third parties and that (2) only a small fraction employs SRI. Moreover, we find that more than 60% of the sites in our sample use fonts hosted by third parties, most of which are being served by Google. The second contribution of the paper is a proof of concept of a malicious font as well as a tool for automatically generating such a font, which targets security-conscious users who are used to verifying cryptographic fingerprints. Software vendors publish such fingerprints along with their software packages to allow users to verify their integrity. Due to incomplete SRI support for Web fonts, a third party could force a browser to load our malicious font. The font targets a particular cryptographic fingerprint and renders it as a desired different fingerprint. This allows attackers to fool users into believing that they download a genuine software package although they are actually downloading a maliciously modified version. Finally, we propose countermeasures that could be deployed to protect the integrity of Web fonts.

URLhttps://ieeexplore.ieee.org/document/8903683
DOI10.23919/SOFTCOM.2019.8903683
Citation Keymueller_dangers_2019