October 28, 2024 By Jonathan Reed 3 min read

CISA and the FBI are increasingly focusing on proactive cybersecurity and cyber resilience measures. Conjointly, the agencies recently released a new Secure by Design alert aimed at eliminating cross-site Scripting (XSS) vulnerabilities, which have long been exploited to compromise both data and user trust.

Cross-site scripting vulnerabilities occur when a web application improperly handles user input, allowing attackers to inject malicious scripts into web pages that are then executed by unsuspecting users. These vulnerabilities are dangerous because they don’t attack the application itself but exploit user trust in a legitimate website.

Understanding cross-site scripting vulnerabilities

When an attacker successfully exploits an XSS vulnerability, they can hijack user sessions, steal sensitive information such as login credentials or even alter website content to trick users into providing personal data. For instance, XSS can be used to install malware on a user’s device, display phishing attack forms or redirect users to malicious websites.

A prime example of this is the 2024 data breach orchestrated by the hacker group “ResumeLooters.” By leveraging both SQL injection and XSS vulnerabilities, the group compromised over 65 job-listing and retail sites, stealing the personal information of over 2 million job seekers. The attackers injected malicious scripts into legitimate sites, which allowed them to harvest names, email addresses, phone numbers and more.

Another well-known XSS exploitation attack includes the 2019 breach of Fortnite. In this incident, intruders used a retired web page with an XSS vulnerability to target over 200 million users. The breach allowed hackers to steal in-game currency and eavesdrop on player conversations.

The secure-by-design approach

CISA’s latest secure-by-design alert emphasizes proactive defense mechanisms for eliminating XSS vulnerabilities. The agency urges developers and software manufacturers to adopt secure coding practices. At the core of this approach is the idea of building security into the design and architecture of applications from the ground up rather than as an afterthought.

The alert provides developers with a guide on how to prevent XSS vulnerabilities through techniques such as input validation, output encoding and the use of content security policies (CSP). These principles align with the broader secure-by-design framework, which advocates for secure product development that minimizes exploitable weaknesses.

Secure-by-design alerts trend

This latest alert on XSS vulnerabilities follows a series of previous secure-by-design recommendations from CISA, each tackling a specific category of vulnerabilities. These include alerts on SQL injection, OS command injection, directory traversal and security design improvements for SOHO devices. Each of these alerts addresses the importance of secure coding practices, emphasizing input validation, safe handling of user data and proactive vulnerability management.

For example, the alert on SQL injection vulnerabilities highlights the risk of improperly sanitized database queries, which can allow attackers to execute arbitrary commands on a database. Meanwhile, the OS command injection alert warns about attackers using vulnerable input fields to execute unauthorized operating system commands, potentially leading to full system compromise.

In all these alerts, CISA stresses the need for organizations to adhere to secure-by-design principles. These include comprehensive code reviews, automated testing and incorporating security into the software development lifecycle (also known as DevSecOps). The goal is to shift cyber efforts from reactive defense to proactive protection, ensuring that vulnerabilities like XSS, SQL injection and directory traversal are identified and remediated before they can be exploited.

Design with security in mind

By following CISA’s guidelines on eliminating XSS vulnerabilities and adopting secure coding practices, developers can significantly reduce the risk of exploitation, protect user data and ensure the long-term integrity of their applications. With this latest alert, CISA and the FBI are reminding us that security should never be an afterthought — it must be an integral part of the development process from day one.

More from News

Insights from CISA’s red team findings and the evolution of EDR

3 min read - A recent CISA red team assessment of a United States critical infrastructure organization revealed systemic vulnerabilities in modern cybersecurity. Among the most pressing issues was a heavy reliance on endpoint detection and response (EDR) solutions, paired with a lack of network-level protections. These findings underscore a familiar challenge: Why do organizations place so much trust in EDR alone, and what must change to address its shortcomings? EDR’s double-edged sword A cornerstone of cyber resilience strategy, EDR solutions are prized for…

DHS: Guidance for AI in critical infrastructure

4 min read - At the end of 2024, we've reached a moment in artificial intelligence (AI) development where government involvement can help shape the trajectory of this extremely pervasive technology. In the most recent example, the Department of Homeland Security (DHS) has released what it calls a "first-of-its-kind" framework designed to ensure the safe and secure deployment of AI across critical infrastructure sectors. The framework could be the catalyst for what could become a comprehensive set of regulatory measures, as it brings into…

Apple Intelligence raises stakes in privacy and security

3 min read - Apple’s latest innovation, Apple Intelligence, is redefining what’s possible in consumer technology. Integrated into iOS 18.1, iPadOS 18.1 and macOS Sequoia 15.1, this milestone puts advanced artificial intelligence (AI) tools directly in the hands of millions. Beyond being a breakthrough for personal convenience, it represents an enormous economic opportunity. But the bold step into accessible AI comes with critical questions about security, privacy and the risks of real-time decision-making in users’ most private digital spaces. AI in every pocket Having…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today