Secure Development on the Salesforce Platform - Part 2


Published on

In this session, security experts from Salesforce will show you how to avoid common security pitfalls while developing applications using Apex and Visualforce.

This second installment of our secure development series continues development of the simple on-platform app created in part one by examining how vulnerabilities present themselves. After discussing these vulnerabilities and demonstrating their impact, we’ll show how to avoid introducing them in your code, how to review existing code to locate issues, and how to fix them to provide more secure apps.

In this exclusive webinar you’ll learn about:
- Common VisualForce vulnerabilities
- XSS (Cross-site Scripting)
- Open Redirect
- CSRF (Cross-Site Request Forgery)

Table of Contents:

01:19 - Forward Looking Statement
02:24 - Agenda
03:00 - FourZip App Part 2
05:05 - Cross Site Scripting
27:15 - Open Redirect
37:22 - CSRF - Cross-Site Request Forgery
44:06 - Session Summary
45:50 - Live Q&A

Published in: Software
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Secure Development on the Salesforce Platform - Part 2

  1. 1. June 29, 2016 Secure Development on the Salesforce Platform - Part 2
  2. 2. Forward-Looking Statement Statement under the Private Securities Litigation Reform Act of 1995: This presentation may contain forward-looking statements that involve risks, uncertainties, and assumptions. If any such uncertainties materialize or if any of the assumptions proves incorrect, the results of, inc. could differ materially from the results expressed or implied by the forward-looking statements we make. All statements other than statements of historical fact could be deemed forward-looking, including any projections of product or service availability, subscriber growth, earnings, revenues, or other financial items and any statements regarding strategies or plans of management for future operations, statements of belief, any statements concerning new, planned, or upgraded services or technology developments and customer contracts or use of our services. The risks and uncertainties referred to above include – but are not limited to – risks associated with developing and delivering new functionality for our service, new products and services, our new business model, our past operating losses, possible fluctuations in our operating results and rate of growth, interruptions or delays in our Web hosting, breach of our security measures, the outcome of any litigation, risks associated with completed and any possible mergers and acquisitions, the immature market in which we operate, our relatively limited operating history, our ability to expand, retain, and motivate our employees and manage our growth, new releases of our service and successful customer deployment, our limited history reselling products, and utilization and selling to larger enterprise customers. Further information on potential factors that could affect the financial results of, inc. is included in our annual report on Form 10-K for the most recent fiscal year and in our quarterly report on Form 10-Q for the most recent fiscal quarter. These documents and others containing important disclosures are available on the SEC Filings section of the Investor Information section of our Web site. Any unreleased services or features referenced in this or other presentations, press releases or public statements are not currently available and may not be delivered on time or at all. Customers who purchase our services should make the purchase decisions based upon features that are currently available., inc. assumes no obligation and does not intend to update these forward-looking statements.
  3. 3. Go Social! Salesforce Developers Salesforce Developers Salesforce Developers The video will be posted to YouTube & the webinar recap page (same URL as registration).This webinar is being recorded! @salesforcedevs / #forcewebinar
  4. 4. ▪ Don’t wait until the end to ask your question! – Technical support will answer questions starting now. ▪ Respect Q&A etiquette – Please don’t repeat questions. The support team is working their way down the queue. ▪ Stick around for live Q&A at the end – Speakers will tackle more questions at the end, time- allowing. ▪ Head to Developer Forums – More questions? Visit Have Questions?
  5. 5. Agenda 1. Overview of our sample app 2. XSS (Cross-Site Scripting) – Reflected – Stored – DOM 3.Open Redirect 4.CSRF (Cross-Site Request Forgery)
  6. 6. FourZip App Part 2 ▪ Visualforce page to search Accounts –Display relevant information such as revenue and description –Display associated Opportunities ▪ Get zip codes in 12345-1234 format –External API call will be covered in future webinar sessions ▪ New features! –New vulnerabilities!
  7. 7. FourZip Part 2 ▪ What will we develop today? – Search via GET – Display Account description – “Quick Delete” of Opportunities – “Quick Edit” of Opportunity name – Show map via Google Maps – Let’s take a look at the code!
  8. 8. Cross-Site Scripting
  9. 9. What is Cross Site Scripting? XSS is a web vulnerability where an attacker can insert unauthorized JavaScript into a web page viewed by other users  User input is displayed on the page  Poor separation between user input (data) and code  Improper sanitization
  10. 10. 1. The resulting page displays the text “You are searching for: cookies” 2. Inspecting the source code, you will see 1. /search?query=cookies<script>badJavascript()</script> 2. You still see “You are searching for: cookies” 3. Source code now shows User visits XSS example <h1>You are searching for: cookies</h1> <h1>You are searching for: cookies<script>badJavascript<script></h1>
  11. 11. Types of XSS ▪ Reflected - Malicious input is sent to the server and reflected back to the user in the response ▪ Stored/Persistent - Malicious input is permanently stored on a server and reflected back to the user ▪ DOM - Malicious input is reflected back to the user without ever reaching the server. Requires DOM manipulation (javascript) and is more difficult to find
  12. 12. XSS on the Salesforce Platform ▪ Have built-in auto encoding, provided they… - don’t occur within a <style> or <script> tag - don’t occur within an apex tag with escape=”false” attribute ▪ Standard page layout input and outputs are not vulnerable ▪ Provide native encoding functions ▪ Doesn’t mean it’s always safe!
  13. 13. Visualforce Examples ▪ Safe, HTML auto-encoded ▪ Unsafe, escape=”false” <apex:outputText value="{!$CurrentPage.parameters.Name}" /> <div> {!$CurrentPage.parameters.Name} </div> <apex:outputText escape=”false”> {!$CurrentPage.parameters.Name} </apex:outputText>
  14. 14. Visualforce Examples ▪ Unsafe, script (or style) tags ▪ Unsafe, multiple parsing contexts <script> var x = ‘{!$CurrentPage.parameters.Name}’; </script> <div onclick=”doSomething(‘{!$CurrentPage.parameters.Name}’)”> Click Me! </div>
  15. 15. Reflected XSS demo escape=”false” attribute in apex outputText
  16. 16.  <apex:outputText escape="false" value="{!HTMLENCODE(userInput)}" />  <script> var x = “{!JSENCODE(userInput)}”</script>  <div onclick=”doThis(‘{!JSINHTMLENCODE(userInput)}’)” />  <a href=’{!URLENCODE(userInputURL)}’ /> Native Encoding Examples Use where standard platform encoding does not apply  Javascript context  style context  URL context  combination of Javascript and HTML
  17. 17. Reflected XSS Fix Let’s fix the vulnerability and demo the fix
  18. 18. Stored XSS demo Javascript in Account description
  19. 19. Stored XSS Fix
  20. 20. DOM XSS demo Javascript update Opportunity name using innerHTML
  21. 21. DOM XSS Fix
  22. 22. Best Practices for XSS ▪ Never trust user input ▪ Be aware of context! ▪ Use native encoding functions –HTMLENCODE –JSENCODE –JSINHTMLENCODE –URLENCODE
  23. 23. Open Redirect
  24. 24. What is open redirect? ▪ When an application performs an automatic redirect to a URL contained within a URL parameter without any validation. ▪ Commonly used in phishing attacks to get unsuspecting users to malicious websites.
  25. 25. What is open redirect? ▪ If startURL is used after login to automatically send the user to a start page, the user could end up at ... ▪ The above example appears obvious, but attackers are often skilled at obfuscating their intentions: f%65%76%69%6c%2e%6f%72%67
  26. 26. What is the risk? Imagine the page at looks like a login page In some cases (client-side redirect), an open redirect can also be escalated to an XSS with a javascript:… URL
  27. 27. Open Redirects on the Platform ▪ Wherever possible, platform protects from open redirects. ▪ Predefined URL parameters are validated to ensure they do not redirect to an external domain: – retURL – saveURL – cancelURL ▪ Due to the extensibility and flexibility of the Visualforce and Apex programming languages, it is possible to create open redirects in your custom code.
  28. 28. Open Redirects on the Platform ▪ The redirect parameter is passed directly into the pagereference with setRedirect(true). ▪ When redirect is returned, the Visualforce page will redirect to this URL with no validation. ▪ This flexibility is sometimes necessary, but it also comes with a responsibility for secure coding! PageReference redirect = new PageReference(ApexPages.currentPage().getParameters().get('url' )); redirect.setRedirect(true); return redirect;
  29. 29. Open Redirect demo
  30. 30. Open Redirect Mitigations 1. Do not use URL parameters for redirection. If you can hardcode the redirect information, there is nothing for an attacker to leverage. 2. If parameter based redirection is needed, force relative URLs such as "/home/home.jsp” – Hardcode the domain in code/setting. – If redirecting to the same domain be careful about double slash (//) • Ex: “//” though looks like relative, it will redirect to
  31. 31. Open Redirect Mitigations 3. If relative URLs are too restrictive, a whitelisting approach can be employed to check the provided redirect parameter against a list of known good hosts. – If using a regular expression to fetch the domain, make sure to check for proper domain format • Eg: will redirect to and not Salesforce
  32. 32. Open Redirect Mitigations 4. Map out specific endpoints (Relative or Absolute URL) with keys. Pass the key instead of URL as a parameter index URL 1 '/home/home.jsp' 2 '' …
  33. 33. Open Redirect Fix Let’s fix the vulnerability and demo the fix
  34. 34. CSRF Cross-Site Request Forgery
  35. 35. A nice browser feature that can be exploited maliciously ▪ You don’t need to re-authenticate to google every time you open a new tab. ▪ Cookies scoped for a domain are automatically sent along any new requests to that domain Cross-site Request Forgery What is CSRF?
  36. 36. What is CSRF? Vulnerable Web applications let an attacker force a victim to make a request with parameters supplied by the attacker ▪ Cookies (including session cookie) will be sent along ▪ Only requests performing Create, Update or Delete actions are vulnerable – “Same Origin Policy” protection mechanism in the browser prevents the attacker to view the result of the malicious request <img src=""/>
  37. 37. What is CSRF? User / login request visit malicious page response containing malicious redirect
  38. 38. CSRF Prevention ▪ State changing web operations should be accompanied by a secret that isn’t sent automatically like Cookies. ▪ These secrets are called CSRF tokens. ▪ CSRF tokens are typically included in the DOM or in custom HTTP headers ▪ The tokens should be unique per user per session. The server should validate the token before each state changing request
  39. 39. Salesforce Platform Protections ▪ All POST requests are protected against CSRF by default on the platform. ▪ Every time an apex form is loaded, the platform includes a _CONFIRMATIONTOKEN in the form and the token is validated on submit. ▪ Make sure no state changing operations are performed on page load
  40. 40. CSRF demo
  41. 41. CSRF Fix ▪ Do not perform state changing operations on onload of a page – action function in visualforce page – Lightning: no state changing operations in client-side controller doInit() or methods that it calls on the server side ▪ Always perform state changing operation as a form action – Eg: commandbutton
  42. 42. CSRF Fix Let’s fix the vulnerability and demo the fix
  43. 43. ▪ XSS – 3 types of Cross-Site Scripting (reflected, stored and DOM) – always sanitize output when originated from user – make note of context and use appropriate encoding ▪ Open Redirect – Perform checks before redirecting the user from a URL parameter ▪ CSRF - Do not perform state changing operation on load of the page Developer practices for respecting authorization model Summary
  44. 44. Additional Resources Secure Coding Guidelines Secure Coding - XSS Secure Coding - Open Redirect Secure Coding - CSRF y Salesforce Developer Security Forum
  45. 45. Survey Your feedback is crucial to the success of our webinar programs. Thank you!
  46. 46. Q & A Share Your Feedback: Join the conversation: @salesforcedevs @SecureCloudDev
  47. 47. Thank You