A groundbreaking study from Tsinghua University and Zhongguancun Laboratory has uncovered critical vulnerabilities in modern web infrastructure, revealing that HTTP/2 server push and Signed HTTP Exchange (SXG) features can be exploited to bypass the Same-Origin Policy (SOP)—a cornerstone of web security.
The SOP is designed to prevent malicious scripts on one website from accessing sensitive data on another, but researchers have found that recent changes in how browsers interpret “origin” versus “authority” have created dangerous loopholes.
Traditionally, browsers define an “origin” as a unique tuple of URI scheme, host, and port. However, HTTP/2 and HTTP/3 protocols allow any domain listed in the SubjectAlternativeName (SAN) field of a TLS certificate to be recognized as an “authority.”
This means that if a certificate is shared among multiple domains—often managed by different entities—any of those domains can be treated as the same authority by the browser when using HTTP/2 server push or SXG.
Attackers can exploit this by acquiring or hijacking a shared certificate and then pushing malicious resources that the browser will accept as legitimate, even if they originate from a different domain.
The research introduces two powerful new attack techniques:
:authority pseudo-header. // Example: Using Node.js HTTP/2 to set :authority stream.pushStream({ ':path': '/script.js', ':authority': 'victim.com' }, (err, pushStream) => { pushStream.respond({ ':status': 200, 'content-type': 'application/javascript' }); pushStream.end('alert(document.cookie);'); });request-url and validity-url headers. SXG Headers: request-url: https://victim.com/ validity-url: https://victim.com/validity cert-url: https://attacker.com/cert.cborBoth attacks are “off-path,” meaning the attacker does not need to intercept network traffic; they only need to lure users to their site (e.g., via phishing or malicious iframes), making the threat highly scalable and practical.
The study’s large-scale measurements reveal that these vulnerabilities are not theoretical—they affect a significant portion of the web ecosystem:
Researchers propose several urgent mitigations:
The team has responsibly disclosed these findings to major vendors, including Microsoft, Google, Huawei, and Baidu, prompting acknowledgment and initial mitigation efforts.
This research exposes a systemic flaw in the intersection of modern web protocols and certificate management, demonstrating that even sites with rigorous security practices can be compromised if they share certificates with less secure domains.
The industry is urged to act swiftly to close these loopholes before widespread exploitation occurs.
Find this News Interesting! Follow us on Google News, LinkedIn, & X to Get Instant Updates!
Any Priya is a cybersecurity reporter at GBHackers On Security, specializing in cyber attacks, dark web monitoring, data breaches, vulnerabilities, and malware. She delivers in-depth analysis on emerging threats and digital security trends.