Bypassing Multi-Layer Browser Isolation & AV Controls Through Gateway Path Mismanagement
嗯,用户让我帮忙总结一篇文章,控制在100字以内,而且不需要用特定的开头。首先,我得通读文章,理解主要内容。这篇文章讲的是浏览器隔离平台在企业环境中的应用,用来保护用户免受恶意网站和文件的威胁。他们使用容器化远程浏览器、网关代理和多个杀毒引擎来阻止有害文件到达终端。 然后,作者在安全评估中发现了一个问题:网关层有一个逻辑漏洞,导致可以绕过安全控制。具体来说,网关暴露了内部目录结构,并且没有对路径进行足够的规范化和清理,结果变成了一个轻量级的文件服务器。攻击者可以通过操控路径参数访问下载目录,获取恶意文件,从而绕过了多引擎杀毒扫描。 文章还分析了漏洞的原因:直接暴露内部路径、启用目录列表以及静态路由缺少授权。这些因素导致了威胁模型的崩溃,隔离保证被削弱。厂商虽然已经知道这个问题,但没有修复,并且漏洞存在于多个版本中。 总结一下,文章揭示了浏览器隔离技术在实现上的潜在风险,特别是网关层的配置问题可能破坏整体安全性。因此,在实施这类技术时,必须全面审查各个层次的安全性。 现在要控制在100字以内,直接描述文章内容。我需要抓住关键点:浏览器隔离平台用于保护企业环境,但因网关层的逻辑漏洞导致恶意文件绕过扫描;分析了漏洞原因及其影响;强调正确实施的重要性。 </think> 文章描述了一种基于容器化远程浏览器和多引擎杀毒的浏览器隔离技术及其安全漏洞。该技术本应通过网关层过滤和扫描恶意文件来保护用户,但在实际评估中发现,由于网关层对路径处理不当,攻击者可以绕过多引擎杀毒扫描,直接访问浏览器容器中的下载目录,获取恶意文件。这一漏洞凸显了正确实施安全措施的重要性,尤其是在容器隔离和网关配置方面。 2025-12-15 08:41:40 Author: infosecwriteups.com(查看原文) 阅读量:9 收藏

Aydin Naserifard

Image generated by deepai

Introduction

Browser-isolation platforms are increasingly deployed in enterprise environments to protect users from malicious websites, phishing payloads, and file-based threats.
Many modern solutions combine containerized remote browsers, gateway proxies, and multiple antivirus engines to ensure that potentially harmful files are blocked before reaching the endpoint.

Press enter or click to view image in full size

Versioning for the Multi-AV Scanner Feature

During a recent authorized security assessment, I analyzed a browser-isolation product that used a multi-AV pipeline and container-based rendering to prevent the download of malicious files. Although the core concept was robust, a subtle logic flaw in the gateway layer allowed me to bypass these security controls entirely. This write-up walks through the root causes of the issue, why the architecture failed, and how a small oversight in path handling undermined the platform’s protection model.

How the Platform Was Supposed to Work

The solution used a standard browser-isolation workflow:

  1. A new container is spawned for each browsing session.
  2. The user never interacts with the real internet directly; instead, they see a VNC-like interface inside an iframe.
  3. All downloads are passed through:
  • URL filtering
  • multi-engine antivirus scanning
  • sandbox inspection

4. If a file is considered malicious, the download is blocked before it can reach the user.

At a high level, this is a secure and well-structured approach.

The Architectural Weak Spot: The Gateway Layer

Each browsing session generates an iframe URL similar to:

https://gateway/<container-id>/<session-id>/vnc.html?path=<container-id>/<session-id>/websockify&cursor=false&resize=remote&clipboard_up=true&clipboard_down=true&clipboard_seamless=true&toggle_control_panel=false

This link points to the remote browser interface running inside the container.

However, during the assessment, it became clear that the gateway was:

exposing internal directory structures

  • accepting user-controlled path parameters
  • failing to enforce any meaningful path normalization or sanitization

As a result, the gateway unintentionally behaved like a lightweight file server.

What Actually Happened Inside the Container

Although the product blocked malicious file downloads at the gateway’s inspection pipeline, the browser inside the isolated container did download the files before they were scanned.

Normally, this should not be a problem, those downloads should remain sealed inside the container’s filesystem.

Get Aydin Naserifard’s stories in your inbox

Join Medium for free to get updates from this writer.

However…

The gateway was exposing additional directories beyond the intended VNC interface, including:

  • the browser’s default profile directory
  • its internal cache
  • and most importantly, its download folder

This made it possible to access files after the browser had downloaded them but before the security layers could enforce blocking.

How I Bypassed the Multi-AV Controls

By manipulating the iframe’s path parameter and browsing to adjacent directories within the returned container structure, I could:

  • reach the browser’s download directory
  • retrieve any file the remote browser had already stored
  • access files the AV pipeline had intended to block
  • fully bypass the product’s intended threat-prevention controls

This was not an antivirus evasion. It was a gateway-level path exposure vulnerability.

Even with strong isolation at the container level, the gateway’s mismanagement of paths inadvertently reopened access to files that were supposed to remain sealed inside the session.

Press enter or click to view image in full size

Multi-Av feature doesn't allow to download mimikatz.exe (malicious file)

Press enter or click to view image in full size

Directory Listing

Press enter or click to view image in full size

Download any malicious file

Why This Happened

1. Direct Exposure of Internal Paths
The gateway directly exposed the container/session path (‘/<container-id>/<session-id>/’) as a browsable directory. By removing the VNC-specific query parameters, the underlying folder became accessible over HTTP.

2. Directory Listing Enabled
With directory indexing turned on, the gateway returned a full listing of files and subdirectories under the session path, including browser profile and download folders.

3. Missing Authorization on Static Routes
Access to these paths did not require any additional authorization beyond the initial session, effectively turning the gateway into a file server for everything inside the browser container.

Security Impact

This vulnerability fundamentally broke the product’s threat model:

  • multi-engine AV scanning became irrelevant
  • harmful files became accessible through the gateway
  • isolation guarantees were weakened
  • user-level containment leaked into the web layer

Most importantly, it demonstrated that even secure container isolation can be compromised if the routing/gateway layer is misconfigured.

Vendor Response!

After reporting the issue through the responsible disclosure process, the vendor stated that they were already aware of the vulnerability. No bounty was offered, and there was no formal acknowledgment or appreciation for the findings.
Interestingly, although they claimed the issue was known, the vulnerability was still present not only in the version I was testing but also in the latest release. I originally identified the flaw in two older builds, and further verification showed that the same weakness persisted unchanged in the most recent version as well.

This experience highlights the importance of having a structured vulnerability management process. When a security issue remains unpatched across multiple versions, even after being acknowledged, it signals gaps in prioritization and lifecycle management and underscores the value of transparent and accountable security practices

Conclusion

Browser isolation is a powerful defensive technology, but its effectiveness depends on correct implementation at every layer. In this case, the isolation kernel was functioning correctly, but the surrounding infrastructure introduced a flaw that allowed malicious files to bypass multi-AV scanning entirely.

This assessment reinforced an important lesson:
Container security must be reviewed holistically, from the runtime engine all the way up to the routing and gateway components. Even a single overlooked parameter can collapse an otherwise robust security design.


文章来源: https://infosecwriteups.com/bypassing-multi-layer-browser-isolation-av-controls-through-gateway-path-mismanagement-d5520313dfbd?source=rss----7b722bfd1b8d---4
如有侵权请联系:admin#unsafe.sh