Black Hat USA 2025 | Detecting Taint-Style Vulnerabilities in Microservice-Structured Web Apps
Why It Matters
Cross‑service taint vulnerabilities can silently compromise modern applications; MCAN’s approach provides a scalable, precise solution that dramatically improves detection over existing static analysis tools.
Key Takeaways
- •Microservice gateways obscure true public API entry points.
- •Taint-style vulnerabilities span multiple services, evading single-service tools.
- •MCAN uses LLMs to identify reachable APIs from gateway configs.
- •Service dependence graph and distance‑guided analysis improve precision and scalability.
- •MCAN uncovered 59 zero‑day bugs, outperforming CodeQL significantly.
Summary
The Black Hat USA 2025 talk introduced MCAN, a novel framework for detecting taint‑style vulnerabilities in microservice‑structured web applications. The presenters highlighted how modern architectures replace monoliths with independent services behind a gateway, creating new attack surfaces where malicious input can traverse multiple components before reaching sensitive operations.
Key challenges identified include correctly identifying which APIs are truly exposed by dynamic gateway rules, tracking data as it moves across heterogeneous communication mechanisms (REST, gRPC, Kafka, etc.), and handling the extremely long call chains that can cause traditional static analysis to run out of memory. MCAN addresses these issues by leveraging large language models to parse gateway configurations and pinpoint reachable endpoints, constructing a service dependence graph to model inter‑service data flows, and applying a distance‑guided context‑sensitive analysis that deepens scrutiny only near vulnerable sinks.
The researchers demonstrated MCAN’s effectiveness with real‑world case studies, such as a Spring Cloud Data Flow pipeline where unvalidated input propagated through several services to a file‑write operation, and an IoT platform where a cross‑service SQL injection was uncovered. In an evaluation of 30 open‑source and industrial microservice applications, MCAN discovered 59 previously unknown zero‑day vulnerabilities with a 72% precision rate, far surpassing CodeQL’s 23 findings and sub‑40% precision. An ablation study confirmed that each component—entry‑point identification, the dependence graph, and the distance‑guided strategy—is essential for both accuracy and scalability.
The findings underscore the necessity for security tools that understand the full microservice ecosystem rather than isolated services. By integrating LLM‑driven configuration analysis with scalable data‑flow modeling, MCAN offers a practical path for enterprises to mitigate complex, cross‑service threats that traditional scanners miss.
Comments
Want to join the conversation?
Loading comments...