Web Application Security2
Web Application Security2
1. SQL Injection.........................................................................................................................................3
2. Cross-Site Scripting (XSS)....................................................................................................................4
3. Cross-Site Request Forgery (CSRF)......................................................................................................4
4. Insecure Direct Object References (IDOR)...........................................................................................5
5. Remote Code Execution (RCE).............................................................................................................6
6. Insufficient Logging and Monitoring.....................................................................................................7
7. Insecure Cryptographic Storage.............................................................................................................8
8. Failure to Restrict URL Access / Broken Access Control......................................................................9
9. Cross-Origin Resource Sharing (CORS) Misconfiguration...................................................................9
10. Using Components with Known Vulnerabilities................................................................................10
Web Application
Security
Here are the ten common web application security threats we will
cover in this article:
1.SQL injection
2.Cross-site scripting (XSS)
3.Cross-site request forgery (CSRF)
4.Insecure direct object references
5.Remote code execution
6.Insufficient logging and monitoring
7.Insecure cryptographic storage
8.Failure to restrict URL access
9.Cross-origin resource sharing (CORS) misconfiguration
10.Using components with known vulnerabilities
1. SQL Injection
A SQL injection attack is executed when an attacker injects malicious
code into an application's database through user input fields. These
types of attacks can accomplish many different things. Two of the
most common outcomes include allowing the attacker to gain
unauthorized access to sensitive data stored in the database.
Depending on what data the database is storing, the attack could get
access to passwords, financial information, and personal data. The
second outcome could be the manipulation or deletion of data. For
instance, a user may be able to execute a DROP TABLE or DROP
DATABASE command.
You can mitigate this with the following steps:
•Validate user input.
•Use output encoding, which involves converting special
characters such as < and > into their HTML entity equivalents, to
prevent them from being interpreted as HTML code.
•Use prepared statements, parameterized queries, or stored
procedures instead of dynamic SQL whenever possible.
Most languages and frameworks have recommended ways of handling
form input. By combing frontend and backend standards to prevent
SQL injection from happening, your application can increase its
security against this type of threat.