Friday, June 7, 2013

5 Dangerous Web Application Flaws Coveted By Attackers !

Ninety-nine percent of applications have one or more vulnerabilities. Many of the high-profile data breaches over the past several months were the result of a common Web application vulnerability. While it may be impossible to eliminate all flaws in Web applications, software security experts say eliminating the most commonly targeted errors could help magnify the risk of many automated attacks. These are the following points :-

 
1. Cross site scripting bother continues

Cross site scripting vulnerabilities appear 61 percent & it is the most commonly detected vulnerabilities in Web applications. It enables an attacker to send malicious scripts by shifting the script from an otherwise trusted URL.They can be detected with a Web application security scanner or blocked using a Web application firewall.

2. Information leakage errors a serious threat

Information leakage accounted for only 17 percent of Web applications, but the danger posed by the vulnerability makes finding and eliminating them extremely critical. Web applications can leak information in a kind of ways. Poorly implemented encryption also can yield information to an attacker.


3. Session management most common error

 
Session management vulnerabilities were detected in 80 percent of applications, more than any other application vulnerability class. Attackers can take advantage of poorly implemented session management, enabling them to interject themselves as valid website users. 

4. SQL injection rising

 
SQL injection accounted for 16 percent of all Web applications. While all other classes of vulnerabilities saw declines in but SQL injection has risen. SQL injection is a favorite vulnerability of attackers because automated scripts can be used to get a website to send a malicious SQL command to the underlying database in an effort to expose its content. 
 
Cross Site Request Forgery (CSRF) accounted for 22 percent of all Web applications tested. The class of vulnerabilities that make up CSRF allows attackers to send per-authenticated but unauthorized commands using credentials that the application trusts. Attackers can use a CSRF attack to ride the session of an individual on a particular website by using the victim’s browser credentials. In addition to the browser, an attacker can use a malicious script in a Microsoft Office document or Flash file that exploits CSRF. 

No comments:

Post a Comment