Ninety-nine percent of
applications have one or more vulnerabilities. Many of the
high-profile data breaches over the past several months were the
result of a common Web application vulnerability. While it may be
impossible to eliminate all flaws in Web applications, software
security experts say eliminating the most commonly targeted errors
could help magnify the risk of many automated attacks. These are the
following points :-
1. Cross
site scripting bother continues
Cross site scripting vulnerabilities appear 61 percent & it is the most commonly detected vulnerabilities in Web applications. It enables an attacker to send malicious scripts by shifting the script from an otherwise trusted URL.They can be detected with a Web application security scanner or blocked using a Web application firewall.
2. Information leakage errors a serious threat
Information leakage accounted for only 17 percent of Web applications, but the danger posed by the vulnerability makes finding and eliminating them extremely critical. Web applications can leak information in a kind of ways. Poorly implemented encryption also can yield information to an attacker.
3. Session management most common error
Session
management vulnerabilities were detected in 80 percent of
applications, more than any other
application vulnerability class. Attackers can take advantage of
poorly implemented session management, enabling them to interject
themselves as valid website users.
4. SQL injection rising
4. SQL injection rising
SQL
injection accounted for 16 percent of all Web applications. While
all other classes of vulnerabilities saw declines in but SQL
injection has risen. SQL
injection is a favorite vulnerability of attackers because automated
scripts can be used to get a website to send a malicious SQL command
to the underlying database in an effort to expose its content.
Cross Site
Request Forgery (CSRF) accounted for 22 percent of all Web
applications tested. The class of vulnerabilities that make up CSRF allows attackers to send per-authenticated but unauthorized commands using credentials that the application trusts. Attackers can use a CSRF attack to ride the session of an individual on a particular website by using the victim’s browser credentials. In addition to the browser, an attacker can use a malicious script in a Microsoft Office document or Flash file that exploits CSRF.
No comments:
Post a Comment