Java vs PHP: A Security Approach
|
|
|
- Erika Palmer
- 10 years ago
- Views:
Transcription
1 Date of acceptance Grade Instructor Java vs PHP: A Security Approach Anttijuhani Lantto Helsinki March 4, 2011 UNIVERSITY OF HELSINKI Department of Computer Science
2 HELSINGIN YLIOPISTO HELSINGFORS UNIVERSITET UNIVERSITY OF HELSINKI Tiedekunta Fakultet Faculty Laitos Institution Department Faculty of Science Tekijä Författare Author Anttijuhani Lantto Työn nimi Arbetets titel Title Department of Computer Science Java vs PHP: A Security Approach Oppiaine Läroämne Subject Computer Science Työn laji Arbetets art Level Aika Datum Month and year Sivumäärä Sidoantal Number of pages Tiivistelmä Referat Abstract March 4, pages + 9 appendices One of the biggest questions in the beginning of developing web application is the choice of programming language. It aects available tools, libraries, frameworks etc. But does it aect security? This article analyzes four common web application vulnerabilities and studies 25 dierent web applications security problems. Several indicators are developed to nd out if Java is more secure than PHP or vice versa. ACM Computing Classication System (CCS): Avainsanat Nyckelord Keywords Säilytyspaikka Förvaringsställe Where deposited Muita tietoja övriga uppgifter Additional information
3 Contents ii 1 Introduction 1 2 Languages Java PHP Comparison Vulnerabilities Cross-Site Scripting SQL Injection Path Manipulation Command Injection Projects and Analysis 6 5 Results 7 6 Security Resource Indicator 8 7 Conclusion 8 References 8
4 1 Introduction 1 In this paper we examine security dierences of two popular programming languages: PHP and Java. Web applications developed with either of these languages have some similar problems and we examine some of those Vulnerabilities. Java has better reputation than PHP but is there actual reason for that? Although web applications have much more security vulnerabilities than, the four examined in this paper, they still give good overview on the security of applications. 2 Languages In this paper we examine two dierent languages PHP and Java. Both of them are really popular programming languages but they have big dierences in both how they got started and what kind of languages they are. 2.1 Java The rst version of Java was created around 1993 by James Gosling for device called Star7 in the Green Project while working at Sun Microsystems [Gre04]. Star7 looked like a big PDA and was designed demonstration platform and the software running on it was designed to be deployed on dierent platforms like televisions and so on. James Gosling created processor independent language that made the demo work. In the beginning language was called Oak after a large oak tree outside Goslings oce window. Later the languages name was changed to Java and it was ocially announced in May PHP PHP was originally designed by Rasmus Lerdorf in 1994 [Cho08] and the core scripting engine was rewritten in 1997 by Zeev Suraski and Andi Gutmans. PHP has had many signicant changes during its history eg. object model was completely rewritten between PHP 4 and PHP 5. One of the well know security problems with earlier PHP versions was registered globals. Registered globals populated global scope with all the variables from super globals (ENV, GET, POST, COOKIE and SERVER). For example if $_POST['action']
5 was set then global variable $action was also set. Although this has clear security problems registered_globals has been o by default since PHP 4.2.0, released in <?php if (authenticated_user()) { $authorized = true; } if ($authorized) { include "/highly/sensitive/data.php"; }?> In above example user could see "/highly/sensitive/data.php" simply by sending $_GET['authorized']=1 to application [php11]. This could be avoided by initializing $authorized to false but it's still clear how registered_globals is insecure. Many of the problems of PHP come from the fact that fundamentally PHP has no solid or consistent initial design[cho08]. One example of this are dierent search functions. Many string related search functions (strrchr, strstr, strrpos, substr_count) take haystack as rst parameter and needle as second argument while array related functions (in_array, array_search) take needle as rst argument and haystack as second[php11]. Other problem with core PHP functions is inconsistent use of underscores [Cho08], for example base64_encode, urlencode, strip_tags and stripslashes. PHP has similar naming conventions than eg. Java. Class names start with capital letter etc. The problem with PHP is that variable names are case sensitive but function names are not. With this absurd system variables $i and $I are dierent variables, but functions urlencode, urlencode and UrLEnCOde are all same function. PHP is a popular language and there are many reasons for PHPs popularity [Cho08]. PHP is easy to learn and use, it works in virtually any kind of web server, there is tons of free resources for it and many hosting platforms oer PHP by default. 87.5% of the top web hosting providers supported PHP [WDLM10].
6 3 2.3 Comparison Java is an object-oriented language and it forces all runnable code to be in a class [Gos95]. This makes classes an important, logical and easy way to organize code. Newer versions of PHP support classes and object-oriented design but functions is still the most common way to organize code in PHP applications [WDLM10]. Java is statically typed language and PHP is dynamically typed language (although it is possible to specify argument types for functions in PHP). This is on of the reasons why PHP programs are on average shorter than Java programs [WDLM10]. PHP is often blamed to have inconsistent and weird API but Java too has some strange stu in its libraries. Eg. Javas standard implementation of stack that has method to get any item in the stack [jav11]. 3 Vulnerabilities Web applications are often developed by programmers without security sophistication [LE07]. Many developers get pressured by their managers for extra functionality and "lesser" concerns like performance and security don't get enough attention. One part of this is developer education and bad tutorials (big part of the problem is that writing insecure code is extremely easy. $sql="insert INTO Persons (FirstName, LastName, Age) VALUES ('$_POST[firstname]','$_POST[lastname]','$_POST[age]')"; if (!mysql_query($sql,$con)) { } die('error: '. mysql_error()); Of the four vulnerabilities in this chapter this code has two. It has both SQL injection and cross-site script vulnerability. This type of code in common it tutorials since it's easy and natural way to achieve the task of saving something to database. The problem with this is clear: the default is unsafe. To do same task in secure way developer must sanitize input and think all of the ways to pass Javascript or SQL to the application.
7 Although SQL injection, cross-site scripting, command injection and path manipulation were chosen because they were only security vulnerabilities found by both Java static-analysis tools and PHP static-analysis tools. They are still include common and important vulnerabilities. SQL injection was (with other injections) rst on OWASPs Top 10 Application Security Risks -list in 2010 and second on the 2007 list. On the same list cross-site scripting was number one in 2007 and number two in Cross-Site Scripting Cross-site scripting (XSS) is a class of webapplication vulnerabilities where the attacker exploits hole in applications data validation to output HTML that execute malicious Javascript in victim's machine with the privileges of trusted host [KGJE09] [WS08]. Webapplications have XXS vulnerabilities because the validation (if there is validation at all) they perform is not enough to prevent browser's Javascript interpreter invocation and this validation is even harder if users are allowed to add some HTML mark-up [WS08]. There are clear reasons why XSS vulnerabilities are so common. The requirements are minimal: any web application that displays user input is potentially vulnerable and of those every application that has any faults in it's sanitation or validation is vulnerable [WS08]. Other reason for XSS vulnerabilities is that most programming languages provide an unsafe default to retrieve untrusted input data from user and to display untrusted data back to users. It's really easy to just take raw input data and add it to SQL query or print it back to user in the next request. There are two types of XSS attacks. The rst type of XSS attack is known as rstorder, Type 1 or reected XSS and the second is known as second-order, persistent, stored, or Type 2 XSS [KGJE09]. The third type of XSS attack is DOM-based XSS [WS08]. First-order XSS results form application inserting user's input to next page it renders [KGJE09]. The attacker must use social engineering to convince victim to click on malicious URL. The victims browser then displays HTML and executes malicious Javascript. Attacker can steal eg. browser or other sensitive user data. Users can avoid rst-order by checking link anchors before clicking on them but to applications also needs reject or modify values that may contain script code.
8 A second-order XSS results form application storing attackers malicious input in database or other storage and displaying it later to multiple victims [KGJE09]. Second-order XSS is harder to prevent than rst-order because application need to reject or sanitize inputs that may contain script code and are displayed in HTML output like against rst-order attacks and also reject or sanitize input values that may contain SQL code. Second-order XSS is more damaging than rst-order XSS for two reasons. First reason is that there is no need for social engineering since malicious code can be injected to page itself, instead of URL, and user can't avoid attack. Second reason is that one XSS in database can get executed in multiple victim users database SQL Injection In SQL Injection (SQLI) attacker executes malicious SQL statements by exploiting applications data validation [KGJE09]. This is possible by adding (partial) SQL statement in the input. SQLI can give attacker unauthorized access to data or damage the data in database [KGJE09]. Classic example is to send "1' OR '1' = '1" to application which can lead to statement like "SELECT * FROM foo where bar = '1' OR '1' = '1'". This SQL query selects all rows form foo instead of just those where bar is 1. SQL injection can be blocked by sanitizing inputs that are used in SQL-statements or reject potentially dangerous inputs [KGJE09]. 3.3 Path Manipulation In Path manipulation vulnerability application uses users input to select target for lesystem operation and attacker can do otherwise unpermitted things to system [CW07]. One example is photo hosting service where users can remove their own photos. If attacker can add le system metacharacters (eg. '/' '\' or '.') in target path then attacker can either specify absolute path instead of relative path (../../tomcat/conf/server.xml) or go up in the directory tree to eg. delete servers cong le. Path manipulation is easier to prevent than XSS or SQLI by using a whitelist. One working solution is to deny use of slash and backslash, set maximum length to lepath and allow only on dot on the lename.
9 6 3.4 Command Injection A Command Injection may occur when user input is allowed as part of system command that program executes [CW07]. In PHP this may happen via the 'system()' function. If input can include le system or shell metacharacters then attacker may specy absolut path instead of relative path or add malicious second command after original command. Command injection is even more dangerous if command is executed as privileged user. Command injection can be avoided by using APIs instead of system calls or by input validation. 4 Projects and Analysis Walden et al. examined vulnerability density of 25 open source web applications [WDLM10]. Eleven projects where written in Java and fourteen in PHP. All applications had source code repository ranging from July 2006 to July Java PHP alfresco contelligent daisywiki achievo obm roundcube dspace jackrabbit jamwiki dotproject phpbb smarty lenya ofbiz velocity gallery2 phpmyadmin squirrelmail vexi xwiki mantisbt phpwebsite wordpress mediawiki po Size of codebase of the projects varied greatly. The smallest PHP project had under 6,000 lines of code and the largest had 388,00 lines of code. Other PHP projects ranged from 25,00 to 150,000 lines of code. The largest Java project was xwiki with over million lines of code and the rest of Java projects ranged from 30,00 to 500,000 lines of code. Applications source code was analyzed by a static analysis tool. Static analysis tools try to nd common security vulnerabilities by evaluating source code without executing it. Static code analysis can by used with just the code and without installation and conguration process. Dynamic analysis on the other hand requires installation and conguration. This means that results of dynamic analysis depend on the conguration of the application and also the conguration of the server. All static tools produce false positive results. Walden et. al [WDWW09] estimated their false positive rate to be 18.1% with PHP applications. They did not do similar
10 7 estimation for Java applications. Several indicator were computed from all of the projects: SLOC source lines of code. This excludes empty lines and comments. SAVC Static analysis vulnerability count. Sum of all vulnerabilities. SAVD Static analysis vulnerability density. Vulnerability count normalized by KSLOC (thousand source lines of code). CVM Common vulnerability metric. Sum of XSS, SQLI, Path Manipulation and Code Injection vulnerabilities. CVD Common vulnerability density. CVM normalized by KSLOC. 5 Results Metric PHP 2006 PHP 2008 Java 2006 Java 2008 SLOC 870,00 1,400,000 5,000,000 11,000,000 SAVC ,473 42,581 SAVD CVM Both Java and PHP CVD Min CVD Max CVD applications improved as sets from 2006 to PHP's lower CVD was mostly because of decreased vulnerability count while Java's improvement on CVD was mainly due increased code size. Large part of PHP's decreased CVD was from decline in SQL injections. One part of this change might be use of parameterized query interfaces. The variation between projects was greater than between languages. The most insecure application of all applications was written in PHP but the most secure one was also in written in PHP. Based on this analysis the selected programming language is not an important part of developing secure web applications.
11 6 Security Resource Indicator 8 To measure importance of security to the project Walden et al.[wdlm10] also counted Security Resource Indicator (SRI) to all projects. Security resource indicator is based on four items: security documentation for application installation and conguration, a dedicated address to report security problems, a list or database of security vulnerabilities and documentation of secure development practises, such as coding standards or techniques to avoid common secure programming errors. SRI is the sum of these indicator items and it ranges from zero to four. Six of the eleven Java projects scored one form SRI. They all had security documentation. The other ve of the Java projects all scored zero. PHP projects were totally dierent story. Even though only ve PHP projects had security documentation, so the percentage was lower, six PHP projects had sercurty address, ve had vulnerability database, and four had secure coding documentation. Three PHP projects had SRI value of zero but one project (squirrelmail) had SRI value of four. Although the SRI value had no clear correlation with CVD it did had clear correlation with change of SAVD in PHP projects. SRI was not useful indicator with Java projects since it was practically just a boolean value. 7 Conclusion Even though used programming language was not signicant for applications security this analysis still leaves open questions. This analysis does not say anything about security of new applications or if language has matter with the rst version of application. SRI was signicant for PHP applications. This is not surprise since ones rst guess would be that projects with more focus and resources for security are more secure. References Cho08 Cholakov, N., On some drawbacks of the PHP platform. CompSysTech, Rachev, B. Smrikarov, A.,. ACM, 2008, 12, URL org/ /
12 9 CW07 Gos95 Chess, B. West, J., Secure programming with static analysis. Addison- Wesley Professional,, Gosling, J., Java: an Overview. Sun Microsystems Computer Company, Gre04 Greanier, T., Java Foundations. Wiley, jav11 Java platform, standard edition 6 api specication, URL http: //download.oracle.com/javase/6/docs/api/. KGJE09 Kiezun, A., Guo, P. J., Jayaraman, K. Ernst, M. D., Automatic creation of SQL injection and cross-site scripting attacks. ICSE. IEEE, 2009, , URL LE07 Livshits, V. B. Erlingsson, Ú., Using web application construction frameworks to protect against code injection attacks. PLAS, Hicks, M. W.,. ACM, 2007, 95104, URL php11 Php manual, URL php.net/manual/en. WDLM10 Walden, J., Doyle, M., Lenhof, R. Murray, J., Idea: Java vs. PHP: Security implications of language choice for web applications. ESSoS, Massacci, F., Wallach, D. S. Zannone, N.,, 5965 Lecture Notes in Computer Science. Springer, 2010, 6169, URL / WDWW09 Walden, J., Doyle, M., Welch, G. A. Whelan, M., Security of open source web applications. ESEM, 2009, , URL acm.org/ / WS08 Wassermann, G. Su, Z., Static detection of cross-site scripting vulnerabilities. ICSE, Schäfer, W., Dwyer, M. B. Gruhn, V.,. ACM, 2008, , URL
Java vs. PHP: Security Implications of Language Choice for Web Applications
Java vs. PHP: Security Implications of Language Choice for Web Applications James Walden, Maureen Doyle, Robert Lenhof, and John Murray Department of Computer Science Northern Kentucky University Highland
Software Performance Testing
Software Performance Testing Xiang Gan Helsinki 26.09.2006 Seminar paper University of Helsinki Department of Computer Science HELSINGIN YLIOPISTO HELSINGFORS UNIVERSITET UNIVERSITY OF HELSINKI Tiedekunta/Osasto
EVALUATING COMMERCIAL WEB APPLICATION SECURITY. By Aaron Parke
EVALUATING COMMERCIAL WEB APPLICATION SECURITY By Aaron Parke Outline Project background What and why? Targeted sites Testing process Burp s findings Technical talk My findings and thoughts Questions Project
Web applications. Web security: web basics. HTTP requests. URLs. GET request. Myrto Arapinis School of Informatics University of Edinburgh
Web applications Web security: web basics Myrto Arapinis School of Informatics University of Edinburgh HTTP March 19, 2015 Client Server Database (HTML, JavaScript) (PHP) (SQL) 1 / 24 2 / 24 URLs HTTP
Web Application Security
Web Application Security John Zaharopoulos ITS - Security 10/9/2012 1 Web App Security Trends Web 2.0 Dynamic Webpages Growth of Ajax / Client side Javascript Hardening of OSes Secure by default Auto-patching
Integrated Network Vulnerability Scanning & Penetration Testing SAINTcorporation.com
SAINT Integrated Network Vulnerability Scanning and Penetration Testing www.saintcorporation.com Introduction While network vulnerability scanning is an important tool in proactive network security, penetration
WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY
WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY www.alliancetechpartners.com WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY More than 70% of all websites have vulnerabilities
Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011
Creating Stronger, Safer, Web Facing Code JPL IT Security Mary Rivera June 17, 2011 Agenda Evolving Threats Operating System Application User Generated Content JPL s Application Security Program Securing
1. Introduction. 2. Web Application. 3. Components. 4. Common Vulnerabilities. 5. Improving security in Web applications
1. Introduction 2. Web Application 3. Components 4. Common Vulnerabilities 5. Improving security in Web applications 2 What does World Wide Web security mean? Webmasters=> confidence that their site won
ArcGIS Server Security Threats & Best Practices 2014. David Cordes Michael Young
ArcGIS Server Security Threats & Best Practices 2014 David Cordes Michael Young Agenda Introduction Threats Best practice - ArcGIS Server settings - Infrastructure settings - Processes Summary Introduction
Webapps Vulnerability Report
Tuesday, May 1, 2012 Webapps Vulnerability Report Introduction This report provides detailed information of every vulnerability that was found and successfully exploited by CORE Impact Professional during
How To Fix A Web Application Security Vulnerability
Proposal of Improving Web Application Security in Context of Latest Hacking Trends RADEK VALA, ROMAN JASEK Department of Informatics and Artificial Intelligence Tomas Bata University in Zlin, Faculty of
Magento Security and Vulnerabilities. Roman Stepanov
Magento Security and Vulnerabilities Roman Stepanov http://ice.eltrino.com/ Table of contents Introduction Open Web Application Security Project OWASP TOP 10 List Common issues in Magento A1 Injection
Check list for web developers
Check list for web developers Requirement Yes No Remarks 1. Input Validation 1.1) Have you done input validation for all the user inputs using white listing and/or sanitization? 1.2) Does the input validation
External Network & Web Application Assessment. For The XXX Group LLC October 2012
External Network & Web Application Assessment For The XXX Group LLC October 2012 This report is solely for the use of client personal. No part of it may be circulated, quoted, or reproduced for distribution
elearning for Secure Application Development
elearning for Secure Application Development Curriculum Application Security Awareness Series 1-2 Secure Software Development Series 2-8 Secure Architectures and Threat Modeling Series 9 Application Security
Cross Site Scripting Prevention
Project Report CS 649 : Network Security Cross Site Scripting Prevention Under Guidance of Prof. Bernard Menezes Submitted By Neelamadhav (09305045) Raju Chinthala (09305056) Kiran Akipogu (09305074) Vijaya
Complete Cross-site Scripting Walkthrough
Complete Cross-site Scripting Walkthrough Author : Ahmed Elhady Mohamed Email : [email protected] website: www.infosec4all.tk blog : www.1nfosec4all.blogspot.com/ [+] Introduction wikipedia
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security Presented 2009-05-29 by David Strauss Thinking Securely Security is a process, not
Security features of ZK Framework
1 Security features of ZK Framework This document provides a brief overview of security concerns related to JavaScript powered enterprise web application in general and how ZK built-in features secures
Bug Report. Date: March 19, 2011 Reporter: Chris Jarabek ([email protected])
Bug Report Date: March 19, 2011 Reporter: Chris Jarabek ([email protected]) Software: Kimai Version: 0.9.1.1205 Website: http://www.kimai.org Description: Kimai is a web based time-tracking application.
CSE598i - Web 2.0 Security OWASP Top 10: The Ten Most Critical Web Application Security Vulnerabilities
CSE598i - Web 2.0 Security OWASP Top 10: The Ten Most Critical Web Application Security Vulnerabilities Thomas Moyer Spring 2010 1 Web Applications What has changed with web applications? Traditional applications
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
Adobe Systems Incorporated
Adobe Connect 9.2 Page 1 of 8 Adobe Systems Incorporated Adobe Connect 9.2 Hosted Solution June 20 th 2014 Adobe Connect 9.2 Page 2 of 8 Table of Contents Engagement Overview... 3 About Connect 9.2...
Intrusion detection for web applications
Intrusion detection for web applications Intrusion detection for web applications Łukasz Pilorz Application Security Team, Allegro.pl Reasons for using IDS solutions known weaknesses and vulnerabilities
OWASP Top Ten Tools and Tactics
OWASP Top Ten Tools and Tactics Russ McRee Copyright 2012 HolisticInfoSec.org SANSFIRE 2012 10 JULY Welcome Manager, Security Analytics for Microsoft Online Services Security & Compliance Writer (toolsmith),
Web-Application Security
Web-Application Security Kristian Beilke Arbeitsgruppe Sichere Identität Fachbereich Mathematik und Informatik Freie Universität Berlin 29. Juni 2011 Overview Web Applications SQL Injection XSS Bad Practice
Perl In Secure Web Development
Perl In Secure Web Development Jonathan Worthington ([email protected]) August 31, 2005 Perl is used extensively today to build server side web applications. Using the vast array of modules on CPAN, one
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
Cracking the Perimeter via Web Application Hacking. Zach Grace, CISSP, CEH [email protected] January 17, 2014 2014 Mega Conference
Cracking the Perimeter via Web Application Hacking Zach Grace, CISSP, CEH [email protected] January 17, 2014 2014 Mega Conference About 403 Labs 403 Labs is a full-service information security and compliance
External Vulnerability Assessment. -Technical Summary- ABC ORGANIZATION
External Vulnerability Assessment -Technical Summary- Prepared for: ABC ORGANIZATI On March 9, 2008 Prepared by: AOS Security Solutions 1 of 13 Table of Contents Executive Summary... 3 Discovered Security
HOD of Dept. of CSE & IT. Asst. Prof., Dept. Of CSE AIET, Lko, India. AIET, Lko, India
Volume 5, Issue 12, December 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Investigation
Thomas Röthlisberger IT Security Analyst [email protected]
Thomas Röthlisberger IT Security Analyst [email protected] Compass Security AG Werkstrasse 20 Postfach 2038 CH-8645 Jona Tel +41 55 214 41 60 Fax +41 55 214 41 61 [email protected] www.csnc.ch What
How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering
How to break in Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering Time Agenda Agenda Item 9:30 10:00 Introduction 10:00 10:45 Web Application Penetration
CSCI110 Exercise 4: Database - MySQL
CSCI110 Exercise 4: Database - MySQL The exercise This exercise is to be completed in the laboratory and your completed work is to be shown to the laboratory tutor. The work should be done in week-8 but
Impact of Plugins on Web Application Security OWASP. The OWASP Foundation http://www.owasp.org
Impact of Plugins on Web Application Security Cincinnati Chapter Meeting June 29 th, 2010 James Walden and Maureen Doyle Northern Kentucky University Copyright The Foundation Permission is granted to copy,
Lecture 11 Web Application Security (part 1)
Lecture 11 Web Application Security (part 1) Computer and Network Security 4th of January 2016 Computer Science and Engineering Department CSE Dep, ACS, UPB Lecture 11, Web Application Security (part 1)
Application security testing: Protecting your application and data
E-Book Application security testing: Protecting your application and data Application security testing is critical in ensuring your data and application is safe from security attack. This ebook offers
Cross Site Scripting (XSS) and PHP Security. Anthony Ferrara NYPHP and OWASP Security Series June 30, 2011
Cross Site Scripting (XSS) and PHP Security Anthony Ferrara NYPHP and OWASP Security Series June 30, 2011 What Is Cross Site Scripting? Injecting Scripts Into Otherwise Benign and Trusted Browser Rendered
Cross Site Scripting in Joomla Acajoom Component
Whitepaper Cross Site Scripting in Joomla Acajoom Component Vandan Joshi December 2011 TABLE OF CONTENTS Abstract... 3 Introduction... 3 A Likely Scenario... 5 The Exploit... 9 The Impact... 12 Recommended
Web application security: Testing for vulnerabilities
Web application security: Testing for vulnerabilities Using open source tools to test your site Jeff Orloff Technology Coordinator/Consultant Sequoia Media Services Inc. Skill Level: Intermediate Date:
Columbia University Web Security Standards and Practices. Objective and Scope
Columbia University Web Security Standards and Practices Objective and Scope Effective Date: January 2011 This Web Security Standards and Practices document establishes a baseline of security related requirements
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda 1. Introductions for new members (5 minutes) 2. Name of group 3. Current
Cross-Site Scripting
Cross-Site Scripting (XSS) Computer and Network Security Seminar Fabrice Bodmer ([email protected]) UNIFR - Winter Semester 2006-2007 XSS: Table of contents What is Cross-Site Scripting (XSS)? Some
Common Security Vulnerabilities in Online Payment Systems
Common Security Vulnerabilities in Online Payment Systems Author- Hitesh Malviya(Information Security analyst) Qualifications: C!EH, EC!SA, MCITP, CCNA, MCP Current Position: CEO at HCF Infosec Limited
A Novel Frame Work to Detect Malicious Attacks in Web Applications
Technology, Volume-2, Issue-1, January-March, 2014, pp. 23-28, IASTER 2014, www.iaster.com, Online:2347-5099, Print:2348-0009 A Novel Frame Work to Detect Malicious Attacks in Web Applications N. Jayakanthan
Web application security
Web application security Sebastian Lopienski CERN Computer Security Team openlab and summer lectures 2010 (non-web question) Is this OK? int set_non_root_uid(int uid) { // making sure that uid is not 0
DIPLOMA IN WEBDEVELOPMENT
DIPLOMA IN WEBDEVELOPMENT Prerequisite skills Basic programming knowledge on C Language or Core Java is must. # Module 1 Basics and introduction to HTML Basic HTML training. Different HTML elements, tags
OWASP and OWASP Top 10 (2007 Update) OWASP. The OWASP Foundation. Dave Wichers. The OWASP Foundation. OWASP Conferences Chair dave.wichers@owasp.
and Top 10 (2007 Update) Dave Wichers The Foundation Conferences Chair [email protected] COO, Aspect Security [email protected] Copyright 2007 - The Foundation This work is available
Still Aren't Doing. Frank Kim
Ten Things Web Developers Still Aren't Doing Frank Kim Think Security Consulting Background Frank Kim Consultant, Think Security Consulting Security in the SDLC SANS Author & Instructor DEV541 Secure Coding
Cross-site site Scripting Attacks on Android WebView
IJCSN International Journal of Computer Science and Network, Vol 2, Issue 2, April 2013 1 Cross-site site Scripting Attacks on Android WebView 1 Bhavani A B 1 Hyderabad, Andhra Pradesh-500050, India Abstract
NoSQL, But Even Less Security Bryan Sullivan, Senior Security Researcher, Adobe Secure Software Engineering Team
NoSQL, But Even Less Security Bryan Sullivan, Senior Security Researcher, Adobe Secure Software Engineering Team Agenda Eventual Consistency REST APIs and CSRF NoSQL Injection SSJS Injection NoSQL databases
Application Security Testing. Erez Metula (CISSP), Founder Application Security Expert [email protected]
Application Security Testing Erez Metula (CISSP), Founder Application Security Expert [email protected] Agenda The most common security vulnerabilities you should test for Understanding the problems
FINAL DoIT 11.03.2015 - v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES
Purpose: The Department of Information Technology (DoIT) is committed to developing secure applications. DoIT s System Development Methodology (SDM) and Application Development requirements ensure that
CS 558 Internet Systems and Technologies
CS 558 Internet Systems and Technologies Dimitris Deyannis [email protected] 881 Heat seeking Honeypots: Design and Experience Abstract Compromised Web servers are used to perform many malicious activities.
University of Wisconsin Platteville SE411. Senior Seminar. Web System Attacks. Maxwell Friederichs. April 18, 2013
University of Wisconsin Platteville SE411 Senior Seminar Web System Attacks Maxwell Friederichs April 18, 2013 Abstract 1 Data driven web applications are at the cutting edge of technology, and changing
Nuclear Regulatory Commission Computer Security Office Computer Security Standard
Nuclear Regulatory Commission Computer Security Office Computer Security Standard Office Instruction: Office Instruction Title: CSO-STD-1108 Web Application Standard Revision Number: 1.0 Effective Date:
Project 2: Web Security Pitfalls
EECS 388 September 19, 2014 Intro to Computer Security Project 2: Web Security Pitfalls Project 2: Web Security Pitfalls This project is due on Thursday, October 9 at 6 p.m. and counts for 8% of your course
Client Side Filter Enhancement using Web Proxy
Client Side Filter Enhancement using Web Proxy Santosh Kumar Singh 1, Rahul Shrivastava 2 1 M Tech Scholar, Computer Technology (CSE) RCET, Bhilai (CG) India, 2 Assistant Professor, CSE Department, RCET
Assessing the viability of implicitly estimated velocity for measuring the productivity of software teams
Assessing the viability of implicitly estimated velocity for measuring the productivity of software teams Max Pagels MSc thesis UNIVERSITY OF HELSINKI Department of Computer Science Helsinki, May 3, 2013
Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008
Detecting Web Application Vulnerabilities Using Open Source Means OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008 Kostas Papapanagiotou Committee Member OWASP Greek Chapter [email protected]
What about MongoDB? can req.body.input 0; var date = new Date(); do {curdate = new Date();} while(curdate-date<10000)
Security What about MongoDB? Even though MongoDB doesn t use SQL, it can be vulnerable to injection attacks db.collection.find( {active: true, $where: function() { return obj.credits - obj.debits < req.body.input;
Client vs. Server Implementations of Mitigating XSS Security Threats on Web Applications
Journal of Basic and Applied Engineering Research pp. 50-54 Krishi Sanskriti Publications http://www.krishisanskriti.org/jbaer.html Client vs. Server Implementations of Mitigating XSS Security Threats
Ruby on Rails Secure Coding Recommendations
Introduction Altius IT s list of Ruby on Rails Secure Coding Recommendations is based upon security best practices. This list may not be complete and Altius IT recommends this list be augmented with additional
The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.
This sample report is published with prior consent of our client in view of the fact that the current release of this web application is three major releases ahead in its life cycle. Issues pointed out
ASL IT SECURITY BEGINNERS WEB HACKING AND EXPLOITATION
ASL IT SECURITY BEGINNERS WEB HACKING AND EXPLOITATION V 2.0 A S L I T S e c u r i t y P v t L t d. Page 1 Overview: Learn the various attacks like sql injections, cross site scripting, command execution
A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications. Slides by Connor Schnaith
A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications Slides by Connor Schnaith Cross-Site Request Forgery One-click attack, session riding Recorded since 2001 Fourth out of top 25 most
Web Application Security Considerations
Web Application Security Considerations Eric Peele, Kevin Gainey International Field Directors & Technology Conference 2006 May 21 24, 2006 RTI International is a trade name of Research Triangle Institute
ASL IT Security Advanced Web Exploitation Kung Fu V2.0
ASL IT Security Advanced Web Exploitation Kung Fu V2.0 A S L I T S e c u r i t y P v t L t d. Page 1 Overview: There is a lot more in modern day web exploitation than the good old alert( xss ) and union
Toward A Taxonomy of Techniques to Detect Cross-site Scripting and SQL Injection Vulnerabilities
NCSU CSC TR 2008-4 1 Toward A Taxonomy of Techniques to Detect Cross-site Scripting and SQL Injection Vulnerabilities Yonghee SHIN, Laurie WILLIAMS, Members, IEEE Abstract Since 2002, over half of reported
Data Breaches and Web Servers: The Giant Sucking Sound
Data Breaches and Web Servers: The Giant Sucking Sound Guy Helmer CTO, Palisade Systems, Inc. Lecturer, Iowa State University @ghelmer Session ID: DAS-204 Session Classification: Intermediate The Giant
Web Vulnerability Scanner by Using HTTP Method
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 9, September 2015,
Web Security CS25010. 20th November 2012. 2012, Jonathan Francis Roscoe, [email protected] Department of Computer Science, Aberystwyth University
Web Security CS25010 20th November 2012 Session Errors Some people are having errors creating sessions: Warning: session_start() [function.session-start]: open(/var/php_sessions/sess_d7hag76hgsfh2bjuhmdamb974,
Drupal CMS for marketing sites
Drupal CMS for marketing sites Intro Sample sites: End to End flow Folder Structure Project setup Content Folder Data Store (Drupal CMS) Importing/Exporting Content Database Migrations Backend Config Unit
3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management
What is an? s Ten Most Critical Web Application Security Vulnerabilities Anthony LAI, CISSP, CISA Chapter Leader (Hong Kong) [email protected] Open Web Application Security Project http://www.owasp.org
Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability
Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability WWW Based upon HTTP and HTML Runs in TCP s application layer Runs on top of the Internet Used to exchange
IJMIE Volume 2, Issue 9 ISSN: 2249-0558
Survey on Web Application Vulnerabilities Prevention Tools Student, Nilesh Khochare* Student,Satish Chalurkar* Professor, Dr.B.B.Meshram* Abstract There are many commercial software security assurance
HackMiami Web Application Scanner 2013 PwnOff
HackMiami Web Application Scanner 2013 PwnOff An Analysis of Automated Web Application Scanning Suites James Ball, Alexander Heid, Rod Soto http://www.hackmiami.org Overview Web application scanning suites
Hack-proof Your Drupal App. Key Habits of Secure Drupal Coding
Hack-proof Your Drupal App Key Habits of Secure Drupal Coding DrupalCamp CT 2010 My Modules Introductions Erich Beyrent http://twitter.com/ebeyrent http://drupal.org/user/23897 Permissions API Search Lucene
Web Application Guidelines
Web Application Guidelines Web applications have become one of the most important topics in the security field. This is for several reasons: It can be simple for anyone to create working code without security
Recon and Mapping Tools and Exploitation Tools in SamuraiWTF Report section Nick Robbins
Recon and Mapping Tools and Exploitation Tools in SamuraiWTF Report section Nick Robbins During initial stages of penetration testing it is essential to build a strong information foundation before you
Detect and Sanitise Encoded Cross-Site Scripting and SQL Injection Attack Strings Using a Hash Map
Detect and Sanitise Encoded Cross-Site Scripting and SQL Injection Attack Strings Using a Hash Map Erwin Adi and Irene Salomo School of Computer Science BINUS International BINUS University, Indonesia
WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats
WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top
Web Application Penetration Testing
Web Application Penetration Testing 2010 2010 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property. Will Bechtel [email protected]
Adobe ColdFusion. Secure Profile Web Application Penetration Test. July 31, 2014. Neohapsis 217 North Jefferson Street, Suite 200 Chicago, IL 60661
Adobe ColdFusion Secure Profile Web Application Penetration Test July 31, 2014 Neohapsis 217 North Jefferson Street, Suite 200 Chicago, IL 60661 Chicago Dallas This document contains and constitutes the
SQL Injection January 23, 2013
Web-based Attack: SQL Injection SQL Injection January 23, 2013 Authored By: Stephanie Reetz, SOC Analyst Contents Introduction Introduction...1 Web applications are everywhere on the Internet. Almost Overview...2
Secure Web Development Teaching Modules 1. Threat Assessment
Secure Web Development Teaching Modules 1 Threat Assessment Contents 1 Concepts... 1 1.1 Software Assurance Maturity Model... 1 1.2 Security practices for construction... 3 1.3 Web application security
Software Assurance Tools: Web Application Security Scanner Functional Specification Version 1.0
Special Publication 500-269 Software Assurance Tools: Web Application Security Scanner Functional Specification Version 1.0 Paul E. Black Elizabeth Fong Vadim Okun Romain Gaucher Software Diagnostics and
HTTPParameter Pollution. ChrysostomosDaniel
HTTPParameter Pollution ChrysostomosDaniel Introduction Nowadays, many components from web applications are commonly run on the user s computer (such as Javascript), and not just on the application s provider
ASP.NET MVC Secure Coding 4-Day hands on Course. Course Syllabus
ASP.NET MVC Secure Coding 4-Day hands on Course Course Syllabus Course description ASP.NET MVC Secure Coding 4-Day hands on Course Secure programming is the best defense against hackers. This multilayered
Braindumps.C2150-810.50 questions
Braindumps.C2150-810.50 questions Number: C2150-810 Passing Score: 800 Time Limit: 120 min File Version: 5.3 http://www.gratisexam.com/ -810 IBM Security AppScan Source Edition Implementation This is the
Lecture 15 - Web Security
CSE497b Introduction to Computer and Network Security - Spring 2007 - Professor Jaeger Lecture 15 - Web Security CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse497b-s07/
EECS 398 Project 2: Classic Web Vulnerabilities
EECS 398 Project 2: Classic Web Vulnerabilities Revision History 3.0 (October 27, 2009) Revise CSRF attacks 1 and 2 to make them possible to complete within the constraints of the project. Clarify that
EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 619 Advanced SQLi Attacks and Countermeasures. Make The Difference CAST.
CENTER FOR ADVANCED SECURITY TRAINING 619 Advanced SQLi Attacks and Countermeasures Make The Difference About Center of Advanced Security Training () The rapidly evolving information security landscape
