11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 10: Building Secure ASP.NET Pages <strong>and</strong> Controls 255Figure 10.1 highlights the most common threats to <strong>Web</strong> applications.Code InjectionCross site scriptingBuffer overflowsNetworkEavesdroppingPassword sniffingSensitive app dataFirewallClient<strong>Web</strong> AppParameterManipulationForm fieldsQuery stringsCookiesView StateHTTP headersSession HijackingIdentity SpoofingInformationDisclosureFigure 10.1Common threats to ASP.NET <strong>Web</strong> pages <strong>and</strong> controlsCode InjectionCode injection occurs when an attacker causes arbitrary code to run using yourapplication’s security context. The risk increases if your application runs using aprivileged account.AttacksThere are various types of code injection attacks. These include:● Cross-site scripting. Malicious script is sent to a <strong>Web</strong> application as input. It isechoed back to a user’s browser, where it is executed.●●Buffer overflows. The type safe verification of managed code reduces the risksignificantly, but your application is still vulnerable, especially where it callsunmanaged code. Buffer overflows can allow an attacker to execute arbitrary codeinside your <strong>Web</strong> application process, using its security context.SQL injection. This attack targets vulnerable data access code. The attacker sendsSQL input that alters the intended query or executes completely new queries inthe database. Forms authentication logon pages are common targets because theusername <strong>and</strong> password are used to query the user store.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!