11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 14: Building Secure Data Access 369Figure 14.1 illustrates these top threats.UnauthorizedAccessSQL InjectionDisclosure ofSchema <strong>and</strong>ConnectionDetailsNetworkEavesdroppingClient<strong>Web</strong> AppSQLServerDisclosure ofConfigurationDataFirewallConfiguration Data(ConnectionStrings)Disclosure ofSensitive<strong>Application</strong>DataFigure 14.1<strong>Threats</strong> <strong>and</strong> attacks to data access codeSQL InjectionSQL injection attacks exploit vulnerable data access code <strong>and</strong> allow an attacker toexecute arbitrary comm<strong>and</strong>s in the database. The threat is greater if the applicationuses an unconstrained account in the database because this gives the attacker greaterfreedom to execute queries <strong>and</strong> comm<strong>and</strong>s.VulnerabilitiesCommon vulnerabilities that make your data access code susceptible to SQL injectionattacks include:● Weak input validation● Dynamic construction of SQL statements without the use of type-safe parameters●Use of over-privileged database logins

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!