19.09.2017 Views

the-web-application-hackers-handbook

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 1 n Web Application (In)security 15<br />

n Cloud computing — This term refers to greater use of external service<br />

providers for various parts of <strong>the</strong> technology stack, including <strong>application</strong><br />

software, <strong>application</strong> platforms, <strong>web</strong> server software, databases, and<br />

hardware. It also refers to increased usage of virtualization technologies<br />

within hosting environments.<br />

As with most changes in technology, <strong>the</strong>se trends have brought with <strong>the</strong>m<br />

some new attacks and variations on existing attacks. Notwithstanding <strong>the</strong> hype,<br />

<strong>the</strong> issues raised are not quite as revolutionary as <strong>the</strong>y may initially appear. We<br />

will examine <strong>the</strong> security implications of <strong>the</strong>se and o<strong>the</strong>r recent trends in <strong>the</strong><br />

appropriate locations throughout this book.<br />

Despite all <strong>the</strong> changes that have occurred within <strong>web</strong> <strong>application</strong>s, some<br />

categories of “classic” vulnerabilities show no sign of diminishing. They continue<br />

to arise in pretty much <strong>the</strong> same form as <strong>the</strong>y did in <strong>the</strong> earliest days of <strong>the</strong><br />

<strong>web</strong>. These include defects in business logic, failures to properly apply access<br />

controls, and o<strong>the</strong>r design issues. Even in a world of bolted-toge<strong>the</strong>r <strong>application</strong><br />

components and everything-as-a-service, <strong>the</strong>se timeless issues are likely<br />

to remain widespread.<br />

Summary<br />

In a little over a decade, <strong>the</strong> World Wide Web has evolved from purely static<br />

information repositories into highly functional <strong>application</strong>s that process sensitive<br />

data and perform powerful actions with real-world consequences. During this<br />

development, several factors have combined to bring about <strong>the</strong> weak security<br />

posture demonstrated by <strong>the</strong> majority of today’s <strong>web</strong> <strong>application</strong>s.<br />

Most <strong>application</strong>s face <strong>the</strong> core security problem that users can submit arbitrary<br />

input. Every aspect of <strong>the</strong> user’s interaction with <strong>the</strong> <strong>application</strong> may be<br />

malicious and should be regarded as such unless proven o<strong>the</strong>rwise. Failure to<br />

properly address this problem can leave <strong>application</strong>s vulnerable to attack in<br />

numerous ways.<br />

All <strong>the</strong> evidence about <strong>the</strong> current state of <strong>web</strong> <strong>application</strong> security indicates<br />

that although some aspects of security have indeed improved, entirely new<br />

threats have evolved to replace <strong>the</strong>m. The overall problem has not been resolved<br />

on any significant scale. Attacks against <strong>web</strong> <strong>application</strong>s still present a serious<br />

threat to both <strong>the</strong> organizations that deploy <strong>the</strong>m and <strong>the</strong> users who access <strong>the</strong>m.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!