Logo
Pattern

Discover published sets by community

Explore tens of thousands of sets crafted by our community.

Web Security Vulnerabilities

15

Flashcards

0/15

Still learning
StarStarStarStar

XML External Entity (XXE)

StarStarStarStar

XXE attacks occur when an XML input containing a reference to an external entity is processed by a poorly configured XML parser. Risks include disclosure of confidential data, denial of service, and server-side request forgery. Prevention includes disabling external entity and DTD processing in the XML parser, and using less complex data formats such as JSON.

StarStarStarStar

Security Header Injection

StarStarStarStar

Security Header Injection occurs when an attacker is able to control HTTP headers added to a response by a web application. Risks include session fixation, XSS, and cache poisoning. To mitigate, validate and sanitize all headers, implement content security policy, and use httpOnly and Secure flags for cookies.

StarStarStarStar

Cross-Site Request Forgery (CSRF)

StarStarStarStar

CSRF tricks a user into performing actions they didn't intend to on a web application in which they're authenticated. Risks include unauthorized changes, such as transferring funds or changing email addresses. Mitigation involves anti-CSRF tokens, SameSite cookie attributes, and using the 'double submit cookie' pattern.

StarStarStarStar

Remote Code Execution (RCE)

StarStarStarStar

RCE allows an attacker to execute arbitrary code on a server remotely. Risks include full server compromise and unauthorized system access. Mitigation strategies are to keep software up to date, use a Web Application Firewall (WAF), restrict system permissions, and regularly review code for potential vulnerabilities.

StarStarStarStar

Cross-Site Scripting (XSS)

StarStarStarStar

XSS allows attackers to inject client-side scripts into web pages viewed by other users. Risks involve stealing cookies, session tokens, or other sensitive information and defacing websites. Mitigations include sanitizing data input, using Content Security Policy (CSP), and secure coding practices.

StarStarStarStar

Clickjacking

StarStarStarStar

Clickjacking is a technique where a user is tricked into clicking on something different from what the user perceives. Risks include executing unauthorized commands or revealing confidential information. Mitigation includes using frame busting scripts, X-Frame-Options header, and Content Security Policy (CSP).

StarStarStarStar

Insecure Deserialization

StarStarStarStar

Insecure Deserialization occurs when untrusted data is used to abuse the logic of an application, inflict a denial of service (DoS), or execute arbitrary code. Risks include remote code execution and replay attacks. Mitigation strategies are avoiding deserialization of data from untrusted sources and implementing integrity checks such as digital signatures on any serialized objects.

StarStarStarStar

Sensitive Data Exposure

StarStarStarStar

Sensitive Data Exposure results from insufficient protection of sensitive data, such as credit card numbers and passwords. Risks include data theft and breaches of privacy. Mitigation includes encrypting data at rest and in transit, secure tokenization, and stringent access control.

StarStarStarStar

Man-in-the-Middle (MitM) Attack

StarStarStarStar

A MitM Attack occurs when a third party intercepts the communication between two systems. Risks include eavesdropping, data manipulation, and data theft. Mitigations include using HTTPS, implementing HSTS, and utilizing VPNs for secure communications.

StarStarStarStar

Broken Access Control

StarStarStarStar

Broken Access Control refers to restrictions on what authenticated users are allowed to do are not properly enforced. Risks include unauthorized data access and deletion or modification of data. Mitigation involves implementing a robust access control policy, using the principle of least privilege and auditing logs to detect breaches.

StarStarStarStar

Security Misconfiguration

StarStarStarStar

Security Misconfiguration happens when security settings are defined, implemented, and maintained incorrectly. Risks include unauthorized access to data or functionality and data breaches. Mitigations involve regular audits, secure installation processes, and least privilege principles.

StarStarStarStar

SQL Injection

StarStarStarStar

SQL Injection is a code injection technique that might destroy your database. Risks include unauthorized viewing of data, deleting data, and full system compromise. Mitigation strategies include using prepared statements with parameterized queries, stored procedures, and input validation.

StarStarStarStar

Directory Traversal

StarStarStarStar

Directory Traversal, also known as path traversal, allows attackers to access restricted directories and execute commands outside of the server's root directory. Risks include unauthorized file and data access and system compromise. Mitigation includes input validation, user privileges limitations, and use of secure file access APIs.

StarStarStarStar

Broken Authentication

StarStarStarStar

Broken Authentication occurs when application functions related to authentication and session management are implemented incorrectly, allowing attackers to compromise passwords, keys, or session tokens. Risks include unauthorized access and impersonation. To mitigate, use multi-factor authentication, secure password storage, and rotate session ids after login.

StarStarStarStar

CORS Misconfiguration

StarStarStarStar

CORS Misconfiguration occurs when the Access-Control-Allow-Origin header is set too broadly, potentially allowing malicious domains to access resources. Risks include data breaches and data tampering. Mitigation involves specifying an explicit list of domains, use of credentials, and proper configuration of HTTP headers.

Know
0
Still learning
Click to flip
Know
0
Logo

© Hypatia.Tech. 2024 All rights reserved.