Saturday, October 01, 2005
java.net: Handling Java Web Application Input, Part 1
Inadequate data validation is the most common cause of security exploits suffered by web applications today. A staggering fact is the high number of applications exploited through weak validation. This is due to the simplicity of such an attack. No longer do attackers have to spend vast amounts of time researching ways to circumvent the security infrastructure of an application. An attacker can use freely available tools to scan for vulnerable websites. Using these findings, an attacker can use a web browser to ghost straight through firewall rule sets on port 80, altering the intended behavior of an application. This is true never more so than today. There are a multitude of technologies and frameworks available. Engineers are under increasing pressure to complete work on time, and hence place a heavy reliance on such tools. However, such technology may not adequately deal with user input to meet all cases, and as a result may introduce unintentional security vulnerabilities. Therefore, it is of paramount importance that secure coding practices are in place to close any possible doorway that permits such nefarious attacks to take place
Subscribe to:
Post Comments (Atom)
Popular Posts
- as400 iSeries NetServer Disabled user profiles
- Create a Custom Live Linux CD - Leveraging BusyBox and OpenSSH
- Super $500 Myth Project
- Encode HTML Entities - Showing code in blogs
- Search for text in vi or vim
- Library list for Web server
- IBM eServer iSeries - iSeries NetServer: Command Line Setup
- HOW TO make a Powerbook in to a Wi-Fi access point!
- Thomas Dudziak's Weblog
- Reno County is preparing to move from an AS400 computer system to a personal-computer-based system
No comments:
Post a Comment