fbpx
 

Web Application Vulnerabilities – way too common!

Web applications are common to practically every company that uses the internet. Even if a company uses the well-known Secure Sockets Layer (SSL) and utilizes sophisticated firewall protection, the very fact that it can’t control what users can input into their web forms, introduces several avenues that a malicious person can use to attack the company’s data. Top web application researcher and practitioner Dafydd Studdard and his colleagues have tested thousands of web applications for security assessments over the years. In the following list, first I list the type of attack and in parentheses, the percentage of companies that are vulnerable to this particular type of attack.

• Cross-site Scripting (91%): This type of web application vulnerability allows a user to falsely act as another user and perform unauthorized actions on behalf of those innocent users.

• Information Leaks (81%): Information leaks occur when in response to a clever attacker’s probing, the web site offers up sensitive information – this is usually due to defective error handling by web sites.

• Broken Access Controls (78%): This refers to weak protection of sensitive data, enabling attackers to steal data and to carry out privileged actions they aren’t supposed to be able to perform.

• Broken Authentication (67%): These refer to defective login procedures, including weal password configuration.

• SQL Injection (36%): This type of attack uses specially crafted inputs, through URLs or web forms, to change the logic of web applications and steal data or launch commands on the database servers.

As this simple summary shows most companies are vulnerable to one or more of these common modes of internet based attacks – and there are many other types of attacks out there as well. A sound web application security assessment and secure web application coding practice implementation are the keys to protecting yourself against these dangerous types of cyber attacks.

Leave a Comment

Your email address will not be published. Required fields are marked *

*
*

Contact Us

If you have an urgent question regarding your software licensing or a software audit, please contact Miro right away.

Phone:
(732)738–8511 x1208
Email:
Webchat:
Use the chat box on the right
Meeting:

About Us

Miro is a leading global provider of software asset management services, specializing in license management, audit advisory, negotiation tactics, support management, and cloud services. We help our clients maximize ROI on their software license investments, stay in compliance, and minimize the impact of audits. Miro's performance guarantee promises that our long-tenured, diverse, and passionate team of expert analysts provides insightful and actionable advice to help our clients achieve the best possible outcomes.

Performance Guarantee

Miro’s no risk Performance Guarantee is that the amount of cost savings that we uncover will be more than our fees.

Managed Services for Oracle Licensing

Miro’s Managed Services for Oracle licensing is a best practice approach for an organization to optimize and outsource the practice of Software Asset Management to specialized external experts to ensure the organization’s compliance with vendor rules and policies.

Learn More