The security issues of Web applications are divided by the situation they exist, and there are a variety of things that are not intended to be introduced here, but are only common ones.
A list of common Web application security issues: 1. Cross-site scripting attacks (CSS or XSS, crosses site Scripting) 2. SQL injection attack (SQL injection) 3, Remote command Execution (code execution, personally think translated into code execution is not accurate) 4. Directory traversal (Directory traversal) 5, file contains (Files inclusion) 6. Scripting code exposure (script source code disclosure) 7. Additional carriage return feed for HTTP request header (CRLF injection/http response splitting) 8. Cross Frame Scripting Attack (crosses frame Scripting) 9, PHP code injection (PHP injection) 10. XPath Injection 11. Cookie tampering (Cookie manipulation) 12. URL redirection (URL redirection) 13, Blind Sql/xpath injection for numeric/string inputs 14, Google Hacking
|
Directory Traversal (Directory traversal)
Some friends should know before I published the ah163 in my blog. NET security vulnerability, High security: extremely dangerous, because I did not publish the details, everyone is more curious to know what is. With respect to the peers, I removed the vulnerability announcement column. I have informed ah163. NET peers, they have fix that problem.
Today we will talk about this loophole. Love.ah163.net on the network hard disk service, when registered users log in and open the network hard disk service, you can enter their own hard disk management interface, we see how it enters a directory, the following is entered into a directory of the url:http://love.ah163.net/ Personal_spaces_list.php?dir=myfolder
Now I'm going to modify this URL: http://love.ah163.net/Personal_Spaces_List.php?dir=. /.. /.. /.. /.. /.. /.. /.. /.. /.. /.. /.. /.. /usr/local/apache/conf/
What is the result of running it in a browser? The result is: all the files in the/usr/local/apache/conf/are honestly listed, in this way, you can play your imagination, the server is not nearly all the things can be listed? Tell you, you can also download it casually! Network hard disk, is used to upload the download, so it provides a complete function, destructive is very strong. As to the harm of it, you want to go, I will not alarmist.
Short-Answer solution:
1. Also restricts the Web application from running on the server
2, strict input verification, control user input illegal path
This article from: http://blog.csdn.net/iwebsecurity/article/details/1693877
"Common Web Application Security issues"---4, Directory traversal