What are the common security vulnerabilities in the Web site and how to modify them?

Source: Internet
Author: User
Tags password protection

With the development of the Internet, network security issues more and more attention, a company's website if there is a security problem, the brand image of the enterprise and User Trust has a very large impact, how to protect the security of the site? What we can do is to prevent problems before they occur, and today we will share some of the common security holes in website construction.

1. Clear text transmission

Problem Description: The system user password protection is insufficient, the attacker can use the attack tool to steal legitimate user password data from the network.

Modify recommendation: The transmitted password must be encrypted.

Note: All passwords are encrypted. to complex encryption. Do not use Base64 or MD5.

2. SQL injection

Problem Description: An attacker can take advantage of SQL injection vulnerabilities to obtain a variety of information in the database, such as managing the password in the background to take off the contents of the database (off-Library).

Modification Suggestion: Filter and verify the input parameters. Use the black and white list method.

Note: Filtering, checking to overwrite all parameters within the system.

3. Cross-site scripting attacks

Problem Description: No validation of input information, an attacker can inject malicious instruction code into a Web page in a clever way. This code is usually JavaScript, but in fact it can include Java, VBScript, ActiveX, Flash, or plain HTML. After the attack succeeds, the attacker can get higher privileges.

Modification Suggestion: Filter and verify the user input. The output is HTML entity encoded.

Note: filtering, checking, HTML entity encoding. To overwrite all parameters.

4. File Upload Vulnerability

Problem Description: No file upload restrictions, may be uploaded executable files, or script files. Further causes the server to fall.

Modification suggestions: Strictly verify the upload file, prevent uploading ASP, ASPX, ASA, PHP, JSP and other dangerous scripts. Colleagues should join the file header verification to prevent users from uploading illegal files.

5. Disclosure of sensitive information

Problem Description: The system exposes internal information, such as: absolute path of the website, webpage source code, SQL statement, middleware version, program exception and other information.

Modification Suggestion: Filter the exception characters entered by the user. Masks some false echoes, such as Custom 404, 403, 500, and so on.

6. Command execution vulnerability

Problem Description: Script calls such as PHP's system, exec, shell_exec, and so on.

Modification suggestions: Patching, the system needs to execute the command to be strictly limited.

7, CSRF (cross-site request forgery)

Problem Description: Use an attacker who has logged in to perform some kind of action without your knowledge.

Modify Suggestion: Add token validation. Timestamp or this picture verification code.

8. SSRF Vulnerability

Problem Description: Service side request forgery.

Modification suggestions: Patching, or uninstalling useless packages

9. Default password, weak password

Problem Description: Because the default password, weak password is easy to guess.

Suggested changes: Stronger password strength does not apply to weak passwords

Note: Passwords do not appear in common words. such as: root123456, admin1234, qwer1234, pssw0rd and so on.

Of course, these are not all possible vulnerabilities, corporate Web site in the operation of the process must always detect maintenance, preferably a dedicated person in charge of the company's website regular inspection and maintenance, to ensure the safety of the site.

What are the common security vulnerabilities in the Web site and how to modify them?

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.