41 Common Web Application Vulnerabilities Explained
41 Common Web Application Vulnerabilities Explained
REQUEST A DEMO
BLOG
REQUEST A DEMO
https://securityscorecard.com/blog/common-web-application-vulnerabilities-explained/#page 1/22
4/13/23, 1:40 PM 41 Common Web Application Vulnerabilities Explained
Access controls define how users interact with data and resources including
what they can read or edit. A broken access control vulnerability exists
when a user has the ability to interact with data in a way that they don’t
need. For example, if a user should only be able to read payment details but
can actually edit them, this is a broken access control. Malicious actors use
this vulnerability to gain unauthorized access to systems, networks, and
software. They can then escalate the privileges, give the user ID additional
access within the ecosystem, to negatively impact data confidentiality,
integrity, or availability.
2. Broken authentication
https://securityscorecard.com/blog/common-web-application-vulnerabilities-explained/#page 2/22
4/13/23, 1:40 PM 41 Common Web Application Vulnerabilities Explained
protocol, top-level domain name, and path schema. This means that you
can access http://company.com/page1 and http:/company.com/page2
because they both have the following in common:
Protocol: HTTP
Domain: Company.com
Path schema: /page#
Although secure, the Same Origin Policy becomes restrictive when working
with web-based applications that need access to resources that connect to
subdomains or third-parties.
7. Credentials management
https://securityscorecard.com/blog/common-web-application-vulnerabilities-explained/#page 4/22
4/13/23, 1:40 PM 41 Common Web Application Vulnerabilities Explained
action, the attacker leverages the browser to perform the rest of the attack,
such as transferring funds, without the user realizing what happened. For
example, as OWASP explained, the “buy now” feature on retail websites is
easy to exploit through a CSRF attack because the attacker can use the
cookies stored on the browser that saves the payment data to complete the
attack.
Web servers often list all the files stored on them in a single directory. If a
user is trying to locate a specific file in a web application, they normally
include the file name as part of the request. If that file is not available, the
application will return a list of all indexed files, giving the user a way to
choose something else.
However, web servers automatically index the files. If the application returns
a list of all files stored, a malicious actor exploiting vulnerabilities in the
directory index can gain access to information that can tell them more
about the system. For example, it can tell them about naming conventions
or personal user accounts. Both of these data points can be used to locate
sensitive information or engage in credential theft attacks.
https://securityscorecard.com/blog/common-web-application-vulnerabilities-explained/#page 5/22
4/13/23, 1:40 PM 41 Common Web Application Vulnerabilities Explained
data from the webserver. Generally, Access Control Lists (ACLs) limit user
access to specific files within a root directory.
Now, you might have an additional set of folders outside that root folder
including Pictures, Videos, and Downloads. Unless you have access to each
of these other root folders, you can’t access the information they contain.
Web applications organize information the same way, even if you don’t see
it. In a directory traversal attack, malicious actors figure out the URL
structure that the application uses to request files. Using the hypothetical
above, that URL might be:
Using this structure, they add “../” at the end. The “../” indicates moving
from one folder to one just above it in the hierarchy. The new request might
look like this:
www.myinsecurewebapp.com/[email protected]?item=../
They keep adding the ../ until they gain access to another file. If they know
the name of the file, such as an operating system file name, they might do
this:
www.mywebsiteinfo.com/MyPasswordisBad.asp?
item=../genericoperatingsystemfile
At this point, they just keep adding more “../” after the equal sign until they
get to the folder level and file they want.
12. Encapsulation
REQUEST A DEMO
https://securityscorecard.com/blog/common-web-application-vulnerabilities-explained/#page 6/22
4/13/23, 1:40 PM 41 Common Web Application Vulnerabilities Explained
Unlike some of the other vulnerabilities that leverage web browser access to
applications, encapsulation vulnerability exploits focus on weaknesses in
the way a developer coded the application. The programming term
encapsulation refers to bundling data and actions that can be taken on that
data into a single unit. Encapsulation protects data by hiding details about
how the code works which creates a better user interface. Users don’t need
to know how the application brings them data; they just need access to it.
However, if the developers fail to clearly define the boundaries between the
data and the actions taken across different areas of the application, the
application has an encapsulation vulnerability. Attackers exploit this by
sending the application a request that they know will result in an error
message. The error message gives them information about how the
application works, enabling additional attack types such as a denial of
service.
https://securityscorecard.com/blog/common-web-application-vulnerabilities-explained/#page 7/22
4/13/23, 1:40 PM 41 Common Web Application Vulnerabilities Explained
As with many other web application vulnerabilities, this one also aligns with
access control rights. Applications use URL restrictions to prevent non-
privileged users from accessing privileged data and resources. Every
clickable button in a web application directs to a URL. A failure to restrict
access vulnerability means that while clicking the button in the application
would prevent access, directly using the URL into the browser allows access.
When an application fails to restrict URL access, malicious actors can use
“forced browsing” for an attack.
For example, a web application might have a URL structure that looks like
this:
HTTP response splitting is a type of CRLF injection attack. HTTP is the way
that a browser sends queries and a server sends back responses. In an HTTP
response splitting attack, the malicious actors use the CR and LF notations
to manipulate how the browser and server “talk” to one another that sends
a request but asks the server to “split” the response into different parts.
Splitting the response into two parts gives the attacker control over what
data the server sends in response to the second part of the request. When
that requested data is sensitive or user ID data, the malicious attacker has
completed the attack.
HTTP is the protocol that lets applications respond to requests and retrieve
data. An HTTP verb is one of several actions that the application can use
when querying the server. Common ones HTTP verbs include:
REQUEST A DEMO
GET: retrieves data from specified source
https://securityscorecard.com/blog/common-web-application-vulnerabilities-explained/#page 8/22
4/13/23, 1:40 PM 41 Common Web Application Vulnerabilities Explained
Most web applications use HTTP verbs to authenticate users and manage
access privileges. Malicious actors can bypass authentication and access
controls intended to protect privileged information.
Malicious actors use injection flaws to change the commands which leads
to new and unintended actions within the application. Leveraging these
flaws, attackers can create, read, update, or delete data.
REQUEST A DEMO
https://securityscorecard.com/blog/common-web-application-vulnerabilities-explained/#page 9/22
4/13/23, 1:40 PM 41 Common Web Application Vulnerabilities Explained
1. Get plate
2. Get bread
3. Open bread
4. Take out bread 1
5. Put bread 1 on plate
6. Take out bread 2
7. Put bread 2 on plate
8. Get knife
9. Get peanut butter
10. Open peanut butter
11. Get jelly
12. Open jelly
13. Get peanut butter on knife REQUEST A DEMO
https://securityscorecard.com/blog/common-web-application-vulnerabilities-explained/#page 10/22
4/13/23, 1:40 PM 41 Common Web Application Vulnerabilities Explained
You need all of these things to happen as part of making the sandwich, but
they aren’t necessarily step-by-step in this order. Having to send all 17 of
these data points, like individual messages, every time someone asks for a
peanut butter and jelly sandwich can be time-consuming to write down
and send. Most likely, you’d group them in a document as “Peanut Butter
and Jelly Sandwich” that you send when someone asks, similar to
serialization. When the person opens the document, they can see each
individual data point, similar to deserialization.
https://securityscorecard.com/blog/common-web-application-vulnerabilities-explained/#page 11/22
4/13/23, 1:40 PM 41 Common Web Application Vulnerabilities Explained
Web application URLs can expose the format/pattern used for directing
users to backend storage locations. For example, a URL might indicate the
format/pattern for a record identifier in a storage system such as a database
or file system.
Failure to collect logs for auditable events like logins, failed logins, and
high-value transactions
Failure to generate an adequate and clear warning and error logs
Failure to monitor application and API logs for abnormal activity
Storing logs locally
Failure to effectively set alerting thresholds and response escalation
processes
Lack of alert triggers during penetration tests and dynamic application
security testing (DAST) scans
Lack of real-time or near real-time application detection, escalation,
and alerting functions
https://securityscorecard.com/blog/common-web-application-vulnerabilities-explained/#page 12/22
4/13/23, 1:40 PM 41 Common Web Application Vulnerabilities Explained
Transport layer security (TLS) is the way that computer applications securely
“talk” to one another on the internet. Some applications only use TLS during
the authentication process, leaving data and ID session information
exposed when someone uses the application.
Attackers can use this vulnerability to intercept data as it travels across the
internet between the user’s device and the application server.
LDAP is a protocol that lets applications talk with directory services servers
that store user IDs, passwords, and computer accounts. When applications
accept user input and execute it, attackers can exploit the LDAP server by
sending malicious requests.
https://securityscorecard.com/blog/common-web-application-vulnerabilities-explained/#page 13/22
4/13/23, 1:40 PM 41 Common Web Application Vulnerabilities Explained
www.insecurewebapp.com/genericusername/read
Although a bit more specific and technical than other web application
vulnerabilities, this one is increasingly important as companies build out
more mobile applications. A debugger is a program that helps application
developers find errors in their coding. They often use debuggers to keep the
application to prevent downtime from errors. However, malicious actors can
leverage these same debuggers to learn how the application works and find
ways to exploit them.
Process trace, more commonly called ptrace, is a system call that many
REQUEST A DEMO
debuggers and code analysis tools use. However, ptrace calls give tools a
https://securityscorecard.com/blog/common-web-application-vulnerabilities-explained/#page 14/22
4/13/23, 1:40 PM 41 Common Web Application Vulnerabilities Explained
Some web applications make calls to operating systems so that they can
communicate with the operating system or hardware. OS calls include
functions like:
You need to do these steps in that precise order so that you can write in a
new Word document. Functionally, many applications rely on a similar
approach, where each step relies on the completion of the previous one.
However, application tasks are often more complex and need to be faster.
This means that they use multi-threaded and asynchronous order. For
example, if you’re collaborating in real-time with a co-worker on a
document in a shared drive, you’re both giving the application tasks. This is
where the race condition vulnerability comes into play.
https://securityscorecard.com/blog/common-web-application-vulnerabilities-explained/#page 16/22
4/13/23, 1:40 PM 41 Common Web Application Vulnerabilities Explained
If a web application has an RFI vulnerability, malicious actors can direct the
application to upload malware or other malicious code to the website,
server, or database.
One of the most prevalent web application vulnerabilities is the potential for
a security misconfiguration. Generally, this vulnerability occurs when an
organization fails to change default Security settings. For example, off-the-
shelf software generally ships with a default administrative ID and
password. Failure to change these is considered a security misconfiguration.
36. Session ID leakage REQUEST A DEMO
https://securityscorecard.com/blog/common-web-application-vulnerabilities-explained/#page 17/22
4/13/23, 1:40 PM 41 Common Web Application Vulnerabilities Explained
Session IDs are the unique identifiers that authenticate users and track
their activities when they use a web application. Web application
vulnerabilities that lead to session leakage include:
https://securityscorecard.com/blog/common-web-application-vulnerabilities-explained/#page 18/22
4/13/23, 1:40 PM 41 Common Web Application Vulnerabilities Explained
Developers use third-party libraries to save time when coding. Often, this
allows them to use pre-tested code that speeds up the application
development process. However, the use of publicly available, open-source
code increases security risks, including:
Web applications can use redirects or forwards after a user submits a form.
For example, if your marketing website has a form so that visitors can
download a whitepaper, the page redirects or forwards them to the “thank
you” page when they submit the form. However, malicious actors can
impersonate these redirected or forwarded page URLs to steal user
information.
REQUEST A DEMO
https://securityscorecard.com/blog/common-web-application-vulnerabilities-explained/#page 19/22
4/13/23, 1:40 PM 41 Common Web Application Vulnerabilities Explained
However, when web applications use XML format to transmit data between
the browser and server, they often use APIs to process the data. Within the
XML standard, storage units are called “entities.” External entity refers to a
storage unit that can access local or remote content.
Our module ingests data from multiple public data sets then uses our
proprietary indexing and aggregation engine to provide your security rating
score. This score gives visibility into the likelihood of a data breach using an
easy-to-read A-F system.
RETURN TO BLOG
Products
Solutions
Customers
Marketplace
Partners
Resources
Company
Trust Portal
Security Ratings
REQUEST A DEMO
https://securityscorecard.com/blog/common-web-application-vulnerabilities-explained/#page 21/22
4/13/23, 1:40 PM 41 Common Web Application Vulnerabilities Explained
Login
Blog
Contact
Careers
SecurityScorecard
Tower 49
12 E 49th St
Suite 15-100
New York, NY 10017
https://securityscorecard.com/blog/common-web-application-vulnerabilities-explained/#page 22/22