Cross site request forgery: A common web application weakness

Author(s):  
Mohd. Shadab Siddiqui ◽  
Deepanker Verma
CCIT Journal ◽  
2014 ◽  
Vol 7 (3) ◽  
pp. 437-451
Author(s):  
Ary Budi Warsito ◽  
Muhamad Yusup ◽  
Yulianto Yulianto

Along with the development of technology in building a website , usually in the PHP programming language , people tend to write the coding from scratch . It seems like Perguruan Tinggi Raharja website which has 4 ( four ) such problems in terms of appearance , contains , security and technology . Because the Perguruan Tinggi Raharja website is still under construction using conventional methods , which take a long time can eventually lead to problems such as complexity in the preparation of the program code . Where it can lead to the development of the website and the length of time it is difficult to perform more maintenance because the code of the compiled program does not have a good standard of application development . As a solution presented four (4 ) solution of the above problems is the infrastructure including a website , view websites , website content and dashboard system , this can be managed more easily by applying a PHP based frameworks like Yii Framework . Yii Framework is a framework that contains functions and classes using the MVC method contained therein . MVC is a method that separates the parts of a web application consists of a Model , View , and Controller . With the Yii Framework significant benefits obtained as easily perform all types of web application development because Yii is very light and comes with a caching solution that is satisfactory , and it is suitable for developing applications with high traffic . In terms of safety also has a pretty good level of security , including the prevention of cross- site scripting ( XSS ) , cross-site request forgery , and the prevention of attacks of cookies . With the construction of university websites using Yii Framework Prog  expected to improve the performance of a website as a future spotlight Pribadi Raharja information .


2016 ◽  
Vol 1 (2) ◽  
pp. 46-62
Author(s):  
Taufik Ramadan Firdaus

Currently the Internet became one of the media that can not be separated, as well as a wide variety of applications supplied her. As the development of technologies, reliance on Web applications also increased. However, web applications have a wide range of threats, one of it is a CSRF (Cross-Site Request Forgery). This study uses CSRF (Cross-Site Request Forgery) Protection. CSRF (Cross-Site Request Forgery) Protection is a treatment method that has a variety of ways, one of which uses a token in the session when the user login. Token generated at login will be used as a user id that the system of web applications to identify where the request originated.  The results of this study are expected in order to increase web application defenses against CSRF (Cross-Site Request Forgery), so that web application users will be able to feel safe in using the Internet and its various feature. Reduced level of attacks on web applications. So that visitor traffic on the web application can be increased.


2021 ◽  
Vol 116 (1) ◽  
pp. 275-281
Author(s):  
Kulanda Seitbekovna Duisebekova ◽  
Roman Khabirov ◽  
Azamat Zholzhan

. Today information security has become one of the most important parts of our social media life. Social and media resources are based on web-services in the cloud. It means security of web-services is the equality of people’s social, media, data and information security. In this paper the most important focus was on special secure techniques and tools inside the most popular web-framework on Python programming language - Django. Django has several really strong design patterns and techniques with special tools to store and send user’s data in very secure methods. Developer can easily install in Django-application some new extra instruments, tools and special libraries to make web-application more securable. Django has such extremely useful instruments like Django-ORM, CSRF-tokens, XSS-protection and so many else. For example, Django-ORM (Object-Relational Mapping) is a really powerful instrument to be used for protection of such attacks like SQL-injections. One more instance, CSRF-token (Cross-site request forgery - token) is really amazing internal Django's tool against cross-site request forgery attacks that Django uses in html-templates. The best practice and good examples of these tools are shown inside this paper. Moreover, in the paper were demonstrated comparison of different attack cases and their deep analysis with protection methods from these attacks by Django's tools and techniques. One more thing, we also briefly reviewed other types of vulnerabilities and methods of protection against them and hope this article has given an understanding of the Django security techniques. Finally, Django could become more securable after each next version.


2014 ◽  
Vol 3 (2) ◽  
pp. 13-21 ◽  
Author(s):  
Bharti Nagpal ◽  
Naresh Chauhan ◽  
Nanhay Singh

2018 ◽  
Vol 7 (4.15) ◽  
pp. 130
Author(s):  
Emil Semastin ◽  
Sami Azam ◽  
Bharanidharan Shanmugam ◽  
Krishnan Kannoorpatti ◽  
Mirjam Jonokman ◽  
...  

Today’s contemporary business world has incorporated Web Services and Web Applications in its core of operating cycle nowadays and security plays a major role in the amalgamation of such services and applications with the business needs worldwide. OWASP (Open Web Application Security Project) states that the effectiveness of security mechanisms in a Web Application can be estimated by evaluating the degree of vulnerability against any of the nominated top ten vulnerabilities, nominated by the OWASP. This paper sheds light on a number of existing tools that can be used to test for the CSRF vulnerability. The main objective of the research is to identify the available solutions to prevent CSRF attacks. By analyzing the techniques employed in each of the solutions, the optimal tool can be identified. Tests against the exploitation of the vulnerabilities were conducted after implementing the solutions into the web application to check the efficacy of each of the solutions. The research also proposes a combined solution that integrates the passing of an unpredictable token through a hidden field and validating it on the server side with the passing of token through URL.  


Author(s):  
Kannan Balasubramanian

The obvious risks to a security breach are that unauthorized individuals: 1) can gain access to restricted information and 2) may be able to escalate their privileges in order to compromise the application and the entire application environment. The areas that can be compromised include user and system administration accounts. In this chapter we identify the major classes of web application vulnerabilities, gives some examples of actual vulnerabilities found in real-life web application audits, and describes some countermeasures for those vulnerabilities. The classes are: 1) authentication 2) session management 3) access control 4) input validation 5) redirects and forwards 6) injection flaws 7) unauthorized view of data 8) error handling 9) cross-site scripting 10) security misconfigurations and 10) denial of service.


Sign in / Sign up

Export Citation Format

Share Document