Page 1484 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1484

Web Application Security


               The web allows you to purchase airline tickets, check your email, pay
               your bills, and purchase stocks all from the comfort of your living
               room. Almost every business today operates a website, and many allow

               you to conduct sensitive transactions through that site.

               Along with the convenience benefits of web applications comes a series
               of new vulnerabilities that may expose web-enabled organizations to
               security risks. In the next several sections, we’ll cover some common
               web application attacks. Additional detail on web application security
               can be found in Chapter 9, “Security Vulnerabilities, Threats, and
               Countermeasures.”



               Cross-Site Scripting

               Cross-site scripting (XSS) attacks occur when web applications
               contain some type of reflected input. For example, consider a simple
               web application that contains a single text box asking a user to enter

               their name. When the user clicks Submit, the web application loads a
               new page that says, “Hello, name.”

               Under normal circumstances, this web application functions as
               designed. However, a malicious individual could take advantage of this
               web application to trick an unsuspecting third party. As you may
               know, you can embed scripts in web pages by using the Hypertext
               Markup Language (HTML) tags <SCRIPT> and </SCRIPT>. Suppose

               that, instead of entering Mike in the Name field, you enter the
               following text:

               Mike<SCRIPT>alert('hello')</SCRIPT>


               When the web application “reflects” this input in the form of a web
               page, your browser processes it as it would any other web page: It
               displays the text portions of the web page and executes the script
               portions. In this case, the script simply opens a pop-up window that
               says “hello” in it. However, you could be more malicious and include a
               more sophisticated script that asks the user to provide a password and
   1479   1480   1481   1482   1483   1484   1485   1486   1487   1488   1489