Try : Insurtech, Application Development

AgriTech(1)

Augmented Reality(20)

Clean Tech(8)

Customer Journey(17)

Design(45)

Solar Industry(8)

User Experience(68)

Edtech(10)

Events(34)

HR Tech(3)

Interviews(10)

Life@mantra(11)

Logistics(5)

Strategy(18)

Testing(9)

Android(48)

Backend(32)

Dev Ops(11)

Enterprise Solution(29)

Technology Modernization(8)

Frontend(29)

iOS(43)

Javascript(15)

AI in Insurance(38)

Insurtech(66)

Product Innovation(57)

Solutions(22)

E-health(12)

HealthTech(24)

mHealth(5)

Telehealth Care(4)

Telemedicine(5)

Artificial Intelligence(146)

Bitcoin(8)

Blockchain(19)

Cognitive Computing(7)

Computer Vision(8)

Data Science(21)

FinTech(51)

Banking(7)

Intelligent Automation(27)

Machine Learning(47)

Natural Language Processing(14)

expand Menu Filters

[Part 2] Web Application Security Testing: Top 10 Risks & Solutions

By :
7 minutes, 29 seconds read

In the previous article, we discussed risks and web application security testing measures for 5 types of attacks-

  1. Injection
  2. Broken authentication and session management
  3. Cross-site scripting
  4. Indirect object security reference
  5. Security misconfiguration

Link – Part 1

Now let’s continue with the remaining 5 web application security threats.

6. Sensitive data exposure

Broken authentication and inefficient session management leads to sensitive data exposure. Examples of applications vulnerable to sensitive data exposure.

  • Data stored in plain text, such as passwords or credit card data 
  • Lack of HTTPS on authenticated pages
  • Hashed passwords with lack of salt, making the password easily cracked
  • Tokens disclosed in public source code
  • Browser header caching sensitive data

I would suggest going through the part 1 of this series for in-depth knowledge about this vulnerability.

7. Cross-site forgery

Cross-Site Request Forgery (CSRF) or session riding- attacks, an attacker forces a victim to make an inappropriate web request such as a fraudulent bank transaction. For example, an attacker tricks the victim client into calling a banking function in a vulnerable page that transfers money from the victim’s to the attacker’s account. The victim triggers the attack by following an attacker’s link or visiting an attacker’s page. The vulnerable server page doesn’t recheck the authenticity of the victim’s request and allows proceeding the transfer.

The following steps detail the anatomy of a CSRF attack:

  1. The attacker finds a functionality in a web application that is vulnerable to CSRF.
  2. Attacker builds a link invoking the vulnerable function and by passing the required parameters, executes the attack.
  3. The Attacker then waits until the victim client authenticates with the vulnerable web application.
  4. Attacker tricks the victim client into following the malicious link.
  5. Victim client sends a forged request to a vulnerable server.
  6. Vulnerable server allows and executes the forged request.

For example, the link might look like this when the payload is to transfer money from the victim’s to the attacker’s account:

/makeTransfer?amount=1000&dest=attacker@attackersite.com

The following link sends an email titled ‘Hello’ to johny@example.com – 

/sendMail?to=johny@example.com&title=Hello&body=I+did+not+send+this

Basic test for cross-site request forgery

You can follow these test steps to test against CSRF bugs-

  1. Find a web application page that triggers/performs an action upon user request.
  2. Construct a page containing a link or redirect that sends a forged request to the application server. This link usually contains a tag such as an img or iframe with the source address pointing to the request.

<a href=”http://bank.com/transfer.do?acct=MARIA&amount=100000″>View my Pictures!</a>

<img src=”http://bank.com/transfer.do?acct=MARIA&amount=100000″ width=”1″ height=”1″ border=”0″>

  1. Note that the links above will generate a GET request. In order to test for POST requests you must create a page containing a form with the URL parameters passed as hidden input, and add a script to automatically submit the form:
 <form action=”http://bank.com/transfer.do” method=”post”>
     <input type=”hidden” name=”acct” value=”MARIA”>
     <input type=”hidden” name=”ammount” value=”100000″>
</form>
<script>
     document.forms[0].submit();
</script>
  1. Open an Internet browser and log in to the web application as a legitimate user.
  2. Open the page built in step 2 (follow the link if necessary).
  3. Confirm if the request was successful.
  4. Repeat test case for every application create/update/delete/mail action.

Expected result: the test fails if the application trusts and processes the forged request.

Also, attackers can manipulate cookies.

Another example,

Suppose, we allow users to post images on our forum. What if one of our users post this image?

<img src= “http://foo.com/logout”>

This is not really an image. But, it will force the target URL to be retrieved by any random user who happens to browse that page — using their browser credentials! From the webserver’s perspective, there is no difference whatsoever between a real user initiated browser request and the above image URL retrieval.

If our logout page was a simple HTTP GET that requires no confirmation, every user who visits that page would be immediately logged out.

Consider these examples of cross-site forgery: CSRF token leakage through Google Analytics, deleting account and erasing imported contacts, change any user ZONE, Add optional two factor mobile number

8. Missing function level access control

If the authentication check in sensitive request handlers is insufficient or non-existent, the vulnerability is Missing Function Level Access Control.

How to test for missing function level access control?

The best way to find out if an application fails to properly restrict function level access is to verify every application function-

  1. Does the UI show navigation to unauthorized functions?
  2. Are server side authentication or authorization checks missing?
  3. Are server side checks solely rely on information provided by the attacker?

Using a proxy, browse the application with a privileged role. Then revisit restricted pages using a less privileged role. If the server responses are alike, the My Organization application is probably vulnerable.

In one potential scenario an attacker simply forces the browser to target URLs. Consider the following (non-My Organisation) URLs which should require authentication. One also requires admin rights to access the “admin_getappInfo” page.

http://example.com/app/getappInfo

http://example.com/app/admin_getappInfo

If a non-authentic user (attacker) gets access to either page, then it means — unauthorized access was allowed. This flaw may lead the attacker to access more unprotected admin pages.

Example of missing function level access control atack – Delete Credit Cards from any Twitter Account.

9. Shellshock and Heartbleed attacks

Shellshock

It is a remote command execution vulnerability in Bash. A series of random characters, () { :; }; , confuses Bash because it doesn’t know what to do with them, so by default, it executes the code after it.

More on — manually exploiting shellshock vulnerability

Tools for checking Shellshock

Through command line:

To determine if your Linux or Unix system is vulnerable, type the following in the command line-

 env x='() { :;}; echo vulnerable’ bash -c “echo this is a test”
If the system is vulnerable, the output will be:
 vulnerable
 this is a test
 An unaffected (or patched) system will output:
 bash: warning: x: ignoring function definition attempt
 bash: error importing function definition for `x’
           this is a test

Online tools – 

  1. Penetration testing tools
  2. Shellshock bash vulnerability test tool

Heartbleed

It is a critical bug in OpenSSL’s implementation of the TLS/DTLS heartbeat extension. It allows attackers to read portions of the affected server’s memory, potentially revealing users data, that the server did not intend to reveal.

An attacker can trick OpenSSL into allocating a 64KB buffer, copy more bytes than is necessary into the buffer, send that buffer back, and thus leak the contents of the victim’s memory, 64KB at a time.

Web application security testing tools for heartbleed attack

  1. defribulator v1.16 : Command→ python ssltest.py example.com (ssltest.py file is available with me)
  2. Online tool: Filippo
  3. For android, you can download Bluebox open SSL scanner

Also read – Heartbleed bug FAQs, Bugs and solutions

How to prevent heartbleed attack?

  • Upgrade the OpenSSL version to 1.0.1g
  • Request revocation of the current SSL certificate
  • Regenerate your private key
  • Request and replace the SSL certificate

Examples of Heartbleed security attacks: information disclosure on Concrete5, port 1433, server returning more data

10. Unvalidated redirects and forwards

Unvalidated redirect vulnerabilities occur when an attacker is able to redirect a user to an untrusted site when the user visits a link located on a trusted website. This vulnerability is also often called Open Redirect.

It is possible when a web application accepts untrusted input that could cause the web application to redirect the request to a URL contained within untrusted input. By modifying untrusted URL input to a malicious site, an attacker may successfully launch a phishing scam and steal user credentials.

How to test unvalidated redirects and forwards?

Spider the site to see if it generates any redirects (HTTP response codes 300-307, typically 302). Look at the parameters supplied prior to the redirect to see if they appear to be a target URL or a piece of such a URL. If so, change the URL target and observe whether the site redirects to the new target.

Web application security testing: preventing unvalidated redirects

  1. Simply avoid using redirects and forwards.
  2. If at all you’re using redirects/forwards, do not allow the url as user input for the destination. In this case, you should have a method to validate the URL.
  3. If you  cannot avoid user input, ensure that the supplied value is valid, appropriate for the application, and is authorized for the user.
  4. Map any such destination input to a value, rather than the actual URL or portion of the URL. Ensure that server side code translates this value to the target URL.
  5. Sanitize input by creating a list of trusted URL’s (lists of hosts or a regex).
  6. Force all redirects to first go through a page notifying users that they are going off of your site, and have them click a link to confirm.

Consider these examples: open redirect, open redirect in bulk edit

So, this was all about prevailing risks and web application security testing measures to prevent your website from attackers. For further queries & doubts, feel free to write to hello@mantralabsglobal.com

About the author: Rijin Raj is a Senior Software Engineer-QA at Mantra Labs, Bangalore. He is a seasoned tester and backbone of the organization with non-compromising attention to details.

Related:

Cancel

Knowledge thats worth delivered in your inbox

Design Systems: Building and Maintaining Consistent UI/UX

In the world of product design, consistency is the cornerstone of delivering a seamless user experience. As digital products evolve and scale, the challenge of maintaining design consistency across multiple platforms, teams, and touchpoints becomes more complex. This is where design systems come in. A design system is a comprehensive set of guidelines, components, and tools that help designers and developers create a consistent and cohesive user interface (UI) and user experience (UX). From a designer’s perspective, building and maintaining a design system requires a strategic approach to ensure scalability, flexibility, and alignment with business goals.

Why Design Systems Matter?

Design systems are more than just style guides or pattern libraries. They offer a unified language for design and development, bridging the gap between creativity and functionality. Here are a few reasons why they are critical:

  1. Consistency Across Products

      One of the primary goals of a design system is to ensure uniformity across different platforms and devices. When users interact with a product, whether on a website or a mobile app, they expect a consistent experience. A well-implemented design system ensures that visual elements, interactions, and behaviors are aligned, offering a familiar and intuitive experience for users.

2. Faster Iteration

      With a design system in place, teams can reuse components and patterns rather than reinventing the wheel for each new feature. This speeds up the design and development process, allowing teams to focus on solving new problems instead of reworking existing designs. For designers, it means less time spent on repetitive tasks and more time dedicated to innovation.

3. Scalability

     As products grow and new features are added, maintaining a coherent UI/UX without a design system can become chaotic. A design system provides a scalable framework, enabling teams to add new elements or modules without compromising the overall consistency of the product.

4. Improved Collaboration

      A design system fosters collaboration between designers, developers, and other stakeholders by providing a shared language and reference point. This ensures that design decisions are communicated effectively, reducing friction and misunderstandings between teams.

Building a Design System: A Designer’s Perspective

Designing a system from scratch can seem like a daunting task, but with a clear roadmap and understanding of core principles, it becomes a powerful tool for creating scalable and user-centered products.

1. Define the Core Principles

Before diving into visual components, it’s essential to establish the core principles of your design system. These principles serve as the foundation and guide decision-making throughout the process. Ask yourself:

• What are the key values of your brand?

• How should the design reflect the needs and emotions of users?

• What goals are you trying to achieve with your design system (e.g., accessibility, flexibility, innovation)?

   For instance, if accessibility is a top priority, you’ll need to ensure that your design system accommodates users with different abilities, by providing color contrast guidelines, clear typographic hierarchies, and accessible components.

2. Create a Unified Visual Language

Once the principles are established, the next step is creating a cohesive visual language. This includes defining elements such as:

Color Palette: A well-structured color palette ensures harmony across different UI components. It’s crucial to include primary, secondary, and accent colors, along with usage guidelines to avoid inconsistency.

Typography: Define a typography system that establishes hierarchies and clarity, including font styles, sizes, line heights, and spacing. Consistent typography helps users navigate content effortlessly.

Spacing and Grids: An established grid system ensures a balanced layout and harmony between different UI elements. Proper spacing guidelines prevent crowded or misaligned components.

Iconography and Illustrations: Design guidelines for icons and illustrations help maintain visual consistency. Icons should follow a standard style (outlined, filled) and size, ensuring they align with the overall visual language.

(I

Iconography and Illustrations: Design guidelines for icons and illustrations help maintain visual consistency. Icons should follow a standard style (outlined, filled) and size, ensuring they align with the overall visual language.

Image Source: https://designerup.co/blog/10-best-design-systems-and-how-to-learn-and-steal-from-them/)

3. Design Reusable Components

A design system is incomplete without reusable UI components. These components include buttons, forms, modals, and navigation elements that can be used across various features and pages. Each component should be:

Modular: Components should be flexible and adaptable for different contexts. For example, a button should have variations for different states (hover, active, disabled) and types (primary, secondary, destructive).

Documented: Each component needs comprehensive documentation that explains how it should be used, its variants, and the rules governing its application. This ensures consistency when different team members use the same component.

4. Implement Accessibility Guidelines

Accessibility should be at the forefront of every design system. As a designer, consider:

Color Contrast: Ensure sufficient contrast between text and background for readability.

Keyboard Navigation: Ensure that interactive components are navigable via keyboard for users who rely on keyboard shortcuts.

Responsive Design: Components should be responsive, adapting seamlessly across different screen sizes and devices.

Assistive Technologies: Design components should be compatible with screen readers and other assistive technologies to provide an inclusive experience.

Maintaining a Design System: Evolving with the Product

Once a design system is in place, the work doesn’t stop there. Maintaining it requires ongoing effort as the product evolves and new design challenges emerge. Here’s how designers can ensure the design system remains relevant and effective:

1. Regular Audits and Updates

A design system should be treated as a living document that evolves with the product. Regular audits are necessary to identify outdated or unused components. Designers should collaborate with developers to ensure new features are aligned with the existing design system, and updates should be documented to avoid fragmentation.

2. Version Control and Documentation

Version control is essential for keeping track of changes in the design system. Documenting why and how changes are made ensures that the design system grows in an organized manner. It also helps onboard new team members quickly, as they can reference updated guidelines.

3. Foster Collaboration Across Teams

Designers need to maintain an open line of communication with developers and other teams using the design system. Tools like Figma, Sketch, and Zeplin allow designers to share components and guidelines in real-time, fostering collaboration and ensuring that everyone is aligned.

Some well-known examples of design systems that have set benchmarks in the industry:

1. Google Material Design

  • URL: Material Design
  • Overview: Google’s Material Design is one of the most comprehensive design systems available. It provides guidelines on how to create visual, motion, and interaction design across platforms and devices. Material Design is known for its grid-based layouts, responsive animations, and depth effects like shadows and lighting.
  • Features:
    • Comprehensive color palettes, typography, and iconography.
    • Extensive component library (buttons, cards, etc.).
    • Customizable UI components for both web and mobile applications.

2. Salesforce Lightning Design System

  • URL: Salesforce Lightning
  • Overview: Salesforce’s Lightning Design System provides a comprehensive library of UI components and resources to help build applications on the Salesforce platform. It ensures a consistent experience across Salesforce products and enables developers to create custom apps easily.
  • Features:
    • Ready-to-use components, design tokens, and code snippets.
    • Comprehensive accessibility guidelines to ensure inclusivity.
    • Detailed documentation for developers to integrate components into Salesforce applications.

3. Microsoft Fluent Design System

  • URL: Fluent Design
  • Overview: Fluent Design is Microsoft’s design system, created to provide an engaging and scalable UI across all Microsoft products. It is heavily focused on interaction, animation, and motion while ensuring accessibility across various device ecosystems.
  • Features:
    • Focus on depth, motion, and light to create modern and interactive UIs.
    • Cross-platform components supporting web, desktop, and mobile applications.
    • Accessible components with detailed guidelines for developers.

Conclusion

Building and maintaining a design system is an investment that pays off in the long run. It ensures consistency across your product, improves collaboration between teams, and allows for faster iteration and scalability. For designers, a design system is more than a collection of reusable components — it’s a framework that enables you to create user-centric products with confidence and clarity. By embracing modularity, documentation, and accessibility, you’ll ensure that your design system remains a valuable asset as your product grows.

About the Author:

Shristi is a creative professional with a passion for visual storytelling. She recently transitioned from the world of video and motion graphics to the exciting field of product design at Mantra Labs. When she’s not designing, she enjoys watching movies, traveling, and sharing her experiences through vlogs.

Cancel

Knowledge thats worth delivered in your inbox

Loading More Posts ...
Go Top
ml floating chatbot