Web Application Attacks
What we’ll be learning
There are lots of ways to attack web applications, and today we’ll be learning about the basic methods commonly used by attackers. We’ll learn about web application attacks including injection, directory traversal, cross-site scripting, and request forgery.
Why web applications?
Why would someone want to attack a web application? Web applications can make tempting targets on their own: Compromising a web app can allow an attacker to hack and steal personal information, commit fraud, infect visitors with malware, and much more.
Web applications can also serve as a highly-visible entry point for an attacker looking to get deeper into an organization’s network: Rather than targeting the application itself, an attacker might target the servers the application runs on, installing a backdoor to access them directly before pivoting to other computers on the network.
In short, web applications are targeted because they are visible, accessible, and offer a multitude of potential payoffs for an attacker. Web applications are such popular targets that organizations like the Open Web Application Security Project (OWASP), have been created to educate people on securing web applications. The OWASP Top Ten is a list of the 10 most serious types of web application vulnerabilities.
Most of the attacks in this article can be mitigated to some extent by following one simple principle: Don’t trust user input.
Injection attacks
Many web applications rely on back-end software for parts of their functionality, and some of this software, like databases, receives queries based on user input. An injection attack is when an attacker makes a malicious query that tricks the software into doing something it shouldn’t.
SQL injection
SQL injection attacks can be used for a variety of nefarious purposes, from reading or modifying data, to issuing commands to the operating system running the database. It’s common for web applications to use user input for database queries: Search functionality is a good example of this.
xkcd #327: “Exploits of a Mom”
LDAP injection
Lightweight Directory Access Protocol (LDAP) is used to access directories on a network. LDAP injection targets this protocol. Some web applications create LDAP queries from user input, and since LDAP often deals with credentials such as usernames and passwords, a malicious query can have a big security impact.
Preventing injection attacks
If a web application is going to be making a query based on user input, then we need to make sure that input can’t be used to manipulate the software answering the query. One way to do this is with input sanitization, where queries are checked to make sure they don’t contain control characters used to trick the software, but it’s better to structure queries in ways that inherently resist injection, like SQL’s parameterized queries.
Directory traversal
The structure of a website can correspond to the structure of a filesystem on the server the website is running on. Directory traversal is when an attacker is able to explore parts of the filesystem they shouldn’t. This is generally accomplished using ..
, which translates to “the folder above this one” in file paths. The simplest way to do this is to just put two periods ..
in the URL, like so: www.example.com/../../..
.
This can be used to read files that really shouldn’t be read, such as the /etc/passwd
or /etc/shadow
files on Linux, which store user information and password hashes respectively.
XSS And CSRF
Where injection attacks target the back-end of a web application, cross-site scripting and cross-site request forgery target the front-end.
Cross-site scripting
Cross-site scripting (XSS) is when user input on a website is treated as javascript and run. The severity of XSS vulnerabilities can vary from low to very high depending on what type of XSS it is, and what the site does.
Reflected XSS is when a website returns the malicious user input immediately, such as a search function displaying the query at the top of the screen. In order to affect other people, we would need to trick them into, for example, clicking a URL with the malicious query embedded as a parameter. This can still be dangerous, but nowhere near as dangerous as…
Stored XSS, where the user input is stored on the site such as in a post on a social media website or forum. Because the input can be shown to many people, it can be much more dangerous. This type of XSS has been used for everything from relatively-harmless pranks such as self-sharing social media posts, to large-scale theft of credit-card data.
Cross-site request forgery
Cross-site request forgery (CSRF) is when one website is able to send requests to another website where we are currently authenticated. This is a bit confusing, so imagine it like this:
- We’ve logged into our bank account in one tab.
- We visit a malicious website in another tab.
- The malicious website contains HTML that says to send a request to our bank’s website to do something evil.
- Our browser obeys the HTML code and sends the request.
- Our bank’s website receives the request from our browser. As far as it knows, the request comes from us, so it does the evil bidding of the request.
This type of vulnerability often takes advantage of cookies stored in the browser and can be defended against by using SameSite cookies, and CSRF tokens, which are random values generated for each session and must be included in requests for them to be executed.
Conclusion
Web applications are popular targets for attackers, both on their own and as gateways to internal networks. Injection attacks, directory traversal, XSS, and CSRF are all vulnerabilities that should be considered when designing web applications. Many of these vulnerabilities can be protected against, to an extent, by not trusting user input. That means validating input, making sure control characters are properly treated as text and note code, and double-checking where requests come from.
Author
'The Codecademy Team, composed of experienced educators and tech experts, is dedicated to making tech skills accessible to all. We empower learners worldwide with expert-reviewed content that develops and enhances the technical skills needed to advance and succeed in their careers.'
Meet the full teamRelated articles
Learn more on Codecademy
- Skill path
Fundamentals of Cybersecurity
Learn the Cybersecurity fundamentals that will lay a foundation for securing your technology and personal life from dangerous cyber threats.Includes 5 CoursesWith CertificateBeginner Friendly3 hours - Skill path
Code Foundations
Start your programming journey with an introduction to the world of code and basic concepts.Includes 5 CoursesWith CertificateBeginner Friendly4 hours