Defending a Web Application API against injectiong attacks
Defending a Web Application API against injectiong attacks
Introduction
Injection attacks are among the most common and critical security threats faced by web
applications. These attacks exploit vulnerabilities in input handling to execute malicious
commands, potentially compromising the integrity, confidentiality, or availability of
systems. This report focuses on defending a web application API against injection
attacks, specifically addressing mechanisms to prevent SQL injection and cross-site
scripting (XSS) attacks. While the application implements input sanitization and
parameterized queries through JPA repositories, it is essential to evaluate the robustness
of these defenses, identify limitations, and propose enhancements.
Source: SecurityWeek
Source: Wikipedia
1. Zero-Day Exploits:
3. Chained Vulnerabilities:
Enhancing Defenses
Example: Detect and block queries with unusual patterns, such as concatenated
SQL commands.
3. Database Hardening
Enforce least privilege access, disable dynamic SQL features, and implement query
timeouts to reduce risk.
The developed web application API incorporates robust security measures to mitigate
potential vulnerabilities:
1. Implementation Details:
2. Evaluation:
Testing: The application was tested using OWASP ZAP, which reported only
low-security risks or informational findings, demonstrating its resilience
against common attack vectors.
3. Future Enhancements:
Conclusion
References
SecurityWeek. "Millions of User Records Stolen from 65 Websites via SQL Injection
Attacks." Available at: https://www.securityweek.com/millions-of-user-records-
stolen-from-65-websites-via-sql-injection-attacks/