Security.com

Common web application login security weaknesses and how to fix them

By Kevin Beaver

Web applications are at the core of enterprise IT assets, functionalities and business workflows. From ERP systems to online banking to electronic health records systems, there's a critical web application that's hosted on premises or in the cloud in virtually every enterprise.

At some point, many of these web applications end up with flaws such as cross-site scripting and SQL injection. These are regularly found and, presumably, resolved. But there's one set of weaknesses in particular that's taken for granted and often overlooked during typical vulnerability scanning and penetration testing exercises. Those weaknesses are associated with the application login mechanism.

Here are some common flaws with application login security that come up in every web security assessment and issues for which enterprises need to be on the lookout:

Some people say that multifactor authentication, single sign-on and the like will solve these traditional web application login security flaws. Maybe they're right, but unless and until all business applications are protected with these controls, we'll continue seeing weaknesses -- and exploitations -- in the web application login process. The most important factor is identifying these vulnerabilities, and the next most important factor is fixing them. These are obvious steps, yet they're taken for granted -- especially the resolution part.

Make sure that you're doing the proper web application testing that includes both unauthenticated and authenticated vulnerability scans using dedicated web vulnerability scanners such as Netsparker and Acunetix Web Vulnerability Scanner, and not simply relying on traditional network vulnerability scanners. Purpose-built web scanners find many more -- and more important -- web flaws.

Still, these common web application login weaknesses are just as easily discovered through manual analysis using a good old-fashioned web browser; an integrated tool set, such as Firefox Web Developer; and maybe an HTTP proxy.

Look at the login process -- including initial user setup and password changes -- from the perspective of an attacker with ill-intent, and you're bound to find login- and even user session management-related weaknesses. Start today. It's better for your enterprise to find and fix these flaws on its own terms than someone else's.

17 Aug 2017

All Rights Reserved, Copyright 2000 - 2024, TechTarget | Read our Privacy Statement