XSS may be the easiest way for someone to attack your website, but there are self-defence steps you can take
Following reports that cross-site scripting (XSS) vulnerabilities were found this week on travel website Trip Advisor and rideshare site Uber, security experts labelled XSS flaws as the “easiest way for websites to be attacked”.
XSS is a type of computer security vulnerability typically found in website applications. It enables attackers to inject client-side script into Web pages viewed by other users. An XSS vulnerability may be used by attackers to bypass access controls such as the same origin policy.
Such vulnerabilities put website users, visitors and administrators at risk of being compromised by malicious hackers, with the potential theft of cookies, personal data, authentication credentials and browser history just the tip of iceberg.
1. Explain to your web developers that one XSS vulnerability may lead to total compromise of the entire company.
2. Make sure your web developers and server admins respect security best practices. This will already resolve the majority of potential problems.
3. Make sure that your IT team has a clear inventory of your web resources, that there is no abandoned or test web projects that are accessible from the outside.
4. Never rely on your web application firewall (WAF) as the sole security solution aimed to prevent all types of attacks.
5. Regularly conduct web penetration testing by independent companies.
Kolochenko said: “SQL injection vulnerabilities are becoming more and more rare, as well as other high and critical risk vulnerabilities. They are complex to detect and quite often requires a lot of time to exploit. At the same time almost nobody cares about “medium-risk” XSS vulnerabilities leaving their websites vulnerable. Obviously, hackers benefit from such negligence and use XSS vulnerabilities to achieve their goals. If you close your door, don’t forget to close your windows – otherwise the entire security is at risk.”