Subscribe Now Subscribe Today
Science Alert
 
FOLLOW US:     Facebook     Twitter
Blue
   
Curve Top
Journal of Software Engineering
  Year: 2014 | Volume: 8 | Issue: 3 | Page No.: 116-126
DOI: 10.3923/jse.2014.116.126
Input Validation Vulnerabilities in Web Applications
Navdeep Kaur and Parminder Kaur

Abstract:
With the growth of internet, web applications have become very popular and used in every environment like medical, financial and military. But in the race to develop these online services, web applications have been developed and deployed with minimal attention given to security risks which leads to vulnerabilities in web application. Developers are mandated to deliver functionality on time and on budget but not to develop secure web applications, resulting in development of vulnerable web applications. Removing vulnerabilities after development wastes cost as well as time. So, why not Security is implemented throughout software development lifecycle it will save time and cost. Thousands of vulnerabilities are there in existing web application but this study focused on input validation vulnerabilities i.e., SQL injection and Cross Site Scripting (XSS), as they are more prevalent and have high risk. A brief introduction of web application vulnerabilities is discussed in this study. How cross site scripting and SQL injection vulnerabilities are addressed throughout the software development lifecycle is discussed. Different activities to be performed to mitigate them are suggested.
 [Fulltext PDF]   [Fulltext HTML]   [XML: Abstract + References]   [References]   [View Citation]  [Report Citation]
How to cite this article:

Navdeep Kaur and Parminder Kaur, 2014. Input Validation Vulnerabilities in Web Applications. Journal of Software Engineering, 8: 116-126.

DOI: 10.3923/jse.2014.116.126

URL: https://scialert.net/abstract/?doi=jse.2014.116.126

 
COMMENT ON THIS PAPER
.
 
 
 
 

 

 
 
 
 
 
 
 
 
 

 
 
 
 
 

Curve Bottom