Security Vulnerability
Security Vulnerability
Security Vulnerability
Nowadays, organizations face a lot of multiple security threats that can compromise
sensitive information and user trust. In this report, it tackles the three critical application
real-world and theoretical example together with its impact to provide a deeper
Vulnerability Identification
1. SQL Injection
- A vulnerability where attackers insert malicious SQL code into a web application.
This occurs when the application dynamically constructs SQL queries without
properly validating user inputs. Through this technique, attackers can manipulate the
operations.
In example of SQL Injection, a recent case involving a managed file transfer application
unauthorized access to sensitive data. This risk is exemplified by the 2011 Sony
Pictures hack, where attackers exploited SQL injection to bypass authentication and
The impact of SQL injection includes data theft, unauthorized modification, or complete
understand how these attacks work and how to secure web applications
effectively.
• Don’t Trust User Input: Any user input should be treated as untrusted. Input
validation and security checks must be applied to ensure that malicious data
• Regular Security Scans: Perform regular security scans to detect and resolve
2. Buffer Overflow
- Buffer overflow occurs when a program writes more data to a buffer than it can hold.
computing history. In example, the 2017 WannaCry virus exploited a vulnerability in the
Windows Server Message Block protocol, infecting over 230,000 computers in a single
Its impact can lead to significant system crashes, resulting in downtime and reduced
service availability. These attacks may cause programs to enter infinite loops, further
destabilizing the system. Additionally, they often enable the execution of arbitrary
codes, which can bypass established security policies. Once attackers gain access,
measures.
These are the mitigation strategies to prevent the Buffer Overflow risk:
reduce the risk, as they have built-in safeguards against buffer overflows.
• Bounds Checking: Code should always include checks to ensure that data
being written does not exceed the allocated buffer size. Validating input lengths
3. Broken Authentication
cyberattacks.
weak passwords through techniques like credential stuffing, where attackers use
technique is session hijacking, where attackers take control of an active user session by
stealing session IDs. This vulnerability can arise if an application inadequately manages
session IDs, such as failing to invalidate them after a user logs out or permitting them to
be included in URLs.
accounts allows attackers to steal sensitive data, including personal data such as credit
card details and social security numbers. This can lead to significant financial losses for
reputation can damaged resulting in a loss of customer trust. End-users may also
• Avoid Session IDs in URLs: Session IDs should never be included in URLs,
anyone with access can hijack the session. Instead, store session IDs in
• Adjust Session Lengths: Adjust lengths based on application use such as,
money transfer app should log users out after few minutes of inactivity, while a
security. This ensures that stolen passwords alone cannot grant access.
data. The three vulnerabilities discussed present significant risks that can result in
practices to mitigate these risks. Security should be a priority for individuals and
organizations to safeguard their assets. In doing so, they not only protect their data but
also maintain a positive image and reputation, gaining trust among users and
stakeholders.
REFERENCES:
Yasar, K., Hanna, K. T., & Lewis, S. (2023, April 27). SQL injection (SQLi). Software
Quality. https://www.techtarget.com/searchsoftwarequality/definition/SQL-injection
What is buffer overflow? Attacks, types & vulnerabilities | Fortinet. (n.d.). Fortinet.
https://www.fortinet.com/resources/cyberglossary/buffer-overflow
Welekwe, A., & Welekwe, A. (2023, September 27). Buffer overflow vulnerabilities and
attacks explained. Comparitech. https://www.comparitech.com/blog/information-
security/buffer-overflow-attacks-vulnerabilities/
Marić, N. (2024, September 6). Broken authentication: impact, examples, and how to fix
it. Bright Security. https://brightsec.com/blog/broken-authentication-impact-examples-
and-how-to-fix-it/
Authgear. (2023, July 14). Broken authentication: What is it and how to prevent it.
Authgear. https://www.authgear.com/post/broken-authentication-what-is-it-and-how-to-
prevent-it#prevent-broken