Versaria + Axway

solving-the-top-11-api-threats

Issue link: https://axway.uberflip.com/i/991646

Contents of this Issue

Navigation

Page 10 of 27

Case in Point: Injection In October 2014, Drupal announced a SQL injection vulnerability 7 that allowed attackers to copy data and otherwise use the victim's Drupal site maliciously. The severity was grave, as attackers immediately began taking over Drupal servers. The rapid reaction from the attacker community led to this dire warning from the Drupal team (emphasis added): " You should proceed under the assumption that every Drupal 7 website was compromised unless updated or patched before Oct 15th, 11pm UTC, that is 7 hours aer the announcement." The event illustrates how easy it can be for an attacker to exploit injection vectors once found; the extreme scale of those attacks; and the catastrophic, system-altering impact they can have on a company and its customers. There's no way to sugarcoat the threat of injection. Safe input/output handling is at least as important as access control and any other security service anywhere in the system, yet it is treated as almost entirely optional in many systems. Consider all input guilty until proven innocent by data sanitization and input validation, and make sure you have strict output encoding in place. 5 http://sqlmap.org 6 https://portswigger.net/burp/ 7 https://www.drupal.org/PSA-2014-003

Articles in this issue

Links on this page

view archives of Versaria + Axway - solving-the-top-11-api-threats