Minimize Web Applications vulnerabilities through the early Detection of CRLF Injection

03/05/2023
by   MD Asibul Hasan, et al.
0

Carriage return (CR) and line feed (LF), also known as CRLF injection is a type of vulnerability that allows a hacker to enter special characters into a web application, altering its operation or confusing the administrator. Log poisoning and HTTP response splitting are two prominent harmful uses of this technique. Additionally, CRLF injection can be used by an attacker to exploit other vulnerabilities, such as cross-site scripting (XSS). According to Open Web Application Security Project (OWASP), CRLF vulnerabilities are among the top 10 vulnerabilities and are a type of injection attack. Automated testing can help to quickly identify CRLF vulnerabilities, and is particularly useful for companies to test their applications before releasing them. However, CRLF vulnerabilities foster a better approach to mitigate CRLF vulnerabilities in the early stage and help secure applications against high-risk known vulnerabilities. There has been less research on CRLF vulnerabilities and how to detect them with automated testing. There is room for further research to be done on this subject matter in order to develop creative solutions to problems. It will also help to reduce false positive alerts by checking the header response of each request. Security automation is an important issue for companies trying to protect themselves against security threats. Automated alerts from security systems can provide a quicker and more accurate understanding of potential vulnerabilities and can help to reduce false positive alerts. Despite the extensive research on various types of vulnerabilities in web applications, CRLF vulnerabilities have only recently been included in the research. Utilizing automated testing as a recurring task can assist companies in receiving consistent updates about their systems and enhance their security.

READ FULL TEXT
research
04/02/2018

Automatic Web Security Unit Testing: XSS Vulnerability Detection

Integrating security testing into the workflow of software developers no...
research
10/14/2022

Learning Algorithms in Static Analysis of Web Applications

Web applications are distributed applications, they are programs that ru...
research
04/14/2022

A Study on Web Application Vulnerabilities to find an optimal Security Architecture

Over the past three decades, computers have managed to make their way in...
research
06/30/2020

Autosploit: A Fully Automated Framework for Evaluating the Exploitability of Security Vulnerabilities

The existence of a security vulnerability in a system does not necessari...
research
04/02/2018

Detecting Cross-Site Scripting Vulnerabilities through Automated Unit Testing

The best practice to prevent Cross Site Scripting (XSS) attacks is to ap...
research
04/27/2023

Machine Learning for Detection and Mitigation of Web Vulnerabilities and Web Attacks

Detection and mitigation of critical web vulnerabilities and attacks lik...
research
05/17/2022

Twenty-two years since revealing cross-site scripting attacks: a systematic mapping and a comprehensive survey

Cross-site scripting (XSS) is one of the major threats menacing the priv...

Please sign up or login with your details

Forgot password? Click here to reset