Following reports that cross-site scripting (XSS) vulnerabilities were found this week on travel website Trip Advisor and rideshare site Uber, security experts labelled XSS flaws as the “easiest way for websites to be attacked”.

XSS is a type of computer security vulnerability typically found in website applications. It enables attackers to inject client-side script into Web pages viewed by other users. An XSS vulnerability may be used by attackers to bypass access controls such as the same origin policy.

Malicious hackers

Such vulnerabilities put website users, visitors and administrators at risk of being compromised by malicious hackers, with the potential theft of cookies, personal data, authentication credentials and browser history just the tip of iceberg.

So what can you do to limit the chance of being attacked via an XSS vulnerability? Here, CEO of High-Tech Bridge’s ethical hacking services, shares five security tips for XSS damage limitation.

1. Explain to your web developers that one XSS vulnerability may lead to total compromise of the entire company.

2. Make sure your web developers and server admins respect security best practices. This will already resolve the majority of potential problems.

3. Make sure that your IT team has a clear inventory of your web resources, that there is no abandoned or test web projects that are accessible from the outside.

4. Never rely on your web application firewall (WAF) as the sole security solution aimed to prevent all types of attacks.

5. Regularly conduct web penetration testing by independent companies.

Kolochenko said: “SQL injection vulnerabilities are becoming more and more rare, as well as other high and critical risk vulnerabilities. They are complex to detect and quite often requires a lot of time to exploit. At the same time almost nobody cares about “medium-risk” XSS vulnerabilities leaving their websites vulnerable. Obviously, hackers benefit from such negligence and use XSS vulnerabilities to achieve their goals. If you close your door, don’t forget to close your windows – otherwise the entire security is at risk.”

Duncan Macrae

Duncan MacRae is former editor and now a contributor to TechWeekEurope. He previously edited Computer Business Review's print/digital magazines and CBR Online, as well as Arabian Computer News in the UAE.

Recent Posts

Mozilla Foundation Confirms Layoffs, Eliminates Advocacy Division

Mozilla Foundation axes 30 percent of its staff, and is eliminating its Advocacy Division that…

2 hours ago

Google To Make MFA Mandatory Next Year

Improving security. Mandatory multi-factor authentication (MFA) is coming to the Google Cloud by the end…

3 hours ago

UK Government Launch AI Safety Platform For Businesses

New AI assurance platform from UK government will help businesses ensure they can safely develop…

3 hours ago

Australia Plans Social Media Ban For Children Under 16

Protecting kids? Australian government confirms plan to implement restriction on social media for children under…

5 hours ago

Canada Orders Shutdown Of TikTok’s Canadian Business

Canada ordered China's TikTok business in the country to be dissolved over national security risks,…

7 hours ago

Amazon Boss Denies Return To Office Mandate Is ‘Backdoor Layoff’

CEO Andy Jassy tells Amazon staff that the recent 5-day in-office mandate is not meant…

1 day ago