PHP: Vulnerabilities and Solutions

Ramadevi Yenduri,Mahmood Al-khassaweneh

2022 2nd International Mobile, Intelligent, and Ubiquitous Computing Conference (MIUCC)(2022)

引用 1|浏览3
暂无评分
摘要
The vulnerabilities are found not only in the programming language syntax and core but also in the coding style of the programmer. It is necessary to welcome good coding practice with security in mind for every programmer and programming language student. In this work, a 5-steps model is proposed that can improve the coding style of the programmers and also help build secure web applications. This paper concentrates on practical implementation of server-side and client-side vulnerabilities and their solutions backed by two web applications developed using PHP. The first web application follows poor programming practice whereas the second web application follows 5-steps model with other recommendations. Both of the web applications were scanned using open source “man-in-the-middle” proxy tool and the outcome showed that following 5-steps model and using latest programming constructs and functions improve the coding practice dramatically and results in a secure web application.
更多
查看译文
关键词
PHP,vulnerabilities,security,SQL injection,XSS,CSRF,command injection,file inclusion,file upload,full path disclosure,directory traversal,OWASP ZAP
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要