Solutions to common website security vulnerabilities
The following are some common website security vulnerabilities and solutions. Let’s take a look at them.
(Learning video sharing: Programming video)
1. Sql blind injection
Solution: Add filtering
2. Sql injection
Solution: modify the underlying code to eliminate parameterized queries
3. iis file and directory enumeration/Directory listing
Solution: Disable directory browsing
4. webdav directory traversal
Solution: http://www.45it.com/net/201208/31779.htm
5 . _VIEWSTATE is not encrypted
Solution: In
6. File backup vulnerability
Do not place file backup in the WEB root directory
such as http://.. ./web.rar, the backup file needs to be placed in another directory
7. HTTP.sys remote code execution vulnerability
Vulnerability: Microsoft Windows HTTP.sys remote code execution vulnerability (CVE-2015- 1635)(MS15-034)
Solution: Install Microsoft patch package (http://www.gltc.cn/47506.html)
8. Vulnerable Javascript library
Vulnerability : Vulnerable Javascript library
Solution: Update Javascript library
9 Short file name vulnerability
Solution: https://segmentfault.com/a/1190000006225568
If it is invalid: use the following method:
https://www.cnblogs.com/xiaozi/p/5587039.html
If it is iis7 but no request filtering occurs, manually Installation
https://yq.aliyun.com/ziliao/120062
Add a red box line at the location shown
Note that the original default AllowDotInPath= 0 Change to AllowDotInPath =1
Otherwise, some function lists cannot be loaded.
10. Microsoft IIS Duplicate Parameter Request Denial of Service Vulnerability (MS10-065)
The script processing code in IIS has a stack overflow vulnerability when processing duplicate parameter requests. Remote attackers can pass This vulnerability is exploited by sending a specially crafted URI request to the ASP page of the website hosted by IIS, causing the service to crash.
Solution: http://zerobox.org/bug/2716.html
11. IIS Duplicate Parameter Request Denial of Service Vulnerability-CVE-2010-1899
Note: It is speculated that the server has implemented security protection. Even if we install patches and other operations to fix this vulnerability, the school's security rules are still there. , will prevent requests for parameters with the same name or similar parameters. Here link.axd
Disable WebDAV
IIS Disable the webdev function in the extended function. This function can prohibit dangerous actions such as: DELETE-SEARCH-COPY-MOVE-PROPFIND-PROPPATCH-MKCOL-LOCK-UNLOCK-PUT.
https://technet.microsoft.com/zh-cn/library/security/ms10-070. aspx
The above is the detailed content of Solutions to common website security vulnerabilities. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

ZendStudio 13.5.1 Mac
Powerful PHP integrated development environment

Dreamweaver Mac version
Visual web development tools

SecLists
SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.

VSCode Windows 64-bit Download
A free and powerful IDE editor launched by Microsoft

Dreamweaver CS6
Visual web development tools