Adding protection from web vulnerabilities
SQL injection, SSRF, and XSS attacks are the most common web vulnerabilities that corrupt many web applications. They also affect any applications that use HTTP-based transactions, such as POST
, PUT
, PATCH
, and DELETE
. SQL injection occurs when an attacker infiltrates the backend datastore that manages the content of the trusted application. Embedded malicious SQL code can tamper with the data, rendering unwanted pages or destroying the database. XSS attacks commonly insert malicious scripts into the pages of the application to steal cookies, session data, and sensitive credentials from the system. On the other hand, CSRF occurs inside an authenticated environment. It happens when a valid user performs an HTTP transaction and a malicious script lurking in the browser usurps valid credentials with bogus and invalid ones to lead transactions to untrusted systems.
Applying form validation to request data
One solution to avoid these attacks...