SHARE
Facebook X Pinterest WhatsApp

Top 10 Most Critical Web App Security Risks

Top 10 Most Critical Web App Security Risks Tactical or StrategicOWASP suggests responses, both tactical and strategic, from Ryan Barnett, its director of application security training for breach security. Barnett: tactical responses are mainly handled by security operations staff and aim to minimize the Time-to-Fix exposures, while strategic fixes are for developers to eradicate the […]

Apr 20, 2010
Channel Insider content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

1Top 10 Most Critical Web App Security Risks

Tactical or StrategicOWASP suggests responses, both tactical and strategic, from Ryan Barnett, its director of application security training for breach security. Barnett: tactical responses are mainly handled by security operations staff and aim to minimize the Time-to-Fix exposures, while strategic fixes are for developers to eradicate the underlying weaknesses in the code.

2No Title

Injection Flaws – Tactical Response- Commercial Web Application Firewalls (WAFs) with automated learning capabilities can create proper input validation policies and include negative security signatures to identify attack payloads.- Static/dynamic scanning data is used by a web application firewall to create virtual patches.- By analyzing the outbound pages, WAFs can also identify when an injection flaw is successful by identifying information leakages.

3No Title

Injection Flaws – Strategic Response- Implement the OWASP Enterprise Security API to properly handle and escape user-supplied data.

4No Title

Cross-site Scripting (XSS) – Tactical Response- Commercial WAFs with automated learning capabilities can create proper input validation policies and include negative security signatures to identify attack payloads. – Static/dynamic scanning data is used by a web application firewall to create virtual patches.- By analyzing outbound data, WAFs can also be used to identify when applications do not properly output escape user-supplied data when sending it to users.

5No Title

Cross-site Scripting (XSS) – Strategic Response- Implement the OWASP Enterprise Security API to properly handle and escape user-supplied data. – Have developers review the OWASP XSS Cheatsheet.

6No Title

Broken Authentication and Session Management – Tactical Response- WAFs can detect Session Hijacking attempts when attackers try and use stolen SessionIDs.- WAFs can identify when attackers manipulate Cookie data. – WAFs can also be used to identify application defects such as when applications fail to use cookie flags such as HTTPOnly which help to prevent Session Hijacking via XSS.

7No Title

Broken Authentication and Session Management – Strategic – Implement the OWASP Enterprise Security API Authenticator and User API.

8No Title

Insecure Direct Object Reference – Tactical Response – Commercial WAFs with automated learning capabilities can create proper input validation policies to identify when attacker manipulate hidden form fields. – WAFs also include negative security signatures to identify attack payloads that point to other unauthorized files. – By analyzing the outbound pages, WAFs can also identify when an injection flaw is successful by identifying information leakages.

9No Title

Insecure Direct Object Reference – Strategic Response- Implement the OWASP Enterprise Security API and use indirect reference maps.

10No Title

Cross-site Request Forgery (CSRF): Tactical Response – Use a WAF to implement a unique CSRF token into web pages and then validate them on subsequent requests.

11No Title

Cross-site Request Forgery (CSRF): Strategic – Implement the OWASP CSRFGuard.

12No Title

Security Misconfiguration: Tactical Response – WAFs can be used to identify when there are information leakages and improper error handling issues as these are often used by attackers to fine tune attack payloads and extract data.- Static/dynamic scanning data is used by a web application firewall to create virtual patches.

13No Title

Security Misconfiguration: Strategic Response- Ensure that all configurations are set appropriately when moving from Dev/Staging into Production.

14No Title

Patch Management Processes, Failure to Restrict URL Access: Tactical Response- Commercial WAFs with automated learning capabilities can identify forceful browsing attempts. – In addition, controling URL access also includes setting proper access rate thresholds (anti-automation) to identify/prevent Denial of Service, Brute Force and Scraping attacks.

15No Title

Patch Management Processes: Strategic Response- Implement the OWASP Enterprise Security API Access Control API.

16No Title

Unvalidated Redirects and Forwards: Tactical Response- A WAF can be used to validate the URL locations used in parameter redirection to only allow proper locations.

17No Title

Unvalidated Redirects and Forwards: Strategic Response- Use the OWASP Enterprise Security API override the SendRedirect() Method and return safe locations.

18No Title

Insecure Cryptographic Storage: Tactical Response- A WAF can be used to identify if web applications are not properly encrypting sensitive user data in databases if this data is sent back out the clients.

19No Title

Insecure Cryptographic Storage: Strategic Response- Use the OWASP Enterprise Security API Encryptor API.

20No Title

Insufficient Transport Layer Security: Tactical Response- A WAF can be used to identify application defects such as when an application fails to use the "Secure" cookie flag when sending data to the client over an encrypted channel or if a user is sending sensitive data (login credentials or Credit Card data) over an unencrypted channel.

21No Title

Insufficient Transport Layer Security: Strategic Response- Ensure that SSL is properly implemented on all sensitive data paths included back-end connections to database systems.

Recommended for you...

SailPoint Intros Accelerated Application Management Solution
Jordan Smith
Aug 22, 2025
ConnectWise Partners with Proofpoint on Security in Asio
Jordan Smith
Aug 22, 2025
RegScale CRO on Channel Growth in Risk & Compliance
Victoria Durgin
Aug 22, 2025
Sherweb Expanding Portfolio Offerings With Expert Guidance
Jordan Smith
Aug 15, 2025
Channel Insider Logo

Channel Insider combines news and technology recommendations to keep channel partners, value-added resellers, IT solution providers, MSPs, and SaaS providers informed on the changing IT landscape. These resources provide product comparisons, in-depth analysis of vendors, and interviews with subject matter experts to provide vendors with critical information for their operations.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.