123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

Top Five Php Vulnerabilities – A Programmer Should Know

Profile Picture
By Author: Anna Harris
Total Articles: 60
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

For the development of the dynamic websites, PHP is the most preferred language. This server side scripting language, loaded with numerous features and functionalities is quite easy to understand and apply. However, there are certain features that enable a programmer to unknowingly allow security holes to creep into a web application.

In spite of these vulnerabilities, this general purpose programming language can be as secure as other languages, once the basic types of flaws in PHP web applications is well understood. In this article, we have listed some of the worst blunders for you to consider and how it influences the security practices of PHP developers.

Source Code Revelation
It is well known that PHP is a server side framework, so you don’t have any access to view source if you want to see a script’s code. But, in the event of breakdown of Apache’s configuration, people can easily view the name and content of the files.

Thus, when anything goes wrong with Apache, then all the scripts are served on the plain text, and people have access to it, which they aren't suppose to have. ...
... Some of these accessible files may have sensitive information like database credentials. So, it is essential to lock such files away from the publicly accessible directory to avoid the consequences of such vulnerability.

Directory Traversal
Like the previous one, this attack looks for sites that have no security, where it should be. Finding such web sties, it works on the files to be accessed that the developer did not thought to make it publicly available. It's also known as the climbing attack or the backtracking attack.

There are a few ways to avoid this blunder. The first thing you can do is to shortlist the pages, which you want to be returned for such a given request using white-listing. The second option is to transfer the file paths to absolute paths and making sure that they are referencing files in allowed directories.

Session ID Protection
With most of the PHP websites, Session ID hijacking causes a serious problem. For each of the user's session, the PHP session tracking component has a unique ID. But, in case, this ID is known to another person, then he/she can easily hijack the user's session and can easily drive the information which should be confidential.

This type of vulnerability can not be prevented completely, so you should know the risks and ways to mend it. One way to stop this is by storing your session ID in a spot, which is only accessibly by scripts, either on disk or in a database.

SQL Injection
Compared to others, this is the number one on the hit list. In this type of blunder, anyone can enter an SQL fragment as a value in your URL or web form. Then, the person can easily know your table names and access your secret files.

How to avoid this type of danger? The best way is to use PDO Prepared Statements. These statements segregate the data from the instructions. This helps to prevent the data from being treated as anything other than data.

These are just the five issues that you need to be careful during PHP development. Because, if you are not alert and careful, these blunders can allow your PHP application to be transgressed.

Article Source: http://www.hiddenbrains.com/articles/top-five-php-vulnerabilities-a-programmer-should-know.html

Total Views: 247Word Count: 550See All articles From Author

Add Comment

Computers Articles

1. Web Scraping Top Grocery Chains In Michigan
Author: FoodDataScrape

2. How Refurbished Laptops Help Students Save Money And Study Smarter In 2025
Author: usedstore

3. Why The Ls3002 Barcode Scanner Is Perfect For Retail In 2025
Author: prime pos

4. Does Cleaning Temporary Files Really Improve Laptop Speed? (what To Expect)
Author: Neha Jain

5. Extract Supermarket Data From Walmart & Target In Usa
Author: FoodDataScrape

6. How Odoo Partners Drive Growth: From Implementation To Innovation
Author: Alex Forsyth

7. Leverage Web Scraping Cold Drinks Data On Swiggy Instamart
Author: FoodDataScrape

8. Empowering Universities Through Student Engagement Crm Solutions|e2s
Author: Brenda Joyce

9. Odoo Manufacturing And Lean Practices For Small And Medium Enterprises
Author: Alex Forsyth

10. How Posiflex Pos Machines Enhances Customer Service
Author: pbs

11. Scrape Keeta Food Delivery App Data In Saudi Arabia For Insights
Author: FoodDataScrape

12. Microsoft Office Professional Plus 2021 Vs. Microsoft Office Professional Plus 2024: Which One Should You Choose?
Author: davudobuya55

13. Microsoft Office Professional Plus 2019 Vs. Microsoft Office Professional Plus 2019 Dvd: Which Version Should You Choose?
Author: davudobuya55

14. Microsoft Office Professional 2024 Vs. Microsoft Office Professional Plus 2010: Which One Is Right For You?
Author: davudobuya55

15. Microsoft Office Home Business 2021 For Mac Vs Microsoft Office Home Student 2021 For Mac: Which Is Right For You?
Author: davudobuya55

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: