CONTACT US
info@bidaiondo.com

7 out of 10 corporate web applications show access failures and data exposure

A study carried out by experts from the Kaspersky Security Assessment team has identified the most dangerous and widespread vulnerabilities in internally developed corporate web applications. Between 2021 and 2023, flaws related to access control and data protection were found in the majority of the applications examined, totaling several dozen. The largest number of high-risk vulnerabilities were SQL injections.

Corporate web applications such as social networks, email and online services are web pages where users interact with a server through a browser. Kaspersky's latest study investigated vulnerabilities in these applications used by IT, insurance, telecommunications, cryptocurrency, e-commerce, healthcare, and government companies to identify the most common types of attacks that occur to businesses1.

The most notable vulnerabilities involved the potential for malicious use of access control flaws, as well as in the protection of sensitive data. Between 2021 and 2023, 70% of the apps examined in the study showed weaknesses in these categories.

When a vulnerability breaks access control, attackers attempt to bypass website policies that limit users' authorized permissions. This may result in unauthorized access and alteration or deletion of data, among other things. The second most common breach recorded is the exposure of sensitive information such as passwords, credit card details, medical records, personal data and sensitive business information, highlighting the need for greater security measures.

“The rating was carried out taking into account the most common vulnerabilities in web applications developed internally in various companies and their risk level. For example, one of these vulnerabilities could allow attackers to steal user authentication data, while another could help execute malicious code on the server, each with varying degrees of consequences for business continuity and resilience. This is reflected in our rankings based on the team's practical experience in carrying out security analysis projects,” explains Oxana Andreeva, security expert on the Kaspersky Security Assessment team.

Likewise, Kaspersky experts analyzed the danger posed by these defects in the companies mentioned above. According to the study, the largest proportion of high-risk vulnerabilities were associated with SQL injections, specifically, 88% of all SQL injection vulnerabilities analyzed were considered high risk. On the other hand, analysts found another major flaw linked to weak passwords used by users, with a total of 78% of vulnerabilities classified as high risk. According to the Kaspersky Security Assessment team, only 22% of all web applications studied had weak passwords. This may be because the applications included in the study sample were run on real systems, not test versions.

Fixing vulnerabilities found in web applications will help companies protect sensitive data and avoid compromising these apps, as well as related systems. To improve security and detect possible attacks, the Kaspersky Security Assessment team recommends:

     Use secure software, such as Secure Software Development Lifecycle (SSDLC).
     Perform periodic security assessments on applications.
     Use logging and monitoring mechanisms to track application performance.

To delve deeper into the study, visit the Securelist website. The vulnerabilities described in the research align with the categories and subcategories of the OWASP Top Ten classification.

Last news

base_url:
host: www.bidaiondo.com
REQUEST_URI: /articulos/7-de-cada-10-aplicaciones-web-corporativas-muestran-fallos-de-acceso-y-exposicion-de-datos
path: /news/all-about-the-influencer-law-a-temporary-patch-or-a-lasting-measure
All about the Influencer Law: a "temporary patch" or a lasting measure?
The government of Spain approved the Influencers Law with the aim of regulating the activity of content creators on social networks and protecting consumers from covert or harmful advertising. This regulation will apply to all content creators who ha...
base_url:
host: www.bidaiondo.com
REQUEST_URI: /articulos/7-de-cada-10-aplicaciones-web-corporativas-muestran-fallos-de-acceso-y-exposicion-de-datos
path: /noticias/apple-ya-pronuncia-inteligencia-artificial-asoma-como-una-estrategia-post-iphone-que-llegara-con-socios
Apple already pronounces 'Artificial Intelligence'. It appears as a post-iPhone strategy that will arrive with partners
WWDC 2023, Apple's event for its developers in which it revealed the Vision Pro, left a curiosity: the company did not once utter 'Artificial Intelligence' despite it being the technological hype train. In the quarterly results that he...

online trading systems.

We show you the best way to market products and services online, through a professional service of installation, management and maintenance of your virtual store

We program to suit you

We help you achieve operational excellence in all your business processes, whether they are production, logistics, service or office processes. In addition, we assure you to maintain continuous improvement in your management.

Bidaiondo Articles

Quishing: what it is, how it works and how to avoid and protect yourself from this type of cyber scam

We are going to explain to you what quishing is, a type of scam similar to phishing, but which is based on deceiving you using QR codes. This is a scam in which they pass off a code as legitimate, and take you to a website where they can steal your data. We are going to explain this article by explaining what exactly quishing is, and its main characteristics. This will make you able to identify it and differentiate it from other types of scam,...

Ver más »

Phishing emails are the source of 90% of attacks on companies

Email is one of the main technological innovations that has revolutionized the way we understand the world, as well as reconfigured the business model. Since its invention in 1965, the evolution of this means of communication has been transgressive, and according to data from Statista, there were already more than 4.26 billion users using email in 2022 and the number of emails sent on that same date amounted to 330,000 million, with a growth fore...

Ver más »