信息安全研究 ›› 2020, Vol. 6 ›› Issue (2): 181-187.

• 技术应用 • 上一篇    下一篇

互联网企业Web系统易忽视漏洞分析

潘志岗   

  1. 北京航空航天大学
  • 收稿日期:2020-02-08 出版日期:2020-02-10 发布日期:2020-02-08
  • 通讯作者: 潘志岗
  • 作者简介:潘志岗 硕士研究生,主要研究方向为Web安全、网络攻防. duzun1015@gmail.com

Analysis on the Vulnerability of Internet Enterprise Web System to Being Easily Ignored

  • Received:2020-02-08 Online:2020-02-10 Published:2020-02-08

摘要: 随着数字产业的快速发展,互联网企业的数量逐年增长.相比于其他类型的企业,互联网企业的一个显著特征是主体业务基于大量Web系统,因此Web系统的高安全性在互联网企业中尤为重要.Web系统通过丰富的功能给用户带来便捷的同时也引入了许多安全问题,尤其是近些年频繁发生的用户隐私信息泄露事件,起因大多来源于Web系统的安全缺陷.越来越多的互联网企业开始建设安全应急响应中心,通过各方的安全力量对企业系统进行安全测试和评估,进行安全漏洞的收集和处理,由此可见现代互联网企业对于安全的重视不断提高.基于Web系统的安全现状,通过分析归纳3类互联网企业中易被忽略的典型漏洞,并给出相应的解决办法,以提高互联网企业Web系统的安全性,保障用户信息安全.

关键词: Web安全, 渗透测试, 跨站请求伪造, 跨域资源共享, JSON劫持

Abstract: With the rapid development of the digital industry, the number of Internet companies has increased year by year. Compared with other types of enterprises, a significant feature of Internet companies is that the main business is based on a large number of Web systems, so the high security of Web systems is particularly important in Internet companies. Web systems bring convenience to users through rich functions, and also introduce many security issues, especially the leakage of user privacy information that have occurred frequently in recent years, mostly due to security flaws in Web systems. More and more Internet companies have begun to build security emergency response centers to conduct security testing and evaluation of enterprise systems through the security forces of all parties, and to collect and handle security vulnerabilities. It can be seen that modern Internet companies have given increasing attention to security. Based on the security status of the Web system, the typical vulnerabilities that are easily overlooked in the three types of Internet companies are analyzed and summarized, and corresponding solutions are provided to improve the security of the Web systems of Internet companies and ensure user information security

Key words: Web security, penetration test, cross-site request forgery, cross-domain resource sharing, JSON hijacking