Book Image

ASP.NET Core 5 Secure Coding Cookbook

By : Roman Canlas
Book Image

ASP.NET Core 5 Secure Coding Cookbook

By: Roman Canlas

Overview of this book

ASP.NET Core developers are often presented with security test results showing the vulnerabilities found in their web apps. While the report may provide some high-level fix suggestions, it does not specify the exact steps that you need to take to resolve or fix weaknesses discovered by these tests. In ASP.NET Secure Coding Cookbook, you’ll start by learning the fundamental concepts of secure coding and then gradually progress to identifying common web app vulnerabilities in code. As you progress, you’ll cover recipes for fixing security misconfigurations in ASP.NET Core web apps. The book further demonstrates how you can resolve different types of Cross-Site Scripting. A dedicated section also takes you through fixing miscellaneous vulnerabilities that are no longer in the OWASP Top 10 list. This book features a recipe-style format, with each recipe containing sample unsecure code that presents the problem and corresponding solutions to eliminate the security bug. You’ll be able to follow along with each step of the exercise and use the accompanying sample ASP.NET Core solution to practice writing secure code. By the end of this book, you’ll be able to identify unsecure code causing different security flaws in ASP.NET Core web apps and you’ll have gained hands-on experience in removing vulnerabilities and security defects from your code.
Table of Contents (15 chapters)

Chapter 12: Miscellaneous Vulnerabilities

The OWASP Top 10 is the de facto standard for lists used by security professionals to learn about the most common web application vulnerabilities. It is one of the flagship projects by the Open Web Application Security Project (OWASP) organization. As you may have noticed, chapters 2-11 of this book covered each of the 2017 OWASP Top 10 security risks. This report changes every 3 to 4 years, depending on the information collected by security experts in OWASP. New or old risks may be introduced or removed from this collection, but this document is not a complete list, and there are other vulnerabilities that are not covered. This chapter will talk about a few more of the existing risks, some of which are no longer a part of the OWASP Top 10 but are still critical to know.

In this chapter, we're going to cover the following recipes:

  • Fixing the disabled anti-Cross-Site Request Forgery protection
  • Preventing Server-Side Request...