SlideShare a Scribd company logo
Securing against Data theft by vulnerable
dependencies in your App
- @JagdshLK
Content
● Workshop
○ Build a page which leaks sensitive information.
○ Find out how the data breach occurred.
● What just happened?
● How to find these type of vulnerability?
● Prevention Measures
Workshop:
Let’s build a Login and a Payment page!!!
Workshop - Steps
Software Prerequisites:
● Git
● Node 10.4.1 or above
● npm 6.1.0 or above
Steps:
1. Github search for “VodQA Securing Data theft demo” and clone it.
2. Follow the Readme.Md
3. Develop a login page
4. Develop a payment page which accepts Credit card
README.md
Getting Started
Prerequisites
Make sure you have Node v10.4.1 or above and npm 6.1.0 or above.
Installing
Clone the repo and run the following inside the cloned directory.
npm install
Running the application
run the following command to run the application
npm start
What just happened?
Package Manager
Vulner
Packa
UI Code
Username:
Password:
https://www.vulnerabledependency.com
Production
Vulner
Packa
app.bundle.js
Vulnerable
Package
package.json
● Collect logs and analyse cross domain calls triggered.
● Beware and decode every information send out of the website and verify the content.
● Analysing the dependency package before using it.
How to find this type of vulnerable?
Prevention measures
● Try not to load 3rd party libraries in sensitive information pages.
● Check your dependencies is listed in OWASP Common Vulnerabilities and Exposures
(CVE).
○ Making sure CI build fails if a vulnerable dependency is found in frameworks
package manager using OWASP tools.
● Ensure your Dependencies is up to date with latest security patches, if any.
● Always use Vulnerability Scanning tools to check for any vulnerables.
● Report a vulnerability found.
● [DEV SPECIFIC] Overwrite the HttpRequest in UI to make sure all requests go through the
overwritten HTTPRequest.
How to read a CVE?
Major Terms:
● VSS Score
● Confidentiality Impact
● Integrity Impact
● Availability Impact
● Access Complexity
● Authentication
● Vulnerability Type(s)
● CWE ID
Reference
■ https://www.owasp.org/index.php/OWASP_Dependency_Check
■ https://blog.rapid7.com/2016/04/05/client-side-logging-in-javascript/
■ https://jeremylong.github.io/DependencyCheck/
■ https://nvd.nist.gov/vuln/search
■ https://www.owasp.org/index.php/Category:Vulnerability_Scanning_Tools
■ https://www.cvedetails.com/
■ https://www.first.org/cvss/specification-document
■ https://github.com/Jagdsh/VodQA_Securing_Data_theft-demo_reciever
■ https://github.com/Jagdsh/VodQA_Securing_Data_theft-demo

More Related Content

PDF
Make CSRF Again
PDF
Tale of Forgotten Disclosure and Lesson learned
PDF
The Art of Executing JavaScript by Akhil Mahendra
PDF
Wordpress security best practices - WordCamp Waukesha 2017
PPTX
Same-origin Policy (SOP)
PDF
Hacking Vulnerable Websites to Bypass Firewalls
PDF
Securing your AngularJS Application
PPTX
WebdriverIO: the Swiss Army Knife of testing
Make CSRF Again
Tale of Forgotten Disclosure and Lesson learned
The Art of Executing JavaScript by Akhil Mahendra
Wordpress security best practices - WordCamp Waukesha 2017
Same-origin Policy (SOP)
Hacking Vulnerable Websites to Bypass Firewalls
Securing your AngularJS Application
WebdriverIO: the Swiss Army Knife of testing

Similar to Securing against data theft against Vulnerable dependency (20)

PDF
Web Application Security: Introduction to common classes of security flaws an...
PDF
Tw noche geek quito webappsec
PDF
AnitaB-Atlanta-CyberSecurity-Weekend-Rana-Khalil.pdf
PPTX
Web Security Terms such as what is a WAF, Access Control, Output Encoding ....
PDF
WebGoat.SDWAN.Net in Depth
PDF
WebGoat.SDWAN.Net in Depth: SD-WAN Security Assessment
PDF
Owasp top 10 2013
PDF
Best Practices for Developing Secure Web Applications
PDF
Application Security - Your Success Depends on it
PPTX
Security-Web Vulnerabilities-Browser Attacks
PPTX
Introduction to Web Application Penetration Testing
PDF
Web Security: What's wrong, and how the bad guys can break your website
PDF
CodeMotion 2023 - Deep dive nella supply chain della nostra infrastruttura cl...
PDF
The State of the Veil Framework
PDF
AV Evasion with the Veil Framework
PDF
Uygulama guvenligi gunu - malicious web sites
PDF
Owasp masvs spain 17
PPTX
The Hacking Games - A Road to Post Exploitation Meetup - 20240222.pptx
PDF
React commonest security flaws and remedial measures!
Web Application Security: Introduction to common classes of security flaws an...
Tw noche geek quito webappsec
AnitaB-Atlanta-CyberSecurity-Weekend-Rana-Khalil.pdf
Web Security Terms such as what is a WAF, Access Control, Output Encoding ....
WebGoat.SDWAN.Net in Depth
WebGoat.SDWAN.Net in Depth: SD-WAN Security Assessment
Owasp top 10 2013
Best Practices for Developing Secure Web Applications
Application Security - Your Success Depends on it
Security-Web Vulnerabilities-Browser Attacks
Introduction to Web Application Penetration Testing
Web Security: What's wrong, and how the bad guys can break your website
CodeMotion 2023 - Deep dive nella supply chain della nostra infrastruttura cl...
The State of the Veil Framework
AV Evasion with the Veil Framework
Uygulama guvenligi gunu - malicious web sites
Owasp masvs spain 17
The Hacking Games - A Road to Post Exploitation Meetup - 20240222.pptx
React commonest security flaws and remedial measures!
Ad

Recently uploaded (20)

PDF
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
PDF
Design an Analysis of Algorithms I-SECS-1021-03
PDF
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
PDF
System and Network Administration Chapter 2
PDF
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
PPTX
VVF-Customer-Presentation2025-Ver1.9.pptx
PDF
medical staffing services at VALiNTRY
PPTX
Odoo POS Development Services by CandidRoot Solutions
PDF
Understanding Forklifts - TECH EHS Solution
PPTX
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
PDF
Digital Strategies for Manufacturing Companies
PDF
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
PDF
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
PPTX
CHAPTER 2 - PM Management and IT Context
PDF
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
PDF
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
PDF
Wondershare Filmora 15 Crack With Activation Key [2025
PDF
Nekopoi APK 2025 free lastest update
PDF
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
Design an Analysis of Algorithms I-SECS-1021-03
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
System and Network Administration Chapter 2
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
VVF-Customer-Presentation2025-Ver1.9.pptx
medical staffing services at VALiNTRY
Odoo POS Development Services by CandidRoot Solutions
Understanding Forklifts - TECH EHS Solution
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
Digital Strategies for Manufacturing Companies
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
CHAPTER 2 - PM Management and IT Context
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
Wondershare Filmora 15 Crack With Activation Key [2025
Nekopoi APK 2025 free lastest update
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
Ad

Securing against data theft against Vulnerable dependency

  • 1. Securing against Data theft by vulnerable dependencies in your App - @JagdshLK
  • 2. Content ● Workshop ○ Build a page which leaks sensitive information. ○ Find out how the data breach occurred. ● What just happened? ● How to find these type of vulnerability? ● Prevention Measures
  • 3. Workshop: Let’s build a Login and a Payment page!!!
  • 4. Workshop - Steps Software Prerequisites: ● Git ● Node 10.4.1 or above ● npm 6.1.0 or above Steps: 1. Github search for “VodQA Securing Data theft demo” and clone it. 2. Follow the Readme.Md 3. Develop a login page 4. Develop a payment page which accepts Credit card
  • 5. README.md Getting Started Prerequisites Make sure you have Node v10.4.1 or above and npm 6.1.0 or above. Installing Clone the repo and run the following inside the cloned directory. npm install Running the application run the following command to run the application npm start
  • 6. What just happened? Package Manager Vulner Packa UI Code Username: Password: https://www.vulnerabledependency.com Production Vulner Packa app.bundle.js Vulnerable Package package.json
  • 7. ● Collect logs and analyse cross domain calls triggered. ● Beware and decode every information send out of the website and verify the content. ● Analysing the dependency package before using it. How to find this type of vulnerable?
  • 8. Prevention measures ● Try not to load 3rd party libraries in sensitive information pages. ● Check your dependencies is listed in OWASP Common Vulnerabilities and Exposures (CVE). ○ Making sure CI build fails if a vulnerable dependency is found in frameworks package manager using OWASP tools. ● Ensure your Dependencies is up to date with latest security patches, if any. ● Always use Vulnerability Scanning tools to check for any vulnerables. ● Report a vulnerability found. ● [DEV SPECIFIC] Overwrite the HttpRequest in UI to make sure all requests go through the overwritten HTTPRequest.
  • 9. How to read a CVE? Major Terms: ● VSS Score ● Confidentiality Impact ● Integrity Impact ● Availability Impact ● Access Complexity ● Authentication ● Vulnerability Type(s) ● CWE ID
  • 10. Reference ■ https://www.owasp.org/index.php/OWASP_Dependency_Check ■ https://blog.rapid7.com/2016/04/05/client-side-logging-in-javascript/ ■ https://jeremylong.github.io/DependencyCheck/ ■ https://nvd.nist.gov/vuln/search ■ https://www.owasp.org/index.php/Category:Vulnerability_Scanning_Tools ■ https://www.cvedetails.com/ ■ https://www.first.org/cvss/specification-document ■ https://github.com/Jagdsh/VodQA_Securing_Data_theft-demo_reciever ■ https://github.com/Jagdsh/VodQA_Securing_Data_theft-demo

Editor's Notes

  • #4: Call out Hint: Through which medium server to server communication happen?
  • #5: https://git.thoughtworks.net/security-vulneraibility-apps/vulnurable_dependency_app/blob/master/README.md
  • #6: 10.134.125.167
  • #7: It is a type of DOM-based cross site scripting (XSS) - where the vulnerability is in the client-side code rather than the server-side code.
  • #9: Show to check a dependency is listed in CVE