Web Security
Web security is a critical aspect of frontend development. Understanding security vulnerabilities and best practices helps protect users and applications from various attacks. This guide covers key security concepts for frontend developers.
Cross-Site Scripting (XSS)
XSS attacks involve injecting malicious scripts into web pages viewed by other users. These scripts execute in the victim’s browser and can steal cookies, session tokens, or personal information.
Types of XSS Attacks
1. Stored (Persistent) XSS
Malicious script is permanently stored on the target server (e.g., in a database):
- Attacker posts a comment with malicious JavaScript on a blog
- Server stores the comment in its database
- When other users view the page with the comment, the script executes in their browsers
1 | <!-- User-generated content with malicious script --> |
2. Reflected XSS
Script is reflected off a web server but not stored:
- Attacker crafts a URL with malicious code
- Victim clicks the link
- Server includes the malicious string in the response
- Script executes in the victim’s browser
1 | https://example.com/search?q=<script>alert(document.cookie)</script> |
3. DOM-based XSS
Vulnerability exists in client-side code rather than server-side:
1 | // Unsafe code |
XSS Prevention
1. Output Encoding/Escaping
Always encode user-generated content before inserting it into the DOM:
1 | // Instead of: |
2. Content Security Policy (CSP)
CSP is an HTTP header that restricts which resources can be loaded and executed:
1 | Content-Security-Policy: default-src 'self'; script-src 'self' https://trusted.com; object-src 'none'; |
The above policy allows scripts only from the same origin and trusted.com, blocks all plugins.
3. Sanitization Libraries
Use established libraries to clean user input:
1 | // Using DOMPurify |
4. Frameworks with Built-in Protection
Modern frameworks like React automatically escape values in JSX:
1 | // In React, this is safe: |
Cross-Site Request Forgery (CSRF)
CSRF tricks users into performing actions on a website where they’re authenticated, without their knowledge.
CSRF Attack Example
- User logs into bank.com and receives a session cookie
- Without logging out, user visits malicious-site.com
- Malicious site contains a form or script that submits to bank.com/transfer
- The browser automatically includes the bank.com cookies with the request
- The bank processes the transfer, believing it’s legitimate
1 | <!-- On malicious-site.com --> |
CSRF Prevention
1. CSRF Tokens
Include a unique, unpredictable token with each form submission:
1 | <form action="/transfer" method="post"> |
Server-side code must:
- Generate the token and store it in the user’s session
- Validate the token with each request
- Reject the request if the token is missing or invalid
2. SameSite Cookie Attribute
Restricts when cookies are sent with cross-site requests:
1 | Set-Cookie: sessionid=abc123; SameSite=Strict; Secure; HttpOnly |
SameSite values:
Strict
: Cookies only sent in first-party contextLax
: Cookies sent with top-level navigations and safe HTTP methodsNone
: Cookies sent in all contexts (requires Secure flag)
3. Custom Headers
AJAX libraries like axios or fetch can automatically include custom headers:
1 | // Browsers enforce Same-Origin Policy for custom headers in XMLHttpRequest/fetch |
4. Double Submit Cookie
Set a cookie and include the same value in request parameters:
1 | // Set a cookie |
The server should verify that the cookie value matches the request parameter.
Clickjacking
Clickjacking (UI redress attack) tricks users into clicking on something different from what they perceive.
Prevention
X-Frame-Options Header
1 | X-Frame-Options: DENY |
Options:
DENY
: Page cannot be displayed in a frameSAMEORIGIN
: Page can only be displayed in a frame on the same originALLOW-FROM uri
: Page can only be displayed in a frame on the specified origin
CSP frame-ancestors
Modern alternative to X-Frame-Options:
1 | Content-Security-Policy: frame-ancestors 'none'; |
Options:
'none'
: No embedding allowed'self'
: Same-origin embedding onlydomain.com
: Specific domains allowed
JavaScript Frame-Busting
1 | // Basic frame-busting code |
Man-in-the-Middle (MITM) Attacks
MITM attacks occur when attackers position themselves between the user and the server to intercept communications.
Prevention
1. HTTPS
Always use HTTPS to encrypt data in transit:
1 | // Redirect HTTP to HTTPS |
2. HTTP Strict Transport Security (HSTS)
Instructs browsers to only use HTTPS:
1 | Strict-Transport-Security: max-age=31536000; includeSubDomains; preload |
3. Certificate Pinning
Validates that the server’s certificate matches an expected value:
1 | // Using fetch with certificate verification (simplified example) |
Authentication and Authorization
Secure Password Handling
Never store or transmit passwords in plaintext:
1 | // Client-side password handling |
JWT (JSON Web Tokens)
Secure method for representing claims between parties:
1 | // Storing JWT |
Security Considerations for JWT
- Store tokens in HttpOnly cookies to prevent XSS attacks
- Use short expiration times
- Implement token refresh mechanisms
- Validate tokens on the server
OAuth 2.0 and OpenID Connect
Standard protocols for authorization and authentication:
1 | // Redirect to OAuth provider |
Content Security Vulnerabilities
Insecure Direct Object References (IDOR)
Exposing internal implementation objects to users:
1 | // Vulnerable code |
Server-Side Request Forgery (SSRF)
Tricking a server into making unintended requests:
1 | // Vulnerable code |
Client-Side Data Validation
Always validate data on both client and server:
1 | // Client-side validation |
Third-Party Dependencies
Dependency Security
Regularly update and audit dependencies:
1 | # Using npm to audit dependencies |
Subresource Integrity (SRI)
Ensures external resources haven’t been tampered with:
1 | <script |
Security Testing
Regular Security Audits
Conduct regular security reviews:
- Static Analysis Security Testing (SAST)
- Dynamic Analysis Security Testing (DAST)
- Penetration Testing
OWASP Top 10
Familiarize yourself with the Open Web Application Security Project (OWASP) Top 10 vulnerabilities:
- Injection
- Broken Authentication
- Sensitive Data Exposure
- XML External Entities (XXE)
- Broken Access Control
- Security Misconfiguration
- Cross-Site Scripting (XSS)
- Insecure Deserialization
- Using Components with Known Vulnerabilities
- Insufficient Logging & Monitoring
Best Practices Checklist
- Implement proper input validation and output encoding
- Use HTTPS for all communications
- Set secure headers (CSP, HSTS, X-Frame-Options)
- Implement CSRF protection mechanisms
- Use secure cookie attributes (HttpOnly, Secure, SameSite)
- Avoid storing sensitive information in localStorage/sessionStorage
- Implement proper authentication and authorization
- Regularly update and audit dependencies
- Use Content Security Policy to restrict resource loading
- Implement proper error handling without leaking sensitive information
- Validate user input on both client and server
- Use prepared statements for database queries
- Implement rate limiting to prevent brute force attacks
- Conduct regular security testing
Learning Resources
- OWASP Web Security Testing Guide
- MDN Web Security
- Google Web Fundamentals - Security
- Content Security Policy Reference
- Web.dev Security
- JWT.io - Learn about JSON Web Tokens
Understanding security fundamentals is essential for building robust web applications that protect user data and maintain trust. Always prioritize security in your development practices.