security

Is it safe to store a OTP in the session?

I am writing a web application and for certain actions the user needs to enter a One Time Pin (OTP) - similar to most banking websites. So I basically need to generate a random string, store it somewhere, send it to the user and then validate the entered pin against the one I stored. Is it safe to store this generated string in the ASP...

Which right grants user a right to grant another right to himself in SQL 2008?

I need to grant a db_datawriter before executing SqlBulkCopy and remove it after: try { "EXEC [db_mod].[sys].[sp_addrolemember] N'db_datawriter', N'my_user'" // via SqlCommand bulk.WriteToServer(table); } finally { "EXEC [db_mod].[sys].[sp_droprolemember] N'db_datawriter', N'my_user'" // via another SqlCommand } but I'm getti...

Handling data content security

So let's say that in your application you have to handle data content security, in such a way that application defines several "Entities" that have to be secured so that user cannot view, edit etc. certain code ranges. Let's say we have secured entities such as Location, Department, Division, ProductLine etc. and each user gets associat...

How do I prevent the repetition of business logic?

OK. So here's my simplified scenario. We have a system which handles orders for a number of clients. We want staff users to be able to view all orders and we want client user to only be able to view orders which relate to them. When attempting to view a particular record we make use of the following function in our OrderSecurity class: ...

Is it possible for a 3rd party to reliably discern your CMS?

I don't know much about poking at servers, etc, but in light of the (relatively) recent Wordpress security issues, I'm wondering if it's possible to obscure which CMS you might be using to the outside world. Obviously you can rename the default login page, error messages, the favicon (I see the joomla one everywhere) and use a non-defau...

How to add a licensing functionality to a java program?

I have made an application in java. Now I want to deliver it to several clients. I want that each client must purchase a serial key to use that software. Without that key, the software shouldn't be run just like other softwares in the market. How can I do that? I know that I can't protect it fully. I just want a simple serial key func...

Best practices around generating OAuth tokens?

I realize that the OAuth spec doesn't specify anything about the origin of the ConsumerKey, ConsumerSecret, AccessToken, RequestToken, TokenSecret, or Verifier code, but I'm curious if there are any best practices for creating significantly secure tokens (especially Token/Secret combinations). As I see it, there are a few approaches to ...

Sanitize search string for Dynamic SQL Queries

I know i can use stored procedures to eliminate sql injection attacks but it would bloat the code by more than I'm willing to accept and making it costly to maintain. In my dynamic sql query, I would like to search a string of text in 2 columns in one of my tables but before that happens, I would like my business layer, which is written...

PHP Exceptions and Security

When in a page triggered by an exception, what vulnerabilities is a php page open to? I am using Kohana and am used to triggering exceptions (404, runtimes, etc) But I recently read a book (19 Sins in Software Security) that says a site in an unstable state(i.e. in an page triggered by exception) is open to critical attacks. I am worr...

How do I get the Session Object in Spring?

I am relatively new to Spring and Spring security. I was attempting to write a program where I needed to authenticate a user at the server end using Spring security, I came up with the following: public class CustomAuthenticationProvider extends AbstractUserDetailsAuthenticationProvider{ @Override protected void additionalAuth...

Is it possible to send more data in form based authentication in Spring?

I am relatively new to the Spring Framework and Spring security. I have used a custom authentication scheme, HTML: <form action="j_spring_security_check"> <input type="text" name="j_username" value="abc"/> <input type="text" name="j_password" value="abc"/> <input type="text" name="myCustom1" value="pqr"/> <!-- maybe type="h...

Is javascripts access to a password fields value considered a security risk?

If it is good style and security to store passwords securely and properly, then shouldn't the same be for web pages that require a user to enter a password? consider this example <script> function copy() { var text = document.getElementsById('text'); var pass = document.getElementsById('pass'); text.value = pass.value; } ...

How to run WCF IPC (http) on localhost without requesting administrative privileges?

We're developing a set of applications that need to communicate with each other on the user's session. These applications do not require any administrative privileges to run, but as soon as one of them tries to open an http listener - it fails due to lack of the administrative credentials. On the other hand, since user doesn't have any a...

Find Path of File to be Uploaded

Hello all, I would like to know the paths of certain files that a user is about to upload using my form. I know this isn't allowed using JavaScript for secruity reasons but the system I am building is an internal one for staff. Is there maybe a JavaScript certificate or something that I can place on our servers to say that I can do this...

Review Security for a product developed on ASP.NET MVC..

We are planning to buy a product that's developed on ASP.NET MVC, JQuery, SQL 2005. .basically latest MS stack. This product is going to store some of very highly sensitive data. So, we need to evaluate that product in terms of security. But I'm confused as in How can I certify that this product is secure and we can buy it. I don't ...

Should I be concerned about mysql message "Suspicious setup: User "mysql" maps to user: _mysql" ?

Running MySQL Ver 14.14 Distrib 5.1.37 on Mac OS X 10.5. Logs contain the following message Suspicious setup: User "mysql" maps to user: _mysql Should I be concerned? ...

SecurityException: That assembly does not allow partially trusted callers

From a C# WinForm project, I want to call a .NET COM method that already exist. I've added the reference to the COM, but I can't get rid of the SecurityException "That assembly does not allow partially trusted callers". Both projects are strongly named. I've added [assembly: AllowPartiallyTrustedCallers] at the top of the COM project, b...

How to prevent cookie poisoning

I save data in a cookie to authenticate users for the next login (remember me option). This data is encrypted and hashed. But here's the problem: Anyone can take this cookie and put it on another machine and it will work. I heard that is called cookie poisoning How do I overcome this? ...

mprotect function called with 5 arguments

Hello, According to the Linux man page for mprotect the function has 3 Arguments: int mprotect(const void *addr, size_t len, int prot); but while running ltrace on a program that I'm analyzing I see that mprotect is called like this: mprotect(0x8049000, 4096, 3, 1, 0xb7e057ac) = 0 what are the 4th and 5th argument for?? Edit...

Question on schemas and security

I need to set some users up to be able to create stored procedures with READ access only. Also, in production they cannot have SELECT, only EXECUTE on the procs they created. In development they would have SELECT so they could create their procedures. I've set up a schema called Reports. The owner of that schema is a login - Report_A...