While PHP is by far the most popular framework for web development, according to BuildWith Trends (2011) its popularity is actually on a decline – the graph posted on the PHP.net website is from 2007. Newer technologies such as ASP.NET Ajax, Ruby on Rails, Adobe Flex and Microsoft Silverlight are gaining larger market share (BuildWith Trends, 2011). On the other hand, the PHP framework is being actively developed and supported therefore its popularity does not play a major role when discussing security of the environment.
When discussion secure e-commerce environment, in many cases the choice of the development language itself is not the major influencing factor in the overall security stance. In many cases, the hackers are targeting misconfigured or outdated services rather than trying to exploit vulnerability such as buffer overflow in the language interpreter (Verizon RISK Team, 2011). Moreover, Open Web Application Security Project (OWASP) Top 10 web application security risks highlight the fact that majority of exploitable vulnerabilities are related to the web server such as misconfiguration and insufficient transport layer protection, and the security awareness of the software developers such as injection, cross site scripting and insecure direct object reference (OWASP, 2010).
Security awareness of software developers is considered by many security experts as the main factor impacting the risk exposure of a web application (Dafydd Stuttard and Marcus Pinto, 2011). Lets consider SQL injection as an example; while the SQL injection vulnerability was first documented in 1998 (rain.forest.puppy, 1998) and ranked as a number one security risk by the Open Web Application Security Project (OWASP, 2010), the code such as (potentially vulnerable to SQL injection):
Select * from products where productCode=' " . $prodcode . " ' "
still appears in the university lecture notes (Laureate Online Education, 2007).
Organizations such as PHP Groups and PHP Security Consortium provide guides on security of PHP deployment and secure code development using PHP. In addtion, the guide (PHP Security Consortium, 2005) covers topics such as input validation, database and SQL injections, session management and issues related to shared hosts.
- BuildWith Trends, 2011. “Frameworks Distribution” [online]. Available from: http://trends.builtwith.com/framework (accessed: November 4, 2011).
- Dafydd Stuttard and Marcus Pinto, 2011. "The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws". 2Nd Edition. Wiley.
- H.M. Deitel, P.J, Deitel and A.B. Goldber, 2004. “Internet & World Wide Web How to Program”. 3Rd Edition. Pearson Education Inc. Upper Saddle River, New Jersey.
- Laureate Online Education, 2007. “MSC IN: Programming the Internet Seminar Five – PHP / Database Connectivity”. Laureate Online Education B.V.
- OWASP, 2010. “OWASP Top 10 for 2010” [online]. Available from: https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project (accessed: November 4, 2011).
- PHP Security Consortium, 2005. "PHP Security Guide" [online]. Available from: http://phpsec.org/projects/guide/ (accessed: November 4, 2011).
- rain.forest.puppy, 1998. "NT Web Technology Vulnerabilities" [online]. Phrack Magazine Volume 8, Issue 54 Dec 25th, 1998, article 08 of 12. Available from: http://www.phrack.org/issues.html?issue=54&id=8#article (accessed: November 4, 2011).
- Verizon RISK Team, 2011. “2011
Data Breach Investigations Report”
[online]. Verizon Business. Available from:
(accessed: November 4, 2011).
Post a Comment