Building a Better Web
June 11–12, 2018: Training
June 12–14, 2018: Tutorials & Conference
San Jose, CA

Patterns in Node.js vulnerabilities

3:35pm–4:15pm Thursday, June 14, 2018
Security
Location: 210 C/G Level: Intermediate
Secondary topics:  Best practice, Technical, Web Pillars Track: Performance, Security, Accessibility

Who is this presentation for?

  • Web developers, software engineers, security engineers, security consultants, security analysts

Prerequisite knowledge

  • A basic understanding of JavaScript, Node.js, and web security

What you'll learn

  • Explore common security mistakes made by Node.js package authors and learn how to avoid them

Description

More than 500 Node.js packages get published to npm every day, and security researchers consistently discover and publish vulnerabilities found in these packages. Analysis of these vulnerabilities reveals some valuable insights for Node.js developers and security testers.

Chetan Karande shares the findings from an analysis of over a thousand publicly known Node.js vulnerabilities. With intuitive data visualizations and statistics, Chetan details trends over last five years, explores common security mistakes made by Node.js package authors, and explains how you can prevent these issues in your own code.

Topics include:

  • Frequently occurring vulnerabilities
  • Top vulnerabilities by severity
  • Occurrence of top vulnerabilities by year
  • Common mistakes, including:
    • Sensitive data exposure
    • Regular expression denial of service (ReDoS)
    • Directory traversal
    • Cross-site scripting
    • Injection
Photo of Chetan Karande

Chetan Karande

DTCC

Chetan Karande is a principal software engineer at DTCC, where he focuses on building fast, maintainable, and secure user interfaces. Chetan is full stack web developer, security researcher, speaker at developer conferences, the author of Securing Node Applications from O’Reilly, and a contributor to multiple open source projects. He is a member of the Open Web Application Project (OWASP) organization and a project leader for the OWASP NodeGoat project, an open source learning platform for Node.js security.

Leave a Comment or Question

Help us make this conference the best it can be for you. Have questions you'd like this speaker to address? Suggestions for issues that deserve extra attention? Feedback that you'd like to share with the speaker and other attendees?

Join the conversation here (requires login)