Analysis of current threats and security measures used in web applications on the example of Symfony, Express, and Spring Boot
Article Sidebar
Open full text
Issue Vol. 37 (2025)
-
Performance evaluation of Machine Learning and Deep Learning models for 5G resource allocation
Abdullah Havolli, Majlinda Fetaji371-378
-
Analysis of the use of object detection systems in edge computing
Jakub Kozłowski, Marcin Badurowicz379-390
-
Performance analysis of Jetpack Compose components in mobile applications
Adrian Kwiatkowski, Jakub Smołka391-398
-
Methods for comparing three-dimensional motion trajectories
Tomasz Waldemar Samorow, Maria Skublewska-Paszkowska399-404
-
Performance and scalability analysis of monolithic and microservice architectures in social networks
Viacheslav Chernohor405-409
-
Comparative analysis of methods for identifying tree structures of coronary vessels
Kacper Liżewski, Małgorzata Charytanowicz410-417
-
Websites accessibility assessment of voivodeship cities in Poland
Kacper Czajka, Maria Skublewska-Paszkowska418-425
-
Analysis of ORM framework approaches for Node.js
Serhii Zhadko-Bazilevych426-430
-
Analysis of performance optimization methods for 3D games in the Unity environment
Maciej Potręć, Marcin Badurowicz431-435
-
The impact of AI use on the performance of chess engines
Jakub Król, Jakub Smołka436-442
-
Evaluating the effectiveness of selected tools in recognizing emotions from facial photos
Klaudiusz Wierzbowski443-450
-
Performance analysis of the GraphQL API creation technologies using Spring Boot and NestJS
Jakub Maciej Tkaczyk, Beata Pańczyk451-456
-
Comparative Performance Analysis of RabbitMQ and Kafka Message Queue Systems in Spring Boot and ASP.NET Environments
Filip Kamiński, Radosław Kłonica, Beata Pańczyk457-462
-
Analysis of current threats and security measures used in web applications on the example of Symfony, Express, and Spring Boot
Karol Kurowski, Magdalena Kramek463-469
-
The use of machine learning to classify symbols on cultural monuments to identify their origin and historical period.
Igor Pajura, Sylwester Korga470-475
-
Investigating Machine Learning Algorithms for Stroke Occurrence Prediction
Kazeem B. Adedeji, Titilayo A. Ogunjobi, Thabane H. Shabangu, Joshua A. Omowaye476-483
-
Comparative performance analysis of Spring Boot and Quarkus frameworks in Java applications
Grzegorz Szymanek, Jakub Smołka484-491
-
Influence of activation function in deep learning for cutaneous melanoma identification
Adrian Szymczyk, Maria Skublewska-Paszkowska492-499
-
Analysis of methods for simulating character encounters in a game with RPG elements
Michał Zdybel, Jakub Smołka500-507
-
Analysis of the efficiency of Apex and Java languages and related technologies in performing database operations
Marcin Janczarek, Konrad Lewicki, Jakub Smołka508-514
Main Article Content
DOI
Authors
Abstract
The article analyzes the most common threats currently appearing in web applications and compares the built-in security features of Symfony, Express, and Spring Boot frameworks. The study aimed to identify security gaps, assess their risk, and then present practices that enable effectiveprotection against attacks. The priority was to create four applications that were all identical in terms of structure. Tested applications were designed to have built-in security mechanisms from analyzed threats. The greatest threats currently are Broken Access Control attacks, cryptographic vulnerabilities, and code injection. The research process was conducted using Burp Suite Professional, SQLMap, XSSER, andHydra tools. The results indicate that Symfony and Spring Boot are the best protected against the threats. Additionally, the default Expressskeleton mechanisms do not protect the application from Cross Site Scripting (XSS) attacks.
Keywords:
References
[1] OWASP Top 10:2021, https://owasp.org/Top10/, [10.04.2025].
[2] Z. Čović, Threats and Vulnerabilities in Web Applications and How to Avoid Them, Critical Infrastructure Protection in the Light of the Armed Conflicts (2024) 93-103, https://doi.org/10.1007/978-3-031-47990-8_9.
[3] K. Nirmal, B. Janet, R. Kumar, Web Application Vulnerabilities - The Hacker's Treasure, In International Conference on Inventive Research in Computing Applications (2018) 56-62, http://dx.doi.org/10.1109/ICIRCA.2018.8597221.
[4] J. Adamu, R. Hamzah, M. M. Rosli, Security issues and framework of electronic medical record: A review, Bulletin of Electrical Engineering and Informatics (BEEI) 9(2) (2020) 565-572, https://doi.org/10.11591/eei.v9i2.2064.
[5] X. Mao, Comparison between Symfony, ASP.NET MVC, And Node.js Express for Web Development, Master thesis, North Dakota State University, Fargo, 2018.
[6] Z. Yin, SUJ Lee, Security Analysis of Web Open-Source Projects Based on Java and PHP, Electronics 12(12) (2023) 2618, https://doi.org/10.3390/electronics12122618.
[7] S. S. Shapiro, M. B. Wilk, An analysis of variance test for normality (complete samples), Biometrika 52(3/4) (1965) 591–611, https://doi.org/10.2307/2333709.
[8] O. J. Dunn, Multiple comparisons using rank sums, Technometrics 6(3) (1964) 241–252, https://doi.org/10.1080/00401706.1964.10490181.
[9] Dokumentacja języka programistycznego PHP, https://www.php.net/docs.php, [15.05.2025].
[10] Dokumentacja szkieletu programistycznego Symfony, https://symfony.com/doc/current/index.html, [15.05.2025].
[11] Dokumentacja szkieletu programistycznego Spring Boot, https://docs.spring.io/spring-boot/index.html, [15.05.2025].
[12] Dokumentacja szkieletu programistycznego Express, https://devdocs.io/express/, [15.05.2025].
Article Details
Abstract views: 21

