{"id":17581,"date":"2021-10-28T12:45:58","date_gmt":"2021-10-28T07:15:58","guid":{"rendered":"https:\/\/www.varutra.com\/?p=17581"},"modified":"2022-12-02T11:48:27","modified_gmt":"2022-12-02T06:18:27","slug":"websocket-vulnerabilities","status":"publish","type":"post","link":"https:\/\/www.varutra.com\/varutravrt3\/websocket-vulnerabilities\/","title":{"rendered":"WebSocket Vulnerabilities"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" width=\"1920\" height=\"1080\" src=\"https:\/\/varutra-1a3b6.kxcdn.com\/wp-content\/uploads\/2021\/10\/WebSocket-Vulnerabilities-1024x535.png\"  class=\"sh-overlay-item sh-table-cell ls-is-cached lazyloaded\" data-rel=\"lightcase\" title=\"WebSocket Vulnerabilities - Varutra Consulting\"><br \/>\nThis blog is about different types of WebSocket Vulnerabilities\/Findings. So, we will be discussing different types of flaws that may exist in WebSockets.<\/p>\n<p>WebSockets are becoming more and more popular these days because of the simplicity they provide for the communication between the client and the server.<\/p>\n<p>Firstly, let\u2019s get a brief overview of the <a href=\"https:\/\/www.varutra.com\/varutrapreprod\/websocket\/\">WebSocket protocol<\/a>. The WebSocket protocol is an OSI application layer protocol that allows a client\u00a0and a web server to interact in full duplex (a communication channel where information can flow in both ways at the same time).<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>Different Vulnerabilities\/findings related to <\/strong><strong>WebSockets<\/strong>:<\/h3>\n<p>While WebSockets are beneficial for generating full-duplex communication channels (in modern applications, the server may need to provide data to the client without the client making a special request, such as in instant messaging), they do not provide any further security benefits. As a result, we find the standard vulnerabilities of the HTTP protocol, as well as some unique ones.<\/p>\n<ol>\n<li><strong>DOS<\/strong>:<\/li>\n<\/ol>\n<p>WebSockets allow an unlimited number of connections to the server to be established. This feature will allow to make a lot of connections which in turn will put a lot of demand on the server and use up all of its resources. The webpage then becomes noticeably slower. This way, a DOS attack can be launched against the server.<\/p>\n<ol start=\"2\">\n<li><strong>Cross-Site WebSocket Hijacking<\/strong>:<\/li>\n<\/ol>\n<p>It is a type of <a href=\"https:\/\/www.varutra.com\/mitigating-cross-site-request-forgery-csrf-attacks\/\">CSRF<\/a> (Cross-Site Request Forgery) attack. When the server relies entirely on session authentication data (cookies) to complete an authenticated action, these types of attacks are feasible.<\/p>\n<p>The attacker hides a request in a link on the screen of its (authenticated) victim in CSRF. The attacker tricks the victim into clicking on it to carry out the hidden request&#8217;s request. As a result, the attacker has the ability to make the victim do something harmful without the victim&#8217;s knowledge. The problem is that the attacker cannot view the server&#8217;s response to the request (due to the origin policy), which is no longer a concern with WebSockets because it doesn&#8217;t employ an origin policy. The attacker can now establish a full-duplex connection using the victim&#8217;s credentials.<\/p>\n<p>When the WebSocket handshake is vulnerable to CSRF, the Cross-Site WebSocket Hijacking attack is feasible. Indeed, the origin of the original application determines the communication channel between the two parties (client\/server). As a result, if the protocol change request is entirely dependent on cookies, an attacker can lure a victim into starting a request with its session but based on the attacker\u2019s server.<\/p>\n<p>Once trapped, the attacker can use WebSockets to communicate with the server without the victim&#8217;s knowledge. As with a traditional CSRF, the attacker can take actions in the recipient&#8217;s place while also reading server communications delivered over WebSockets.<\/p>\n<p>It is better to put a unique token per session that cannot be guessed as a parameter of the handshake request to mitigate this vulnerability.<\/p>\n<ol start=\"3\">\n<li><strong>Sniffing Attacks:<\/strong><\/li>\n<\/ol>\n<p>The WebSocket protocol transfers data in plain text, same as HTTP. As a result, man-in-the-middle attacks on this data are possible. Use the WebSocket Secure (wss:\/) protocol to avoid data leaks. WSS, like HTTPS, does not guarantee that your web application is secure, but it does assure that data is encrypted using Transport Layer Security (TLS).<\/p>\n<ol start=\"4\">\n<li><strong>Input-Validation Vulnerabilities:<\/strong><\/li>\n<\/ol>\n<p>If the input validation on WebSocket user input is not proper, then Injection attacks targeting WebSocket vulnerabilities such as XSS, SQL injection, XXE, and others can be launched.<\/p>\n<ol start=\"5\">\n<li><strong>Unauthorized access to WebSocket communication<\/strong><\/li>\n<\/ol>\n<p>It is possible to read and alter WebSocket communication at the network level if it is not established via the WebSocket over TLS (wss:\/) protocol. To do this, attackers need to be in a privileged position on the network.<\/p>\n<p>WebSockets don&#8217;t have any kind of authentication or authorization. Since no authentication is necessary to create a WebSocket, attackers can create their own connections and potentially access data that is only accessible via HTTP authentication. Attackers can obtain unauthorized access to information by sending WebSocket messages if access permissions are not checked within the connection.<\/p>\n<p>&nbsp;<\/p>\n<p>These are some of the different vulnerabilities that were found in WebSockets.<\/p>\n<p>Now, we will see the demo of one type of vulnerability i.e., Input-Validation Vulnerability. For demonstration purpose, let\u2019s navigate to a Portswigger lab to see the exploitation.<\/p>\n<p><strong>Lab<\/strong>:<\/p>\n<p><strong>Step 1:<\/strong> Access the lab and go to the live chat page.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-17582 aligncenter\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/10\/Access-the-lab-and-go-to-the-live-chat-page.png\" alt=\"Access the lab and go to the live chat page\" width=\"606\" height=\"314\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/10\/Access-the-lab-and-go-to-the-live-chat-page.png 606w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/10\/Access-the-lab-and-go-to-the-live-chat-page-300x155.png 300w\" sizes=\"(max-width: 606px) 100vw, 606px\" \/><\/p>\n<p><strong>Step 2:<\/strong> In the live chat page, enter the message.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-17586 aligncenter\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/10\/In-the-live-chat-page-enter-the-message.png\" alt=\"In the live chat page, enter the message\" width=\"606\" height=\"318\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/10\/In-the-live-chat-page-enter-the-message.png 606w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/10\/In-the-live-chat-page-enter-the-message-300x157.png 300w\" sizes=\"(max-width: 606px) 100vw, 606px\" \/><\/p>\n<p><strong>Step 3:<\/strong> Intercept the message request in Burp.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-17585 aligncenter\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/10\/Intercept-the-message-request-in-Burp.png\" alt=\" Intercept the message request in Burp\" width=\"606\" height=\"152\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/10\/Intercept-the-message-request-in-Burp.png 606w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/10\/Intercept-the-message-request-in-Burp-300x75.png 300w\" sizes=\"(max-width: 606px) 100vw, 606px\" \/><\/p>\n<p><strong>Step 4:<\/strong> In the intercepted request, enter the payload in the WebSocket message.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-17590 aligncenter\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/10\/In-the-intercepted-request-enter-the-payload-in-the-WebSocket-message.png\" alt=\"In the intercepted request, enter the payload in the WebSocket message\" width=\"606\" height=\"202\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/10\/In-the-intercepted-request-enter-the-payload-in-the-WebSocket-message.png 606w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/10\/In-the-intercepted-request-enter-the-payload-in-the-WebSocket-message-300x100.png 300w\" sizes=\"(max-width: 606px) 100vw, 606px\" \/><\/p>\n<p><strong>Step 5:<\/strong> Forward the request and the payload will be executed and you will get a pop-up in your browser.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-17584 aligncenter\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/10\/Forward-the-request-and-the-payload-will-be-executed-and-you-will-get-a-pop-up-in-your-browser.png\" alt=\"Forward the request and the payload will be executed and you will get a pop-up in your browser\" width=\"606\" height=\"303\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/10\/Forward-the-request-and-the-payload-will-be-executed-and-you-will-get-a-pop-up-in-your-browser.png 606w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/10\/Forward-the-request-and-the-payload-will-be-executed-and-you-will-get-a-pop-up-in-your-browser-300x150.png 300w\" sizes=\"(max-width: 606px) 100vw, 606px\" \/><\/p>\n<p>Thus, the lab is executed. Here, we have bypassed the client-side input validation in the chat and executed the payload.<\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<h3><strong>Mitigation\/Prevention of Websocket Vulnerabilities<\/strong>:<\/h3>\n<p>Following some protective measures while using WebSockets will mitigate the above-mentioned vulnerabilities to some extent.<\/p>\n<ul>\n<li>Using wss:\/\/ (i.e., WebSockets over\u00a0TLS).<\/li>\n<li>Check\u00a0Origin header\u00a0during handshake, use\u00a0Access-Control-Allow-Origin\u00a0header on server side.<\/li>\n<li>Using\u00a0Nonce\/CSRF tokens can protect the handshake against\u00a0CSRF\u00a0attacks.<\/li>\n<li>Using authentication\u00a0for WebSockets would be beneficial, for example using a\u00a0<a href=\"https:\/\/www.scip.ch\/en\/?labs.20190523\">JSON\u00a0Web Token<\/a>.<\/li>\n<li>Performing validation on input messages in both directions.<\/li>\n<li>Encoding of output messages embedded in the application.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>After getting to know much about WebSocket findings\/vulnerabilities and how they can be exploited by attackers when proper security measures are not taken, it is essential to have appropriate security measures and mechanisms in place to ensure WebSocket communications remain secure. We can\u2019t say the using the above suggested mitigation\/prevention measures will make the use of WebSockets fully secure, but implementing these suggestions might minimize the risk to some extent.<\/p>\n<p>&nbsp;<\/p>\n<p>Author:<\/p>\n<p><strong>Pralekya Hirmalwar<\/strong><\/p>\n<p>Attack &amp; PenTest Team<\/p>\n<p>Varutra Consulting Pvt. Ltd.<\/p>","protected":false},"excerpt":{"rendered":"<p>This blog is about different types of WebSocket Vulnerabilities\/Findings. So, we will be discussing different types of flaws that may exist in WebSockets. WebSockets are&#8230;<\/p>\n","protected":false},"author":4,"featured_media":17593,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"inline_featured_image":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[272],"tags":[544,345,344,545],"aioseo_notices":[],"aioseo_head":"\n\t\t<!-- All in One SEO Pro 4.6.3 - aioseo.com -->\n\t\t<meta name=\"description\" content=\"This blog is about different types of WebSocket Vulnerabilities\/Findings. So, we will be discussing different types of flaws that may exist in WebSockets.\" \/>\n\t\t<meta name=\"robots\" content=\"max-image-preview:large\" \/>\n\t\t<link rel=\"canonical\" href=\"https:\/\/www.varutra.com\/varutravrt3\/websocket-vulnerabilities\/\" \/>\n\t\t<meta name=\"generator\" content=\"All in One SEO Pro (AIOSEO) 4.6.3\" \/>\n\t\t<meta property=\"og:locale\" content=\"en_US\" \/>\n\t\t<meta property=\"og:site_name\" content=\"Varutra Consulting\" \/>\n\t\t<meta property=\"og:type\" content=\"article\" \/>\n\t\t<meta property=\"og:title\" content=\"Different WebSocket Vulnerabilities Types And Mitigation\" \/>\n\t\t<meta property=\"og:description\" content=\"This blog is about different types of WebSocket Vulnerabilities\/Findings. So, we will be discussing different types of flaws that may exist in WebSockets.\" \/>\n\t\t<meta property=\"og:url\" content=\"https:\/\/www.varutra.com\/varutravrt3\/websocket-vulnerabilities\/\" \/>\n\t\t<meta property=\"article:tag\" content=\"communication protocol\" \/>\n\t\t<meta property=\"article:tag\" content=\"server communication protocol\" \/>\n\t\t<meta property=\"article:tag\" content=\"websocket\" \/>\n\t\t<meta property=\"article:tag\" content=\"websocket vulnerabilities\" \/>\n\t\t<meta property=\"article:published_time\" content=\"2021-10-28T07:15:58+00:00\" \/>\n\t\t<meta property=\"article:modified_time\" content=\"2022-12-02T06:18:27+00:00\" \/>\n\t\t<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n\t\t<meta name=\"twitter:title\" content=\"Different WebSocket Vulnerabilities Types And Mitigation\" \/>\n\t\t<meta name=\"twitter:description\" content=\"This blog is about different types of WebSocket Vulnerabilities\/Findings. So, we will be discussing different types of flaws that may exist in WebSockets.\" \/>\n\t\t<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t\t<meta name=\"twitter:data1\" content=\"kalpblogger\" \/>\n\t\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n\t\t<script type=\"application\/ld+json\" class=\"aioseo-schema\">\n\t\t\t{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/websocket-vulnerabilities\\\/#article\",\"name\":\"Different WebSocket Vulnerabilities Types And Mitigation\",\"headline\":\"WebSocket Vulnerabilities\",\"author\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/kalpblogger\\\/#author\"},\"publisher\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#organization\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/wp-content\\\/uploads\\\/2021\\\/10\\\/WebSocket-Vulnerabilities.png\",\"width\":1200,\"height\":627,\"caption\":\"WebSocket Vulnerabilities\"},\"datePublished\":\"2021-10-28T12:45:58+05:30\",\"dateModified\":\"2022-12-02T11:48:27+05:30\",\"inLanguage\":\"en-US\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/websocket-vulnerabilities\\\/#webpage\"},\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/websocket-vulnerabilities\\\/#webpage\"},\"articleSection\":\"Web Application Security, Communication Protocol, Server communication protocol, websocket, Websocket Vulnerabilities\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/websocket-vulnerabilities\\\/#breadcrumblist\",\"itemListElement\":[{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#listItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/\",\"nextItem\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/websocket-vulnerabilities\\\/#listItem\"},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/websocket-vulnerabilities\\\/#listItem\",\"position\":2,\"name\":\"WebSocket Vulnerabilities\",\"previousItem\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#listItem\"}]},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#organization\",\"name\":\"Varutra\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/Varutra-Found-e1612984024606.jpg\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/websocket-vulnerabilities\\\/#organizationLogo\"},\"image\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/websocket-vulnerabilities\\\/#organizationLogo\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/kalpblogger\\\/#author\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/kalpblogger\\\/\",\"name\":\"kalpblogger\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/websocket-vulnerabilities\\\/#authorImage\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5e96a9b330da7c941c1e39217a2fbe38?s=96&d=mm&r=g\",\"width\":96,\"height\":96,\"caption\":\"kalpblogger\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/websocket-vulnerabilities\\\/#webpage\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/websocket-vulnerabilities\\\/\",\"name\":\"Different WebSocket Vulnerabilities Types And Mitigation\",\"description\":\"This blog is about different types of WebSocket Vulnerabilities\\\/Findings. So, we will be discussing different types of flaws that may exist in WebSockets.\",\"inLanguage\":\"en-US\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#website\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/websocket-vulnerabilities\\\/#breadcrumblist\"},\"author\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/kalpblogger\\\/#author\"},\"creator\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/kalpblogger\\\/#author\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/wp-content\\\/uploads\\\/2021\\\/10\\\/WebSocket-Vulnerabilities.png\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/websocket-vulnerabilities\\\/#mainImage\",\"width\":1200,\"height\":627,\"caption\":\"WebSocket Vulnerabilities\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/websocket-vulnerabilities\\\/#mainImage\"},\"datePublished\":\"2021-10-28T12:45:58+05:30\",\"dateModified\":\"2022-12-02T11:48:27+05:30\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#website\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/\",\"name\":\"Varutra Consulting\",\"description\":\"Secure your digital world with our Cybersecurity services.\",\"inLanguage\":\"en-US\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#organization\"}}]}\n\t\t<\/script>\n\t\t<!-- All in One SEO Pro -->\r\n\t\t<title>Different WebSocket Vulnerabilities Types And Mitigation<\/title>\n\n","aioseo_head_json":{"title":"Different WebSocket Vulnerabilities Types And Mitigation","description":"This blog is about different types of WebSocket Vulnerabilities\/Findings. So, we will be discussing different types of flaws that may exist in WebSockets.","canonical_url":"https:\/\/www.varutra.com\/varutravrt3\/websocket-vulnerabilities\/","robots":"max-image-preview:large","keywords":"","webmasterTools":{"miscellaneous":""},"og:locale":"en_US","og:site_name":"Varutra Consulting","og:type":"article","og:title":"Different WebSocket Vulnerabilities Types And Mitigation","og:description":"This blog is about different types of WebSocket Vulnerabilities\/Findings. So, we will be discussing different types of flaws that may exist in WebSockets.","og:url":"https:\/\/www.varutra.com\/varutravrt3\/websocket-vulnerabilities\/","article:tag":["communication protocol","server communication protocol","websocket","websocket vulnerabilities"],"article:published_time":"2021-10-28T07:15:58+00:00","article:modified_time":"2022-12-02T06:18:27+00:00","twitter:card":"summary_large_image","twitter:title":"Different WebSocket Vulnerabilities Types And Mitigation","twitter:description":"This blog is about different types of WebSocket Vulnerabilities\/Findings. So, we will be discussing different types of flaws that may exist in WebSockets.","twitter:label1":"Written by","twitter:data1":"kalpblogger","twitter:label2":"Est. reading time","twitter:data2":"5 minutes","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.varutra.com\/varutravrt3\/websocket-vulnerabilities\/#article","name":"Different WebSocket Vulnerabilities Types And Mitigation","headline":"WebSocket Vulnerabilities","author":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/kalpblogger\/#author"},"publisher":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/#organization"},"image":{"@type":"ImageObject","url":"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/10\/WebSocket-Vulnerabilities.png","width":1200,"height":627,"caption":"WebSocket Vulnerabilities"},"datePublished":"2021-10-28T12:45:58+05:30","dateModified":"2022-12-02T11:48:27+05:30","inLanguage":"en-US","mainEntityOfPage":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/websocket-vulnerabilities\/#webpage"},"isPartOf":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/websocket-vulnerabilities\/#webpage"},"articleSection":"Web Application Security, Communication Protocol, Server communication protocol, websocket, Websocket Vulnerabilities"},{"@type":"BreadcrumbList","@id":"https:\/\/www.varutra.com\/varutravrt3\/websocket-vulnerabilities\/#breadcrumblist","itemListElement":[{"@type":"ListItem","@id":"https:\/\/www.varutra.com\/varutravrt3\/#listItem","position":1,"name":"Home","item":"https:\/\/www.varutra.com\/varutravrt3\/","nextItem":"https:\/\/www.varutra.com\/varutravrt3\/websocket-vulnerabilities\/#listItem"},{"@type":"ListItem","@id":"https:\/\/www.varutra.com\/varutravrt3\/websocket-vulnerabilities\/#listItem","position":2,"name":"WebSocket Vulnerabilities","previousItem":"https:\/\/www.varutra.com\/varutravrt3\/#listItem"}]},{"@type":"Organization","@id":"https:\/\/www.varutra.com\/varutravrt3\/#organization","name":"Varutra","url":"https:\/\/www.varutra.com\/varutravrt3\/","logo":{"@type":"ImageObject","url":"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/11\/Varutra-Found-e1612984024606.jpg","@id":"https:\/\/www.varutra.com\/varutravrt3\/websocket-vulnerabilities\/#organizationLogo"},"image":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/websocket-vulnerabilities\/#organizationLogo"}},{"@type":"Person","@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/kalpblogger\/#author","url":"https:\/\/www.varutra.com\/varutravrt3\/author\/kalpblogger\/","name":"kalpblogger","image":{"@type":"ImageObject","@id":"https:\/\/www.varutra.com\/varutravrt3\/websocket-vulnerabilities\/#authorImage","url":"https:\/\/secure.gravatar.com\/avatar\/5e96a9b330da7c941c1e39217a2fbe38?s=96&d=mm&r=g","width":96,"height":96,"caption":"kalpblogger"}},{"@type":"WebPage","@id":"https:\/\/www.varutra.com\/varutravrt3\/websocket-vulnerabilities\/#webpage","url":"https:\/\/www.varutra.com\/varutravrt3\/websocket-vulnerabilities\/","name":"Different WebSocket Vulnerabilities Types And Mitigation","description":"This blog is about different types of WebSocket Vulnerabilities\/Findings. So, we will be discussing different types of flaws that may exist in WebSockets.","inLanguage":"en-US","isPartOf":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/#website"},"breadcrumb":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/websocket-vulnerabilities\/#breadcrumblist"},"author":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/kalpblogger\/#author"},"creator":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/kalpblogger\/#author"},"image":{"@type":"ImageObject","url":"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/10\/WebSocket-Vulnerabilities.png","@id":"https:\/\/www.varutra.com\/varutravrt3\/websocket-vulnerabilities\/#mainImage","width":1200,"height":627,"caption":"WebSocket Vulnerabilities"},"primaryImageOfPage":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/websocket-vulnerabilities\/#mainImage"},"datePublished":"2021-10-28T12:45:58+05:30","dateModified":"2022-12-02T11:48:27+05:30"},{"@type":"WebSite","@id":"https:\/\/www.varutra.com\/varutravrt3\/#website","url":"https:\/\/www.varutra.com\/varutravrt3\/","name":"Varutra Consulting","description":"Secure your digital world with our Cybersecurity services.","inLanguage":"en-US","publisher":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/#organization"}}]}},"aioseo_meta_data":{"post_id":"17581","title":"Different WebSocket Vulnerabilities Types&nbsp;And Mitigation","description":"This blog is about different types of WebSocket Vulnerabilities\/Findings. So, we will be discussing different types of flaws that may exist in WebSockets.","keywords":[],"keyphrases":"{\"focus\":{\"keyphrase\":\"Websocket Vulnerabilities\",\"score\":90,\"analysis\":{\"keyphraseInTitle\":{\"title\":\"Focus keyphrase in SEO title\",\"description\":\"Focus keyphrase found in SEO title.\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseInDescription\":{\"title\":\"Focus keyphrase in meta description\",\"description\":\"Focus keyphrase found in meta description.\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseLength\":{\"title\":\"Focus keyphrase length\",\"description\":\"Good job!\",\"score\":9,\"maxScore\":9,\"error\":0,\"length\":2},\"keyphraseInURL\":{\"title\":\"Focus keyphrase in URL\",\"description\":\"Focus keyphrase used in the URL.\",\"score\":5,\"maxScore\":5,\"error\":0},\"keyphraseInIntroduction\":{\"title\":\"Focus keyphrase in introduction\",\"description\":\"Your Focus keyphrase appears in the first paragraph. Well done!\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseInSubHeadings\":{\"title\":\"Focus keyphrase in Subheadings\",\"description\":\"Your H2 and H3 subheadings reflects the topic of your copy. Good job!\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseInImageAlt\":{\"title\":\"Focus keyphrase in image alt attributes\",\"description\":\"Focus keyphrase not found in image alt attribute(s). Add an image with your Focus keyphrase as alt text.\",\"score\":3,\"maxScore\":9,\"error\":1}}},\"additional\":[{\"keyphrase\":\"WebSocket\",\"score\":100,\"analysis\":{\"keyphraseInDescription\":{\"title\":\"Keyphrase in meta description\",\"description\":\"Keyphrase found in meta description.\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseLength\":{\"title\":\"Keyphrase length\",\"description\":\"Good job!\",\"score\":9,\"maxScore\":9,\"error\":0,\"length\":1},\"keyphraseInIntroduction\":{\"title\":\"Keyphrase in introduction\",\"description\":\"Your Keyphrase appears in the first paragraph. Well done!\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseInImageAlt\":{\"title\":\"Keyphrase in image alt attributes\",\"description\":\"Keyphrase found in image alt attribute(s).\",\"score\":9,\"maxScore\":9,\"error\":0}}},{\"keyphrase\":\"Vulnerabilities\",\"score\":83,\"analysis\":{\"keyphraseInDescription\":{\"title\":\"Keyphrase in meta description\",\"description\":\"Keyphrase found in meta description.\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseLength\":{\"title\":\"Keyphrase length\",\"description\":\"Good job!\",\"score\":9,\"maxScore\":9,\"error\":0,\"length\":1},\"keyphraseInIntroduction\":{\"title\":\"Keyphrase in introduction\",\"description\":\"Your Keyphrase appears in the first paragraph. Well done!\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseInImageAlt\":{\"title\":\"Keyphrase in image alt attributes\",\"description\":\"Keyphrase not found in image alt attribute(s). Add an image with your Keyphrase as alt text.\",\"score\":3,\"maxScore\":9,\"error\":1}}}]}","primary_term":null,"canonical_url":null,"og_title":null,"og_description":null,"og_object_type":"default","og_image_type":"default","og_image_url":null,"og_image_width":null,"og_image_height":null,"og_image_custom_url":null,"og_image_custom_fields":null,"og_video":"","og_custom_url":null,"og_article_section":null,"og_article_tags":[],"twitter_use_og":false,"twitter_card":"default","twitter_image_type":"default","twitter_image_url":null,"twitter_image_custom_url":null,"twitter_image_custom_fields":null,"twitter_title":null,"twitter_description":null,"schema":{"blockGraphs":[],"customGraphs":[],"default":{"data":{"Article":[],"Course":[],"Dataset":[],"FAQPage":[],"Movie":[],"Person":[],"Product":[],"Recipe":[],"Service":[],"SoftwareApplication":[],"WebPage":[]},"graphName":"","isEnabled":true},"graphs":[]},"schema_type":"default","schema_type_options":"{\"article\":{\"articleType\":\"BlogPosting\"},\"course\":{\"name\":\"\",\"description\":\"\",\"provider\":\"\"},\"faq\":{\"pages\":[]},\"product\":{\"reviews\":[]},\"recipe\":{\"ingredients\":[],\"instructions\":[],\"keywords\":[]},\"software\":{\"reviews\":[],\"operatingSystems\":[]},\"webPage\":{\"webPageType\":\"WebPage\"}}","pillar_content":false,"robots_default":true,"robots_noindex":false,"robots_noarchive":false,"robots_nosnippet":false,"robots_nofollow":false,"robots_noimageindex":false,"robots_noodp":false,"robots_notranslate":false,"robots_max_snippet":"-1","robots_max_videopreview":"-1","robots_max_imagepreview":"large","priority":null,"frequency":"default","local_seo":null,"limit_modified_date":false,"open_ai":null,"created":"2021-10-28 06:20:25","updated":"2022-12-02 06:30:18"},"aioseo_breadcrumb":"<div class=\"aioseo-breadcrumbs\"><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.varutra.com\/varutravrt3\" title=\"Home\">Home<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">&raquo;<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.varutra.com\/varutravrt3\/category\/web-application-security\/\" title=\"Web Application Security\">Web Application Security<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">&raquo;<\/span><span class=\"aioseo-breadcrumb\">\n\tWebSocket Vulnerabilities\n<\/span><\/div>","aioseo_breadcrumb_json":[{"label":"Home","link":"https:\/\/www.varutra.com\/varutravrt3"},{"label":"Web Application Security","link":"https:\/\/www.varutra.com\/varutravrt3\/category\/web-application-security\/"},{"label":"WebSocket Vulnerabilities","link":"https:\/\/www.varutra.com\/varutravrt3\/websocket-vulnerabilities\/"}],"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts\/17581"}],"collection":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/comments?post=17581"}],"version-history":[{"count":5,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts\/17581\/revisions"}],"predecessor-version":[{"id":20234,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts\/17581\/revisions\/20234"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/media\/17593"}],"wp:attachment":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/media?parent=17581"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/categories?post=17581"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/tags?post=17581"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}