The one thing that developers tend to considers at the end of the development cycle is the “security” of the application. A secure application is not a luxury, it’s a necessity. You should consider the security of your application at every phase of the development such as architecture, design, code, and finally the deployment.
In this tutorial, we are going to learn ways to secure our Node.js application. Let’s dive in.
Data Validation – Never Trust Your Users
You must always validate or sanitize the data coming from the user or other entity of the system. The bad validation or no validation at all is a threat to the working system and can lead to a security exploit. You should also escape the output. Let’s learn how to validate the incoming data in Node.js.
You can use a node module called validator to perform the data validation. For example.
validator.isEmail('[email protected]'); //=> true
validator.isEmail('bar.com'); //=> false
You can also use a module called joi (recommended by Codeforgeek) to perform the data/schema validation. For example.
try {
const schema = joi.object().keys({
name: joi.string().min(3).max(45).required(),
email: joi.string().email().required(),
password: joi.string().min(6).max(20).required()
});
const dataToValidate = {
name: "Shahid",
email: "abc.com",
password: "123456",
}
const result = schema.validate(dataToValidate);
if (result.error) {
throw result.error.details[0].message;
}
} catch (e) {
console.log(e);
}
I mostly use joi to perform the data validation.
You should also escape the HTML or JSON output to users to prevent cross-site-scripting attacks. You can use escape-html libraries to perform output escaping.
You might be wondering though, how come a data input can lead to something disastrous? Well if your web application is not static and it involves some sort of database then a hacker can tweak the data input and take control of your database system. This is called “SQL Injection”. Let’s learn quickly what it is and how to prevent it from happening.
SQL Injection Attack
SQL injection is an exploit where malicious users can pass unexpected data and change the SQL queries. Let’s understand with the example.
Assume your SQL query looks like this:
SET first_name="' + req.body.first_name + '" WHERE id=1332;
In a normal scenario, you would expect that this query will look like this:
SET first_name = "John" WHERE id = 1332;
Now, if someone passes the first_name as the value shown below:
Then, your SQL query will look like this:
SET first_name="John", last_name="Wick"; --" WHERE id=1001;
If you observe, the WHERE condition is commented out and now the query will update the users table and sets every user’s first name as “John” and last name as “Wick”. This will eventually lead to system failure and if your database has no backup, then you’re doomed.
How to prevent SQL Injection attack
The most useful way to prevent SQL injection attacks is to sanitize input data. You can either validate every single input or validate using parameter binding. Parameter binding is mostly used by the developers as it offers efficiency and security. If you are using a popular ORM such as sequelize, hibernate, etc then they already provide the functions to validate and sanitize your data. If you are using database modules other than ORM such as mysql for Node, you can use the escaping methods provided by the module.
Let’s learn by example. The codebase shown below is using mysql module for Node.
var connection = mysql.createConnection({
host : 'localhost',
user : 'me',
password : 'secret',
database : 'my_db'
});
connection.connect();
connection.query(
'UPDATE users SET ?? = ? WHERE ?? = ?',
['first_name',req.body.first_name, ,'id',1001],
function(err, result) {
//...
});
The double question mark is replaced with the field name and the single question mark is replaced with the value. This will make sure that input is safe. You can also use a stored procedure to increase the level of security but due to lack of maintainability developers tend to avoid using stored procedures.
You should also perform the server-side data validation. I do not recommend you to validate each field manually, you can use modules like joi.
Typecasting
JavaScript is a dynamic typed language i.e a value can be of any type. You can use the typecasting method to verify the type of data so that only the intended type of value should go into the database. For example, a user ID can only accept the number, there should be typecasting to ensure that the user ID should only be a number.
For example, let’s refer to the code we shown above.
var connection = mysql.createConnection({
host : 'localhost',
user : 'me',
password : 'secret',
database : 'my_db'
});
connection.connect();
connection.query(
'UPDATE users SET ?? = ? WHERE ?? = ?',
['first_name',req.body.first_name, ,'id',Number(req.body.ID)],
function(err, result) {
//...
});
Did you notice the change?
We used Number(req.body.ID) to ensure that ID is always the number. You can refer to this beautiful article by a fellow blogger to understand typecasting in depth.
Application Authentication and Authorization
Sensitive data such as passwords should be stored in the system in a secure way that malicious users don’t misuse sensitive information. In this section, we will learn how to store and manage passwords which are quite generic, and pretty much every application has passwords in some way in their system.
Password Hashing
Hashing is a function that generates a fixed-size string from input. The output from the hashing function cannot be decrypted hence it’s “one-way” in nature. For data such as passwords, you must always use hashing algorithms to generate a hash version of the input password string which is a plaintext string.
You might be wondering that if the hash is a one-way string then how come attackers gain access to passwords?
Well, as I mentioned above, hashing takes an input string and generates a fixed-length output. So attackers take a reverse approach and they generate the hashes from the general password list, then they compare the hash with the hashes in your system to find the password. This attack is called lookup tables attack.
This is the reason why you as an architect of the system must not allow generic used passwords in your system. To overcome this attack, you can something called “salt”. Salt is attached to the password hash to make it unique irrespective of the input. Salt has to be generated securely and randomly so that it is not predictable.
The Hashing algorithm we suggest you is BCrypt. At the time of writing this article, Bcrypt has not been exploited and considered cryptographically secure. In Node.js, you can use bcyrpt node module to perform the hashing.
Please refer to the example code below.
const saltRounds = 10;
const password = "Some-Password@2020";
bcrypt.hash(
password,
saltRounds,
(err, passwordHash) => {
//we will just print it to the console for now
//you should store it somewhere and never logs or print it
console.log("Hashed Password:", passwordHash);
});
The SaltRounds function is the cost of the hash function. The higher the cost, the more secure hash would be generated. You should decide the salt based on the computing power of your server.
Once the hash is generated for a password, the password entered by the user will be compared to the hash stored in the database. Refer to the code below for reference.
const incomingPassword = "Some-Password@2020";
const existingHash = "some-hash-previously-generated"
bcrypt.compare(
incomingPassword,
existingHash,
(err, res) => {
if(res && res === true) {
return console.log("Valid Password");
}
//invalid password handling here
else {
console.log("Invalid Password");
}
});
Password Storage
Whether you use the database, files to store passwords, you must not store a plain text version. As we studied above, you should generate the hash and store the hash in the system. I generally recommend using varchar(255) data type in case of a password. You can opt for an unlimited length field as well.
If you are using bcrypt then you can use varchar(60) field because bcrypt will generate fixed size 60 character hashes.
Authorization
A system with proper user roles and permission prevents malicious users to act outside of their permission. To achieve a proper authorization process, proper roles and permissions are assigned to each user so that they can do certain tasks and nothing more. In Node.js, you can use a famous module called ACL to develop access control lists based authorization in your system.
const acl = new ACL(new ACL.memoryBackend());
// guest is allowed to view blogs
acl.allow('guest', 'blogs', 'view')
// check if the permission is granted
acl.isAllowed('joed', 'blogs', 'view', (err, res) => {
if(res){
console.log("User joed is allowed to view blogs");
}
});
Checkout the acl2 documentation for more information and example code.
Bruteforce Attack Prevention
Bruteforce is an attack where a hacker uses software to try different passwords repetitively until access is granted i.e valid password is found. To prevent a Bruteforce attack, one of the simplest ways is to wait it out approach. When someone is trying to login into your system and tried an invalid password more than 3 times, make them wait for 60 seconds or so before trying again. This way the attacker is going to be slow and it’s gonna take them forever to crack a password.
Another approach to preventing it is to ban the IP that is generating invalid login requests. Your system allows 3 wrong attempts per IP in 24 hours. If someone tries to do brute-forcing then block the IP for 24 hours. This rate-limiting approach is been used by lots of companies to prevent brute-force attacks.
If you are using the Express framework, there is a middleware module to enable rate-limiting in incoming requests. Its called express=brute . You can check the example code below.
Install the dependency.
Enable it in your route.
const store = new ExpressBrute.MemoryStore(); // stores state locally, don't use this in production
const bruteforce = new ExpressBrute(store);
app.post('/auth',
bruteforce.prevent, // error 429 if we hit this route too often
function (req, res, next) {
res.send('Success!');
}
);
//...
The example code is taken from express-brute module documentation.
Secure Transmission using HTTPS
It is 2021 and you must use HTTPS to send your data and traffic over the internet securely. HTTPS is an extension of the HTTP protocol with secure communication support. By using HTTPS, you can make sure that the traffic and your user’s data over the internet is encrypted and safe.
I am not going to explain how HTTPS works in the detail here. We are going to focus on the implementation part of it. I highly recommend you to use LetsEncrypt to generate the SSL certificates for all of your domain/subdomain. It’s free and runs a daemon to update SSL certificates every 90 days.
You can learn more about LetsEncrypt here.
You can opt for a domain-specific certificate or a wildcard certificate if you have multiple subdomains. LetsEncrypt supports both.
You can use LetsEncrypt for both Apache and Nginx based web servers. I highly recommend performing SSL negotiations in the reverse proxy or at the gateway layer because it is a heavy computing operation.
Session Hijacking Prevention
The session is an important part of any dynamic web application. Having a secure session in the application is a must for the users and systems safety. A session is implemented using cookies and it must be kept secure to prevent session hijacking.
The following is a list of the attributes that can be set for each cookie and what they mean:
- secure – this attribute tells the browser to only send the cookie if the request is being sent over HTTPS.
- HttpOnly – this attribute is used to help prevent attacks such as cross-site scripting since it does not allow the cookie to be accessed via JavaScript.
- domain – this attribute is used to compare against the domain of the server in which the URL is being requested. If the domain matches or if it is a sub-domain, then the path attribute will be checked next.
- path – in addition to the domain, the URL path that the cookie is valid for can be specified. If the domain and path match, then the cookie will be sent in the request.
- expires – this attribute is used to set persistent cookies since the cookie does not expire until the set date is exceeded
You can use express-session npm module to perform session management in the Express framework.
const session = require('express-session');
const app = express();
app.use(session({
secret: 'keyboard cat',
resave: false,
saveUninitialized: true,
cookie: { secure: true, path: '/'}
}));
You can learn more about Express session handling here.
Cross Site Request Forgery (CSRF) Attack Prevention
CSRF is an attack where that manipulates a trusted user of a system to execute unwanted malicious actions on a web application. In Node.js, we can use csurf module to mitigate CSRF attack. This module requires either express-session or cookie-parser to be initialized first. You can check out the example code below.
const cookieParser = require('cookie-parser');
const csrf = require('csurf');
const bodyParser = require('body-parser');
// setup route middlewares
const csrfProtection = csrf({ cookie: true });
const parseForm = bodyParser.urlencoded({ extended: false });
// create express app
const app = express();
// we need this because "cookie" is true in csrfProtection
app.use(cookieParser());
app.get('/form', csrfProtection, function(req, res) {
// pass the csrfToken to the view
res.render('send', { csrfToken: req.csrfToken() });
});
app.post('/process', parseForm, csrfProtection, function(req, res) {
res.send('data is being processed');
});
app.listen(3000);
On the web page, you need to create a hidden input type with the value of the CSRF token. For example.
In the case of AJAX requests, you can pass the CSRF token in the header.
headers: {
'CSRF-Token': token
}
Denial of Service
Denial of service or DOS is a type of attack where attackers tried to bring down the service or make it inaccessible to users by disrupting the system. The attacker generally flooded the systems with lots of traffic or requests which in turn increases the CPU and memory load leading to a system crash.
To mitigate DOS attacks in your Node.js application, the first step would be the identification of such an event. I highly recommend these two modules to be integrated into the system.
- Account lockout – After n number of failed attempts, lock the account or IP address for a period of time (say 24h?)
- Rate limiting – Limit the users to request the system n number of times within a specific period, for example, 3 requests per minute from an individual user
The Regular expression Denial of service attack (ReDOS)is a type of DOS attack where the attacker exploits the regular expression implementation in the system. Some regular expression takes heavy computing power to execute and the attacker can exploit it by submitting requests that involve regular expression in the system which in turns increases the load on the system leading to system failure.
You can use software like this to detect dangerous regular expression and avoid to use them in your system.
Dependencies Validation
We all use tons of dependencies in our projects. We need to check and validate these dependencies as well to ensure the security of the overall project. NPM already has an audit feature to find the vulnerability of the project. Just run the command shown below in your source code directory.
To fix the vulnerability, you can run this command.
You can also run the dry run to check the fix before applying it to your project.
HTTP Security Headers
HTTP provides several security headers that can prevent commonly known attacks. If you are using the Express framework then you can use a module called helmet to enable all security headers with a single line of code.
Here is how to use it.
const helmet = require("helmet");
const app = express();
app.use(helmet());
//...
This enables the following HTTP headers.
- Strict-Transport-Security
- X-frame-Options
- X-XSS-Protection
- X-Content-Type-Protection
- Content-Security-Policy
- Cache-Control
- Expect-CT
- Disable X-Powered-By
These headers prevent malicious users from various types of attacks such as clickjacking, cross-site scripting, etc.
Conclusion
A secure Node.js application will protect users’ data and information and increases the credibility of the application. These recommendations are compiled based on years of experience working in the Node.js ecosystem. If we miss anything, kindly drop a comment with a recommendation and we will add it to our list.