This course will be retired on June 1, 2025.
Heads up! To view this whole video, sign in with your Courses account or enroll in your free 7-day trial. Sign In Enroll
Start a free Courses trial
to watch this video
This vulnerability allows an attacker to accesses default accounts, unused pages, unpatched flaws, unprotected files and directories, etc. to gain unauthorized access to or knowledge of the system. Security misconfiguration can happen at any level of an application stack, including the platform, web server, application server, database, framework, and custom code.
Using tools like Burp Suite to test for Security Misconfiguration
Further Reading:
OWASP Security Misconfiguration
Helmet: Express.js security with HTTP headers
npm-package-locks: An explanation of npm lockfiles
npm-shrinkwrap: Lock down dependency versions for publication
Body-parser - Node.js body parsing middleware: Limit middleware as part of the body-parser middleware.
Related Discussions
Have questions about this video? Start a discussion with the community and Treehouse staff.
Sign upRelated Discussions
Have questions about this video? Start a discussion with the community and Treehouse staff.
Sign up
You need to sign up for Treehouse in order to download course files.
Sign upYou need to sign up for Treehouse in order to set up Workspace
Sign up