CS5331 Assignment 1 Project Reference Repository
Your objective is to implement a web application that provides the endpoints specified here: https://cs5331-assignments.github.io/rest-api-development/.
The project has been packaged in an easy to set-up docker container with the skeleton code implemented in Python Flask. You are not restricted in terms of which language, web stack, or database you desire to use. However, please note that very limited support can be given to those who decide to veer off the beaten path.
You may be required to modify the following files/directories:
- Dockerfile - contains the environment setup scripts to ensure a homogenous development environment
- src/ - contains the front-end code in
html
and the skeleton Flask API code inservice
- img/ - contains images used for this README
Assuming you're developing on an Ubuntu 16.04 machine, the quick instructions to get up and running are:
# Install Docker
sudo apt-get update
sudo apt-get install \
apt-transport-https \
ca-certificates \
curl \
software-properties-common
curl -fsSL https://download.docker.com/linux/ubuntu/gpg | sudo apt-key add -
sudo add-apt-repository \
"deb [arch=amd64] https://download.docker.com/linux/ubuntu \
$(lsb_release -cs) \
stable"
sudo apt-get update
sudo apt-get install docker-ce
# Verify Docker Works
sudo docker run hello-world
# Run the skeleton implementation
sudo ./run.sh
(Docker CE installation instructions are from this link.)
Please consult your assignment hand-out for detailed setup information.
The implementation will be graded in an automated fashion on an Ubuntu 16.04 virtual machine by building the docker container found in your repository and running it. The grading script will interact with your API.
The following ports are expected to be accessible:
- 80, on which static HTML content, including the front-end, is served.
- 8080, on which the API is exposed.
To verify this, please run the following commands:
sudo ./run.sh
On a different window:
curl http://localhost:80
curl http://localhost:8080
If a response is received, you're good to go.
Please replace the details below with information relevant to your team.
Login Page
Register User
Create Diary Entry
View Public Entries
View My Personal Entries
View Diary Entry Details and Modify Permissions
Delete Entry
Please fill out this section with details relevant to your team.
- Ngo Kim Phu
- Choo Rui Bin
- Ouyang Danwen
- Chai Wai Aik Zander
The web app is written on Python Flask framework that connects to a MongoDB database and the frontend web server is hosted on Apache. The frontend is designed using HTML, Bootstrap 4 and JavaScript (jQuery 3.3.1).
We had identified the following security considerations, however it had been stated in the assignment brief that there is no need to implement the actual security measures to counter these issues.
Implemented:
- Password salted-hashing using bcrypt
- Client-side XSS sanitisation using DOMPurify
Considered but not implemented:
- JWT for better management of the authentication token
- Basic Auth tokens to prevent direct access to the API endpoints
- Enhanced challenge/response password authentication to prevent login timing attacks
- CSRF tokens
- Server-side XSS sanitisation
Question 3: Are there any improvements you would make to the API specification to improve the security of the web application?
Include a Basic Auth token to be sent along with every RESTful API call; this token will be generated upon login and subsequently validated on the server-side. This prevents direct access to the API endpoints (without the need for a user login), which otherwise represents a potential information leak.
The generated cookie has an expiry time of 2 hours to reduce the possibility of replay attacks. However, this can be deemed insecure (See Question 5).
Question 5: Is your web application vulnerable? If yes, how and why? If not, what measures did you take to secure it?
One potential weakness is in the cookie management - currently we are still using the default JavaScript cookie functions. Since these are implemented at the client side, a better implementation would be to use JWT. However, it was assured that we would not have to do its implementation in this current assignment.
Another vulnerability is the lack of SSL. Due to that, all web traffic is sent / received in the clear, allowing all kinds of MITM attacks to occur.
Our usage of DOMPurify provides client-side sanitisation for our web app. However, it is not a foolproof way. For a more rigorous defense (e.g. against persistent XSS), server-side sanitisation should be employed as well.
Logging should be done on the server-side to track all the significant actions made by all the users of the web app. A framework/tool we could use to test our final webapp would be really appreciated. The API should also consider RESTful features like: correct http verbs for end-points (GET for idempotent, resource-info-acquiring end-points, DELETE for resource deletion...), response status codes that make more sense (4xx for client-side errors), maybe a header instead of a field for the auth token...
- Ngo Kim Phu
- Managed project, GitHub organization, repository
- Configured CircleCI continuous integration for quality control
- Wrote the back-end routing and logic code
- Choo Rui Bin
- Wrote the front-end code
- Integrated the RESTful API into the front-end
- Wrote the documentation
- Ouyang Danwen
- Designed the Docker configuration
- Designed the database schema
- Wrote the back-end db code
- Chai Wai Aik Zander
- Wrote the front-end code
- Integrated the RESTful API into the front-end