The term âproductionâ refers to the stage in the software lifecycle when an application or API is generally available to its end-users or consumers. In contrast, in the âdevelopmentâ stage, youâre still actively writing and testing code, and the application is not open to external access. The corresponding system environments are known as production and development environments, respectively.
Development and production environments are usually set up differently and have vastly different requirements. Whatâs fine in development may not be acceptable in production. For example, in a development environment you may want verbose logging of errors for debugging, while the same behavior can become a security concern in a production environment. And in development, you donât need to worry about scalability, reliability, and performance, while those concerns become critical in production.
Note: If you believe you have discovered a security vulnerability in Express, please see Security Policies and Procedures.
Security best practices for Express applications in production include:
Express 2.x and 3.x are no longer maintained. Security and performance issues in these versions wonât be fixed. Do not use them! If you havenât moved to version 4, follow the migration guide.
Also ensure you are not using any of the vulnerable Express versions listed on the Security updates page. If you are, update to one of the stable releases, preferably the latest.
If your app deals with or transmits sensitive data, use Transport Layer Security (TLS) to secure the connection and the data. This technology encrypts data before it is sent from the client to the server, thus preventing some common (and easy) hacks. Although Ajax and POST requests might not be visibly obvious and seem âhiddenâ in browsers, their network traffic is vulnerable to packet sniffing and man-in-the-middle attacks.
You may be familiar with Secure Socket Layer (SSL) encryption. TLS is simply the next progression of SSL. In other words, if you were using SSL before, consider upgrading to TLS. In general, we recommend Nginx to handle TLS. For a good reference to configure TLS on Nginx (and other servers), see Recommended Server Configurations (Mozilla Wiki).
Also, a handy tool to get a free TLS certificate is Letâs Encrypt, a free, automated, and open certificate authority (CA) provided by the Internet Security Research Group (ISRG).
Helmet can help protect your app from some well-known web vulnerabilities by setting HTTP headers appropriately.
Helmet is a collection of several smaller middleware functions that set security-related HTTP response headers. Some examples include:
helmet.contentSecurityPolicy
which sets the Content-Security-Policy
header. This helps prevent cross-site scripting attacks among many other things.helmet.hsts
which sets the Strict-Transport-Security
header. This helps enforce secure (HTTPS) connections to the server.helmet.frameguard
which sets the X-Frame-Options
header. This provides clickjacking protection.Helmet includes several other middleware functions which you can read about at its documentation website.
Install Helmet like any other module:
$ npm install --save helmet
Then to use it in your code:
// ...
const helmet = require('helmet')
app.use(helmet())
// ...
It can help to provide an extra layer of obsecurity to reduce server fingerprinting. Though not a security issue itself, a method to improve the overall posture of a web server is to take measures to reduce the ability to fingerprint the software being used on the server. Server software can be fingerprinted by kwirks in how they respond to specific requests.
By default, Express.js sends the X-Powered-By
response header banner. This can be
disabled using the app.disable()
method:
app.disable('x-powered-by')
Note:
Disabling the X-Powered-By header
does not prevent
a sophisticated attacker from determining that an app is running Express. It may
discourage a casual exploit, but there are other ways to determine an app is running
Express.
Express.js also sends itâs own formatted 404 Not Found messages and own formatter error response messages. These can be changed by adding your own not found handler and writing your own error handler:
// last app.use calls right before app.listen():
// custom 404
app.use((req, res, next) => {
res.status(404).send("Sorry can't find that!")
})
// custom error handler
app.use((err, req, res, next) => {
console.error(err.stack)
res.status(500).send('Something broke!')
})
To ensure cookies donât open your app to exploits, donât use the default session cookie name and set cookie security options appropriately.
There are two main middleware cookie session modules:
express.session
middleware built-in to Express 3.x.express.cookieSession
middleware built-in to Express 3.x.The main difference between these two modules is how they save cookie session data. The express-session middleware stores session data on the server; it only saves the session ID in the cookie itself, not session data. By default, it uses in-memory storage and is not designed for a production environment. In production, youâll need to set up a scalable session-store; see the list of compatible session stores.
In contrast, cookie-session middleware implements cookie-backed storage: it serializes the entire session to the cookie, rather than just a session key. Only use it when session data is relatively small and easily encoded as primitive values (rather than objects). Although browsers are supposed to support at least 4096 bytes per cookie, to ensure you donât exceed the limit, donât exceed a size of 4093 bytes per domain. Also, be aware that the cookie data will be visible to the client, so if there is any reason to keep it secure or obscure, then express-session may be a better choice.
Using the default session cookie name can open your app to attacks. The security issue posed is similar to X-Powered-By
: a potential attacker can use it to fingerprint the server and target attacks accordingly.
To avoid this problem, use generic cookie names; for example using express-session middleware:
const session = require('express-session')
app.set('trust proxy', 1) // trust first proxy
app.use(session({
secret: 's3Cur3',
name: 'sessionId'
}))
Set the following cookie options to enhance security:
secure
- Ensures the browser only sends the cookie over HTTPS.httpOnly
- Ensures the cookie is sent only over HTTP(S), not client JavaScript, helping to protect against cross-site scripting attacks.domain
- indicates the domain of the cookie; use it to compare against the domain of the server in which the URL is being requested. If they match, then check the path attribute next.path
- indicates the path of the cookie; use it to compare against the request path. If this and domain match, then send the cookie in the request.expires
- use to set expiration date for persistent cookies.Here is an example using cookie-session middleware:
const session = require('cookie-session')
const express = require('express')
const app = express()
const expiryDate = new Date(Date.now() + 60 * 60 * 1000) // 1 hour
app.use(session({
name: 'session',
keys: ['key1', 'key2'],
cookie: {
secure: true,
httpOnly: true,
domain: 'example.com',
path: 'foo/bar',
expires: expiryDate
}
}))
Make sure login endpoints are protected to make private data more secure.
A simple and powerful technique is to block authorization attempts using two metrics:
rate-limiter-flexible package provides tools to make this technique easy and fast. You can find an example of brute-force protection in the documentation
Using npm to manage your applicationâs dependencies is powerful and convenient. But the packages that you use may contain critical security vulnerabilities that could also affect your application. The security of your app is only as strong as the âweakest linkâ in your dependencies.
Since npm@6, npm automatically reviews every install request. Also you can use ânpm auditâ to analyze your dependency tree.
$ npm audit
If you want to stay more secure, consider Snyk.
Snyk offers both a command-line tool and a Github integration that checks your application against Snykâs open source vulnerability database for any known vulnerabilities in your dependencies. Install the CLI as follows:
$ npm install -g snyk
$ cd your-app
Use this command to test your application for vulnerabilities:
$ snyk test
Use this command to open a wizard that walks you through the process of applying updates or patches to fix the vulnerabilities that were found:
$ snyk wizard
Keep an eye out for Node Security Project or Snyk advisories that may affect Express or other modules that your app uses. In general, these databases are excellent resources for knowledge and tools about Node security.
Finally, Express apps - like any other web apps - can be vulnerable to a variety of web-based attacks. Familiarize yourself with known web vulnerabilities and take precautions to avoid them.
Here are some further recommendations from the excellent Node.js Security Checklist. Refer to that blog post for all the details on these recommendations: