Education

OWASP Top Ten of 2017, Explained and Expanded

For those who want all the details, please check out the official PDF from OWASP. If you’d like me to go into much more detail on any of them, please don’t hesitate to drop me a comment here. It’s certainly not the case that understanding the Open Web Application Security Project’s Top 10 list is sufficient for you to be an expert on web application security. It, for example, says nothing about how you should keep your personal passwords, or even much about how best to store passwords.

OWASP Top 10 2017 Update Lessons

• A10 – Unvalidated Redirects and Forwards, while found in approximately 8% of applications, it was edged out overall by XXE. • A8 – Cross-Site Request Forgery (CSRF), as many frameworks include CSRF defenses, it was found in only 5% of applications. Also, would like to explore additional insights that could be gleaned from the contributed dataset to see what else can be learned that could be of use to the security and development communities.

Get daily email updates

And while the de facto application security standard now includes three new categories, injection has maintained its position at the top of the risk chart in 2017. PHP applications have had this type of vulnerability for ages, because the language’s native support for a specific type of serialization. One which assumes an unrealistic amount of security in storage, and so lets the language’s unserialize call do dangerous things. Its seems to me that part of the reason for this to emerge relatively new and so high is that that the  went into effect in May 2018, and that made some people take this whole question pretty seriously. The recommendation of “Don’t store sensitive data unnecessarily” is great advice, but it’s also one of the most common lessons people have taken from the GDPR. The advice contained here beyond that, of using good encryption algorithms and encrypting more data at rest are also quite good.

Because the process of reaching consensus is long and time consuming, the organization has averaged an update about every-three-years. This keeps it up-to-date, but stops it from being driven too strongly by the latest trends and obsessions of the industry. There https://remotemode.net/become-a-net-razor-developer/owasp-top-10-2017-update/ are 125k records of a CVE mapped to a CWE in the NVD data extracted from OWASP Dependency Check at the time of extract, and there are 241 unique CWEs mapped to a CVE. 62k CWE maps have a CVSSv3 score, which is approximately half of the population in the data set.

A8:2017 – Insecure Deserialization

A list of the ten most critical security risks to modern web applications, sorted by their observed importance. They released an updated version, and this blog post will briefly explain what has changed since the last publication of the OWASP Top 10 in 2017. The OWASP Top Ten
is a standard awareness document for developers and web application security. It represents a broad consensus about the most critical security risks to web applications. It was started in 2003 to help organizations and developer with a starting point for secure development.

Previously we had some Top 10 categories that simply no longer existed in some languages or frameworks, and that would make training a little awkward. For example,  Sensitive Data Exposure
 is a symptom, and Cryptographic  Failure
 is a root cause. Cryptographic Failure can likely lead to Sensitive Data Exposure, but not the other way around. Another way to think about it is a sore arm is a symptom; a broken bone is the root cause for the soreness. Grouping by  Root Cause
 or  Symptom
 isn’t a new concept, but we wanted to call it out. Within the CWE hierarchy, there is a mix of  Root Cause
 and  Symptom 
weaknesses.

2013 Project Sponsors

Similar to Injection, “broken authentication” really contains a whole host of vulnerabilities inside of it. Both weak password storage and allowing for things like cookie stuffing via stolen session IDs are examples of this vulnerability. “Injection” as a class of security flaw often gets shortened in my head to simply “SQL injection.” For the initiated, SQL is the language that relational databases like MySQL, Postgres, Microsoft SQL, etc speak. SQL Injection vulnerabilities come about when an unvalidated user-accessible field can have extra SQL queries like DROP TABLE users; put into the middle and executed by a database. XSS allows attackers to run scripts in a victim’s browser, which can hijack user sessions, de-identify websites or redirect the user to malicious websites.

Sobre el autor