5 reasons why OWASP Top Ten 2021 is broken
Dear community. Please let me skip any introduction and drop just 5 points straightforwardly.
- Why “Sensitive Data Exposure†issues are a part of “Cryptographic Failures�
- Why Path Traversal is now a part of Broken Access Control but also is directly mentioned as part of A3. Injections (CWE-73).
- Why “Software and Data Integrity Failures†that focus on making assumptions related to software updates, critical data, and CI/CD pipelines without verifying integrity include “Insecure Deserializationâ€
- Why XXE (XML eXternal Entities) is a part of “Security Misconfiguration†for some reason, and not Insecure Deserialization if XML is a data serialization format.
- 500k data entities were mentioned but only 22k is available on GitHub. Where is the other data?
I also want to refer to the OWASP Top Ten 2021 statistics-based proposal we published in January 2021, 10 months early an official OWASP Top Ten 2021.
Any thoughts?
Great share, Ivan!
Lead Security Analyst
2 å¹´Usually a top ten or top five list has to leave off some less important items. It looks like OWASP Top Ten needs to either be Top Eleven or include just the top ten.
OWASP Belfast
2 å¹´Good questions for sure.