OWASP Top 10- Web Application Vulnerabilities (PART-?1)
Aastha Thakker
Cyber security enthusiast | SOC analyst | Digital Forensics | Blogs & Articles | THM - Documentation Team Lead | Gujarat University
A vulnerability is a weakness or flaw in a system’s design, implementation, or configuration that could be exploited to compromise the system’s security, integrity, or availability. Some Examples are:?
a. Default Passwords: Use of default or easily guessable passwords, creating a security loophole.
b. Lack of Encryption: Exposes sensitive data during transmission, creating risk of unauthorized access.
c. SQL Injection: Exploiting inadequate input validation to inject malicious SQL code, potentially compromising a database.
d. Insecure Design: Flaws in the fundamental design of a system
e. Security Misconfiguration: Improperly configured security settings.
OWASP stands for Open Web Application Security Project.
OWASP is a nonprofit organization dedicated to improving the security of software. It provides freely available resources, tools, and guidelines to help organizations and individuals develop, deploy, and maintain secure software applications. Reference used OWASP Top Ten | OWASP Foundation. It focuses on various aspects of application security, including identifying common security risks, creating tools and documentation to address those risks, and fostering a community where knowledge and best practices can be shared.
Every few years, OWASP analyzes the top ten risks, publishes a description of these vulnerabilities and how to fix them. It is intended to raise awareness about common security issues in software development and help organizations prioritize their efforts to address these risks. The last list was compiled in 2021. In this blog you will get the basic information on top 10 web Application Vulnerabilities along with the comparison of last compiled 2017 OWASP top 10 list.
Sections contained here will answer questions like:
TOP 10 Web Application Vulnerabilities?—?PART?1
1. BROKEN ACCESS?CONTROL
A01:2021-Broken Access Control moves up from the fifth position; 94% of applications were tested for some form of broken access control. The 34 Common Weakness Enumerations (CWEs) mapped to Broken Access Control had more occurrences in applications than any other category.
Broken access control refers to vulnerabilities that occur when an application fails to properly enforce access controls, allowing unauthorized users to access resources or perform actions they should not have permission for. Access control is about restricting access to resources based on user roles and permissions.
Two Extends of this Vulnerability:
Common Issues in Broken Access?Control:
Strategies for Mitigation:
2. CRYPTOGRAPHIC FAILURES?
A02:2021-Cryptographic Failures shifts up one position to #2, previously known as Sensitive Data Exposure, which was broad symptom rather than a root cause. The renewed focus here is on failures related to cryptography which often leads to sensitive data exposure or system compromise.
It refers to security vulnerabilities that arise due to weaknesses or improper implementation of cryptographic mechanisms.
Cryptographic failures pose the risk of exposing sensitive data, leaving information such as passwords, credit card numbers, health data, and GDPR-protected information vulnerable to unauthorized access. Weak or outdated cryptographic algorithms and inadequate key management practices contribute to this susceptibility.
In the context of data transmission, the choice between HTTP and HTTPS is important for safeguarding sensitive information. While HTTP exposes data to interception due to the lack of encryption whereas HTTPS uses SSL/TLS protocols, ensures secure and encrypted data exchange. However, just the presence of an SSL certificate doesn’t guarantee immunity. Example: A website supports an outdated version of the SSL/TLS protocol (e.g., SSL 2.0 or TLS 1.0), which is known to have security vulnerabilities. Attackers can exploit these vulnerabilities to perform attacks like man-in-the-middle attacks or downgrade attacks.
Common Issues:
领英推荐
Strategies for Mitigation:
3. INJECTION
A03:2021-Injection slides down to the third position. 94% of the applications were tested for some form of injection, and the 33 CWEs mapped into this category have the second most occurrences in applications. Cross-site Scripting is now part of this category in this edition.
Injection vulnerability is a grave concern, not confined to SQL but extending to variants like Cross-Site Scripting (XSS). Imagine a scenario where user input isn’t properly checked or cleaned by an application?—?that’s the breeding ground for injection attacks. This vulnerability surfaces when dynamic queries or non-parameterized calls are sent straight to interpreters without context or proper precautions. It’s like leaving a door wide open for malicious commands, such as SQL injection, enabling attackers to manipulate queries and execute unintended actions with potential consequences. In simpler terms, when an application doesn’t thoroughly check what users input, it becomes vulnerable to sneaky attacks that can mess with its core functions.
Common Issues:
Strategies for Mitigation:
4. INSECURE?DESIGN?
A04:2021-Insecure Design is a new category for 2021, with a focus on risks related to design flaws. If we genuinely want to “move left” as an industry, it calls for more use of threat modeling, secure design patterns and principles, and reference architectures.
Insecure design refers to vulnerabilities that arise due to flawed or inadequate design decisions in the architecture of a software application.
These encompass various weaknesses such as ineffective control design and insecure implementation. It emphasizes the industry’s need to shift focus leftward, advocating for increased utilization of threat modeling, secure design patterns, principles, and reference architectures.
Secure design doesn’t totally guarantee secure implementation. In some cases, a flaw in the design phase may persist despite a secure implementation effort.
Secure design involves a proactive methodology, continually assessing threats to ensure that the code is robustly conceived and rigorously tested. It places a premium on preventive measures over reactive fixes.
Common Issues:
Strategies for Mitigation:
5. SECURITY MISCONFIGURATION
A05:2021-Security Misconfiguration moves up from #6 in the previous edition; 90% of applications were tested for some form of misconfiguration. With more shifts into highly configurable software, it’s not surprising to see this category move up. The former category for XML External Entities (XXE) is now part of this category.
Occur when an application, server, or system is not set up properly, leaving it vulnerable to exploitation. This category, which now includes the former XML External Entities (XXE) issues, highlights instances where security components within applications are present but improperly configured. XXE is because default or improper configurations may allow an attacker to exploit the application by injecting malicious XML content. This could lead to sensitive information disclosure, denial of service, or other forms of attacks.
Consider a scenario where a user encounters a detailed error message explaining why an error occurred and what actions to take. While this may seem helpful, it inadvertently exposes the application to potential exploitation. Such detailed error messages, coupled with excessive information, fall under security misconfiguration, providing attackers insights they can leverage.
Common Issues:
Strategies for Mitigation:
I trust you’ve grasped the fundamentals of these 5 vulnerabilities. Stay tuned for the next 5 in Part 2!
IT Certification at TIBCO
11 个月?? Thrilled to share a fantastic resource for F5 Certification prep! Explore www.certfun.com/f5 for top-quality practice exams. ?? Kickstart your journey to becoming certified! #CertFun #F5Success #CareerGrowth #CertificationGoals ??
Associate Data Analyst@Pretium Enterprises SIH 2022 ,2023 Winner , Cohort member at TPF PLG ’23 and TPF Gen AI Rush
11 个月Amazing
Student at Gujarat University || YouTuber || Cybersecurity Researcher
11 个月This is a whole lots of content.