OWASP Top 10- Web Application Vulnerabilities (PART- 2)
Aastha Thakker
Cyber security enthusiast | SOC analyst | Digital Forensics | Blogs & Articles | THM - Documentation Team Lead | Gujarat University
Hey, readers! Hope you’ve all understood the top 5 vulnerabilities from our last blog. Now, gear up for the Part 2 of the OWASP Top 10 vulnerabilities. We’re digging deeper into the rabbit hole, so get ready!
Here is the link for previous Top 5 Vulnerabilities.
6. Vulnerable and Outdated Components
A06:2021-Vulnerable and Outdated Components was previously titled Using Components with Known Vulnerabilities and is #2 in the Top 10 community survey, but also had enough data to make the Top 10 via data analysis. This category moves up from #9 in 2017 and is a known issue that we struggle to test and assess risk. It is the only category not to have any Common Vulnerability and Exposures (CVEs) mapped to the included CWEs, so a default exploit and impact weights of 5.0 are factored into their scores.
Modern distributed web applications often incorporate to the software components or libraries used in an application that have known security vulnerabilities or are not up-to-date with the latest security patches. Any component with a known vulnerability or outdated components becomes a weak link that can impact the security of the entire application.
CWE stands for “Common Weakness Enumeration.” Which is a community-developed list of common software and hardware weakness types that can serve as a common language for describing, mitigating, and preventing security vulnerabilities. CWE is maintained by the MITRE Corporation and provides a standardized way of identifying and categorizing security weaknesses in software and systems.
Known Vulnerabilities: These are vulnerabilities that have been identified and documented by security researchers or the software community.
Outdated Components: May lack the latest security updates and patches, making them susceptible to known exploits. The longer a component goes without updates, the higher the risk of it being compromised.
Common Issues Leading to Vulnerable and Outdated Components:
Preventive Measures:
7. Identification and Authentication Failures
A07:2021-Identification and Authentication Failures was previously Broken Authentication and is sliding down from the second position, and now includes CWEs that are more related to identification failures. This category is still an integral part of the Top 10, but the increased availability of standardized frameworks seems to be helping.
When applications make mistakes in checking who’s using them securely, unauthorized people can steal important information like passwords or access codes security keys, or session tokens and permanently or temporarily assume the identities and permissions of other users. With this stolen information, they can pretend to be other users and do things they’re not supposed to do within the application. These vulnerabilities can lead to unauthorized access, account hijacking, and other security breaches.
Common Issues Leading to Identification and Authentication Failures:
Preventive Measures:
领英推荐
8. Software and data Integrity Failure
A08:2021-Software and Data Integrity Failures is a new category for 2021, focusing on making assumptions related to software updates, critical data, and CI/CD pipelines without verifying integrity. One of the highest weighted impacts from Common Vulnerability and Exposures/Common Vulnerability Scoring System (CVE/CVSS) data mapped to the 10 CWEs in this category. Insecure Deserialization from 2017 is now a part of this larger category.
Software and Data Integrity Failures refer to vulnerabilities that arise when assumptions related to software updates, critical data, and continuous integration/continuous deployment (CI/CD) pipelines are made without proper verification of their integrity. It encompasses a range of issues, including insecure deserialization, which was previously a standalone category.
Insecure deserialization occurs when an application does not properly validate or sanitize serialized input data. Serialization is the process of converting data structures or objects into a format that can be easily stored or transmitted, such as JSON or XML. Deserialization is the reverse process, reconstructing the original data from the serialized format. If this process is not adequately secured, it can lead to various security risks.
Common Issues Leading to Software and Data Integrity Failures:
CI/CD stands for Continuous Integration and Continuous Deployment. It’s a set of practices and automated processes that ensure code changes are built, tested, and deployed reliably and efficiently.
Preventive Measures:
9. Security Logging & Monitoring Failures
A09:2021-Security Logging and Monitoring Failures was previously Insufficient Logging & Monitoring and is added from the industry survey (#3), moving up from #10 previously. This category is expanded to include more types of failures, is challenging to test for, and isn’t well represented in the CVE/CVSS data. However, failures in this category can directly impact visibility, incident alerting, and forensics.
It refers to the weakness where an organization or system doesn’t adequately keep track of what’s happening within its network or applications, and it doesn’t have the means to detect and respond to security incidents effectively. This basically means inadequate practices in logging and monitoring systems within an application or network. These failures can impact an organization’s ability to detect and respond to security incidents effectively.
Common Issues Leading to Security Logging and Monitoring Failures:
Preventive Measures:
10. Server-Side Request Forgery?(SSRF)
A10:2021-Server-Side Request Forgery is added from the Top 10 community survey (#1). The data shows a relatively low incidence rate with above average testing coverage, along with above-average ratings for Exploit and Impact potential. This category represents the scenario where the security community members are telling us this is important, even though it’s not illustrated in the data at this time.
This occurs when an attacker can manipulate the server into making unintended requests to internal resources. In SSRF attacks, the attacker tricks the server into making requests on its behalf, potentially leading to unauthorized access to internal systems, data exposure, or the exploitation of vulnerabilities within the server’s network.
Common Issues Leading to?SSRF:
Preventive Measures for?SSRF:
Founder, Director and Investor | Turn HR and Recruitment into your business’ biggest revenue driver | Passionate about helping CEOs and leaders to thrive in every aspect of life |
1 年Great to see the anticipation for Part 2 of the OWASP Top 10 vulnerabilities! Delving deeper into these vulnerabilities is crucial for understanding and mitigating security risks ?