OWASP
Top 10 - 2013
Colin Harrington
4/16/2014
A1: Injection
SQL
 String query = "SELECT * FROM accounts WHERE custID='" + request.getParameter("id") +"'"; http://example.com/app/accountView?id=' or '1'='1- 
HQL
 
- 
LDAP
 
- 
OS Commands
 
"cp $filename /tmp/something;".execute()
A2: Broken Authentication
and Session Management
Session ID
Session Fixation
Timeout
Rotated on Login
 http://example.com/sale/saleitems;
jsessionid=2P0OC2JDPXM0OQSNDLPSKHCJUN2JV
?dest=HawaiiAccount Management
Weak Account Management
Password recovery
SSO (Single Sign-On)
Unencrypted transports
A3: Cross-Site Scripting (XSS)
unvalid inputs
unescaped data
Javascript, DOM injection, etc.
A4: Insecure Direct Object References
Attacker, who is an authorized system user, simply changes a parameter value that directly refers to a system object to another object the user isn’t authorized for. Is access granted?
Multi-tenancy
HIPPA
http://example.com/app/accountInfo?acct=notmyacct
Updating bad references.
A5: Security MISCONFIGURATION
- 
Software
 
- 
Firewall holes
 
- 
Default accounts
 
- 
Revealing Stacktraces
 
- 
Insecure Configuration
 
A6: Sensitive Data Exposure
Clear text storage/transport
Unencrypted Payment Card Information
Transport MITM
A7: Missing Function Level Access Control
Lack of server-side Access Control
http://example.com/app/getappInfohttp://example.com/app/admin_getappInfohttp://example.com/app/addRole/Admin
A8: Cross-Site Request Forgery (CSRF)
Attacker creates forged HTTP requests and tricks a victim into submitting them via image tags, XSS, or numerous other techniques. If the user is authenticated, the attack succeeds.
<img src="http://example.com/app/transferFunds?amount=1500&destinationAccount=attackersAcct#" width="0" height="0" />A9: Using Components with Known Vulnerabilities
Need I say more?

A10: Unvalidated Redirects and Forwards
Attacker links to unvalidated redirect and tricks victims into clicking it. Victims are more likely to click on it, since the link is to a valid site. Attacker targets unsafe forward to bypass security checks.
 http://www.example.com/redirect.jsp?url=evil.comhttps://www.owasp.org
Shamelessly paraphrased from:
https://www.owasp.org/index.php/Top10#OWASP_Top_10_for_2013
OWASP
By Colin Harrington
OWASP
- 2,829
 
   
   
  