Education

Lesson 07 OWASP Top 10 2017 A3:2017-Sensitive Data Exposure Conviso Platform Docs

At a bare minimum, we need the time period, total number of applications tested in the dataset, and the list of CWEs and counts of how many applications contained that CWE. If at all possible, please provide the additional metadata, because that will greatly help us gain more insights into the current state of testing and vulnerabilities. Companies should adopt this document and start the process of ensuring that their web applications minimize these risks. Using the OWASP Top 10 is perhaps the most effective first step towards changing the software development culture within your organization into one that produces more secure code. The OWASP Top 10 is a standard awareness document for developers and web application security.

What I hope this article makes clear is that the topic of web security should remain top-of-mind for you as a web developer at any level. The OWASP Top Ten remains a vital checkpoint for anyone hoping to get serious in protecting their web applications. Where people use native PHP serialization, and store that data in a place where a user could control or change it, they’re vulnerable. If, like me, you write a lot of PHP, you’ll need to keep this one in mind for a long time. The easy solution is to skip PHP native serialization and instead use a common format like JSON, which PHP doesn’t preform object-magic with.

Dropped A10:2013: Unvalidated Redirects and Forwards from OWASP Top Ten

We can calculate the incidence rate based on the total number of applications tested in the dataset compared to how many applications each CWE was found in. Similarly to the Top Ten 2017, we plan to conduct a survey to identify up to two categories of the Top Ten that the community believes are important, but may not be reflected in the data yet. We plan to conduct the survey in May or June 2020, and will be utilizing Google forms in a similar manner as last time. The CWEs on the survey will come from current trending findings, CWEs that are outside the Top Ten in data, and other potential sources.

OWASP Top 10 2017 Update Lessons

Especially for non-technical people who web professionals often hand off deployments like WordPress to. And so I don’t see this changing drastically in position until either tooling gets a lot better, or humans become much OWASP Top 10 2017 Update Lessons more concerned about this as a general security practice. The OWASP document specifies that it’s possible with at least Java as well. Basic integrity checks and/or keeping the serialized format totally secure is smart.

How the 2017 List is Different

The acronym stands for “Open Web Application Security Project.” It is generally regarded as one of the best sources of information about keeping the internet (and applications built upon it) secure. It’s largely a community-driven endeavor which aims to make the internet more secure by helping people to find trustworthy information about what they can do to keep their web apps and tools from getting hacked. 2017 and 2013 version mapping relationship see the following figure. Compared to the 2013 version, some of the risk factors also have some changes. To collect the most comprehensive dataset related to identified application vulnerabilities to-date to enable analysis for the Top 10 and other future research as well. This data should come from a variety of sources; security vendors and consultancies, bug bounties, along with company/organizational contributions.

  • At a high level, we plan to perform a level of data normalization; however, we will keep a version of the raw data contributed for future analysis.
  • The acronym stands for “Open Web Application Security Project.” It is generally regarded as one of the best sources of information about keeping the internet (and applications built upon it) secure.
  • XSS allows attackers to run scripts in a victim’s browser, which can hijack user sessions, de-identify websites or redirect the user to malicious websites.
  • This data should come from a variety of sources; security vendors and consultancies, bug bounties, along with company/organizational contributions.
  • Similarly to the Top Ten 2017, we plan to conduct a survey to identify up to two categories of the Top Ten that the community believes are important, but may not be reflected in the data yet.
  • And other things were added, specifically #4 XML External Entities, #8 Insecure Deserialization, and #10 Insufficient Logging.

At a high level, we plan to perform a level of data normalization; however, we will keep a version of the raw data contributed for future analysis. We will analyze the CWE distribution of the datasets and potentially reclassify some CWEs to consolidate them into larger buckets. We will carefully document all normalization actions taken so it is clear what has been done.

A5:2017 – Broken Access Controls

I admit that I don’t love that the majority of this post will be my hot takes on the OWASP Top Ten 2017. It’s a well-considered list and deserves a complete course rather than a quick summary.

AppSec Starter is a basic application security awareness training applied to onboarding new developers. It is not the purpose of this training to discuss advanced and practical topics. Conviso has customized training and practical training platforms.

Rate this post

Related posts