Assignment On: Top 10 Owasp Vulnerability of Web
Assignment On: Top 10 Owasp Vulnerability of Web
Assignment On: Top 10 Owasp Vulnerability of Web
On
Submitted to:
Mr Uzair
Submitted by:
M.Mudasir Kamran
1. Injection
2. Broken Authentication
Data exposure risk can be minimized by encrypting all sensitive data as well
as disabling the caching* of any sensitive information. Additionally, web
application developers should take care to ensure that they are not
unnecessarily storing any sensitive data..
This is an attack against a web application that parses XML* input. This
input can reference an external entity, attempting to exploit a vulnerability
in the parser. An ‘external entity’ in this context refers to a storage unit,
such as a hard drive. An XML parser can be duped into sending data to an
unauthorized external entity, which can pass sensitive data directly to an
attacker.
The best ways to prevent XEE attacks are to have web applications accept a
less complex type of data, such as JSON**, or at the very least to patch XML
parsers and disable the use of external entities in an XML application.
7. Cross-Site Scripting
8. Insecure Deserialization
This threat targets the many web applications which frequently serialize and
deserialize data. Serialization means taking objects from the application
code and converting them into a format that can be used for another
purpose, such as storing the data to disk or streaming it. Deserialization is
just the opposite: converting serialized data back into objects the
application can use. Serialization is sort of like packing furniture away into
boxes before a move, and deserialization is like unpacking the boxes and
assembling the furniture after the move. An insecure deserialization attack
is like having the movers tamper with the contents of the boxes before they
are unpacked.
Many web applications are not taking enough steps to detect data
breaches. The average discovery time for a breach is around 200 days after
it has happened. This gives attackers a lot of time to cause damage before
there is any response. OWASP recommends that web developers should
implement logging and monitoring as well as incident response plans to
ensure that they are made aware of attacks on their applications.