owasptop10的漏洞原理和测试⽅法
amphetamine译⾃:
www.owasp/images/d/d6/OWASP_Top_10_2017%EF%BC%88RC2%EF%BC%89%E4%B8%AD%E6%96%8 7%E7%89%88%EF%BC%88%E5%8F%91%E5%B8%83%E7%89%88%EF%BC%89.pdf
1. 注⼊(Injection)
Injection flaws, such as SQL, NoSQL, OS, and LDAP injection, occur when untrusted data is nt to an interpreter as part of a command or query. The attacker’s hostile data can trick the interpreter into executing unintended commands or accessing data without proper authorization.
2. 失效的⾝份认证和会话管理(Broken Authentication)21点梭哈>世界著名的旅游胜地
Application functions related to authentication and ssion management are often implemented incorrectly, allowing attackers to compromi passwords, keys, or ssion tokens, or to exploit other implementation flaws to assume other urs’ identities temporarily or permanently.
instructions
3. 敏感信息泄露(Sensitive Data Exposure)
Many web applications and APIs do not properly protect nsitive data, such as financial, healthcare, and PII. Attackers may steal or modify such weakly protected data to conduct credit card fraud, identity theft, or other crimes. Sensitive data may be compromid without extra protection, such as encryption at rest or in transit, and requires special precautions when exchanged with the browr.
honestly什么意思4. 外部实体(XML External Entities (XXE))
Many older or poorly configured XML processors evaluate external entity references within XML documents. External entities can be ud to disclo internal files using the file URI handler, internal file shares, internal port scanning, remote code execution, and denial of rvice attacks.
5. 失效的访问控制(Broken Access Control)
Restrictions on what authenticated urs are allowed to do are often not properly enforced. Attackers can exploit the flaws to access unauthorized functionality and/or data, such as access other urs’ accounts, view nsitive files, modify other urs’ data, change access rights, etc.
6. 安全配置错误(Security Misconfiguration)
Security misconfiguration is the most commonly en issue. This is commonly a result of incure d请假条英文
efault configurations, incomplete or ad hoc configurations, open cloud storage, misconfigured HTTP headers, and verbo error messages containing nsitive information. Not only must all operating systems, frameworks, libraries, and applications be curely configured, but they must be patched/upgraded in a timely fashion.
7. 跨站脚本(Cross-Site Scripting XSS)
XSS flaws occur whenever an application includes untrusted data in a new web page without proper validation or escaping, or updates an existing web page with ur-supplied data using a browr API that can create HTML or JavaScript. XSS allows attackers to execute scripts in the victim’s browr which can hijack ur ssions, deface web sites, or redirect the ur to malicious sites.
8. 不安全的反序列化(Incure Derialization)yue是什么意思
Incure derialization often leads to remote code execution. Even if derialization flaws do not result in remote code execution, they can be ud to perform attacks, including replay attacks, injection attacks, and privilege escalation attacks.
waterbottle9. 使⽤含有已知漏洞的组件(Using Components with Known Vulnerabilities)
beginner是什么意思女子谋杀俱乐部
Components, such as libraries, frameworks, and other software modules, run with the same privileges as the application. If a vulnerable component is exploited, such an attack can facilitate rious data loss or rver takeover. Applications and APIs using components with known vulnerabilities may undermine application defens and enable various attacks and impacts.
10. 不⾜的⽇志记录和控制(Insufficient Logging & Monitoring)
Insufficient logging and monitoring, coupled with missing or ineffective integration with incident respon, allows attackers to further attack systems, maintain persistence, pivot to more systems, and tamper, extract, or destroy data. Most breach studies show time to detect a breach is over 200 days, typically detected by external parties rather than internal process or monitoring.