📜 ⬆️ ⬇️

OWASP Top 10 2017

image

The final release of the Top 10 vulnerabilities from OWASP - the most critical security risks of web applications. The update occurs about once every 3-4 years, this release affects current and future security problems of web applications.

The OWASP Top-10 project is referenced by many standards, tools, and organizations, including MITER, PCI DSS, DISA, FTC, and many others. The OWASP Top 10 is a recognized methodology for assessing web application vulnerabilities worldwide. The OWASP Top 10 project reflects the most significant threats to a web application.

OWASP Top 10 2013


The list of the most dangerous risks (vulnerabilities) of web applications from 2013:
')

OWASP Top 10 2017


The list of the most dangerous risks (vulnerabilities) of web applications from 2017:


Changes


The new edition is different from the 2013 edition.



XSS vulnerabilities left the top three, but leakage of critical (sensitive data) moved there from place 6 - apparently the last loud leaks and hacks were not in vain and the OWASP consortium decided to focus on this issue.

Added a new type of vulnerabilities - eXternal Entity XML (XXE). XXE Injection is a type of attack on an application or preprocessor that analyzes XML input.

We also see the addition of an item about unsafe deserialization — such vulnerabilities can lead to remote code execution, allow elevation of privileges, and much more.

An item about the absence of monitoring has been added - according to OWASP, the average time to detect an incident is 200 (!) Days.

Open redirects and CSRF left 10 of the most significant vulnerabilities. The general trend in the OWASP list changes is a shift in the priorities of vulnerabilities / attack vectors from the client-side to the server-side.

OWASP project
PDF version of OWASP Top 10 2017

Source: https://habr.com/ru/post/342986/


All Articles