OWASP presents the draft Top 6 of the main dawn for 2021
OWASP top 6 Web Application Security Web -
The Top 10 list is an extensive guide used on today's web
application security threats. The Open Source Web Application Security Project
(OWASP) has released its draft Top 10 2021 list that reveals a change in the
way it ranks modern threats.
The draft report, available online
(https://owasp.org/Top10/), contains important changes to the way the nonprofit
categorizes current threats from web applications, keeping in mind that the
list It has not been updated since 2017.
OWASP has updated the methodology used to generate the Top
10 list. Eight out of 10 categories are data-driven and two have been selected
based on industry survey responses.
When the organization analyzes the threat information,
provided by cybersecurity companies, there are specific data factors that are
used to generate the Top 10 list. These include software and hardware mapping
based on Common Weaknesses Enumeration (CWE), the percentage of applications
vulnerable to a particular CWE and its impact on organizations.
OWASP takes into account the exploit weight and average
metrics of a vulnerability, based on CVSSv2 and CVSSv3 (Common Vulnerability
Scoring System) scores, and the total number of applications that have CWEs
assigned to CWEs assigned to Total Number of Vulnerabilities and common
exposures (CVD) attributable to a particular type of hazard.
Three new categories have been included: "Insecure
Design", "Software and Data Integrity Failures" and a group of
"Server Side Request Forgery (SSRF)" attacks.
The "External XML Entities (XXE)" category of 2017
becomes part of the "Security misconfiguration" category of 2021. On
the other hand, "Cross-Site Scripting (XSS)" has been added to the
"Injection" section. and "Insecure deserialization" is now
part of "Software and data integrity failures."
OWASP scrolls left
The inclusion of "Insecure Design" and
"Software and Data Integrity Failures" shows how the software
industry continues to shift to the left (Shifts Left) by focusing more on
secure design and architecture as well as how.
“Often times, secure design and threat modeling are
overlooked due to the speed of actual development. It is also important to
finally see OWASP highlighting software development security and process CI /
CD integration as another focus area to keep in mind, ”said Tom Eston, Director
of Application Security Practice at Bishop Fox.
Top 6 OWASP: The Complete List
1. A01: 2021-Access control interrupted: 34 CWE. Access
control vulnerabilities include elevation of privilege, malicious URL
modification, access control bypass, incorrect CORS settings, and primary key
manipulation.
2. A02: 2021-Cryptographic failures: 29 CWE. This includes
security flaws when data is in transit or at rest, such as implementation of
weak cryptographic algorithms, poor or lax key generation, failure to implement
encryption or verify certificates, and transmission of unencrypted data.
3. A03: 2021-Injection: 33 CWE. Common injections affect
SQL, NoSQL, LDAP and operating system control, and can be caused by cleanup
failures, XSS vulnerabilities, and lack of file path protection.
4. A04: 2021-Unsafe design: 40 CWE. Unsafe design elements
vary widely, but OWASP generally describes them as "missing or ineffective
control design." Areas of concern include the lack of protection of stored
data, problems with logic programming, and the display of content that reveals
sensitive information.
5. A05: 2021-Incorrect security settings: 20 CWE.
Applications can be considered vulnerable if they lack security hardening, if
there are unnecessary features such as an open hand when it comes to
privileges, if default accounts are kept active, and if there are security
features that are not configured correctly.
6. A06: 2021-Vulnerable and obsolete components: three CWEs.
This category focuses on client-side and server-side components, component
maintenance failures,
Comments
Post a Comment