• Home
  • News
  • Software
  • Knowledge
  • MMO
  • Tips
  • Security
  • Network
  • Office
AnonyViet - English Version
  • Home
  • News
  • Software
  • Knowledge
  • MMO
  • Tips
  • Security
  • Network
  • Office
No Result
View All Result
  • Home
  • News
  • Software
  • Knowledge
  • MMO
  • Tips
  • Security
  • Network
  • Office
No Result
View All Result
AnonyViet - English Version
No Result
View All Result

Top 10 web security vulnerabilities according to OWASP 2020 announcement

AnonyViet by AnonyViet
January 27, 2023
in Security
0

OWASP stands for Open Web Application Security Project, an online community dedicated to producing articles, methods, documents, tools and technologies in the field of web application security. Every 3.4 years or annually OWASP publishes a list of common and dangerous vulnerabilities encountered. Here is a list of 10 vulnerabilities 2020

Join the channel Telegram of the AnonyViet 👉 Link 👈

Top 10 web security vulnerabilities according to OWASP 2020 announcement

What is the OWASP Top 10?

The OWASP Top 10 is a list of the 10 most common web vulnerabilities. It also shows the risks, impacts and countermeasures of these vulnerabilities. Updated every three to four years, Latest OWASP vulnerability list released in 2018.

OWASP Top 10 Vulnerabilities in 2020

Injection

Injection allowing attackers to pump malicious code through one application to another. These attacks exploit the operating system through system calls, the use of external programs via shell commands, as well as calls to the sub-database via SQL (i.e. SQL Injection). ). Entire scripts can be written in Perl, Python, and other languages ​​that attack poorly designed applications. Anytime an application uses an interpreter of any kind there is a risk of creating a security hole. Injection was ranked 1st in OWASP in 2018.

Broken Authentication

Broken authentication is a protective term for a number of vulnerabilities that attackers exploit to impersonate users to blatantly gain access to the system. It is roughly understood as impersonating the user’s identity. In general, broken authentication refers to weaknesses in two areas: session management and credential management. Both are classified as broken authentication because attackers use one of two ways to impersonate users: compromised session IDs or stolen credentials.

Attackers use a variety of strategies to take advantage of these weaknesses, ranging from massive credential stuffing attacks to highly targeted conspiracies to gain access to sensitive information. login credentials of a specific person.

Sensitive Data Exposure

Sensitive Data Exposure occurs when an application, company or organization inadvertently exposes personal data. SDE (Sensitive Data Exposure) is different from a data breach, in that an attacker will access and steal your information.

The loss of sensitive data occurs due to inadequate protection of the database where the information is stored. This can be the result of many reasons such as weak coding, no encryption, software bugs, or when someone mistakenly uploads data to the wrong database.

Different types of data may be displayed in some sensitive data. Bank account number, credit card number, healthcare data, session key, home address, phone number, date of birth and user account information such as username and password are one number of types of information that may be exposed. Although the disclosure is by the user, it is still on the OWASP list.

XML External Entities (XXE)

XML External Entities (also known as XXE) is a security vulnerability that allows an attacker to interfere with an application’s processing of XML data. It typically allows an attacker to view files on the application server’s file system and interact with any third-party back-end or external systems that the application can access.

In some situations, an attacker can escalate a XXE attack to compromise the underlying server or other backend infrastructure, by taking advantage of the XXE vulnerability to perform request spoofing attacks. server-side request (SSRF).

Broken Access control

Access control enforces the policy so that users cannot act outside of their authority. Errors often lead to unauthorized disclosure of information, modification or destruction of all data, or performance of features beyond the user’s limits. Common access control vulnerabilities include:

  • Bypass checks access by modifying URLs, internal application state, or HTML pages, or simply using a custom API hack.
  • Allows to change the primary key to another user’s record, allows viewing or editing of other people’s accounts.
  • Enhanced privileges. Act as a user without logging in or act as an administrator when logged in as a user.
  • Manipulating metadata, such as replaying or forging a JSON Web Token (JWT) access control token, or hidden cookies or fields, manipulated to elevate privileges or to abuse JWT disabling.
  • CORS misconfiguration allows unauthorized API access.
  • Force browsing to pages authenticated as user or to privileged pages as standard user. API access with missing access controls for POST, PUT, and DELETE.

Wrong security configuration

The following security configurations are improperly or unsafely configured security settings that put your system and data at risk. Essentially, any well-documented configuration changes, default settings, or technical problems on any component of your endpoint lead to misconfiguration.

Misconfiguration can happen due to a multitude of reasons. Modern network infrastructures are so complex that organizations often overlook important security settings, including new network equipment that is still configured by default. A developer can write flexible firewall rules and create network shares for his convenience while building software. Sometimes administrators allow configuration changes for testing or troubleshooting purposes and forget to return the original state resulting in misconfiguration. Some common security misconfiguration vulnerabilities are login security, user account management, password policy, and legacy protocols.

Cross Site Scripting (XSS)

Cross-site Scripting (XSS) is a client-side code injection attack. The attacker aims to execute malicious scripts in the victim’s web browser by injecting malicious code into a legitimate website or web application. The actual attack occurs when the victim visits a website or web application that executes malicious code. The website or web application becomes a vehicle for delivering malicious scripts to the user’s browser. Commonly used vulnerable targets for Cross-site Scripting attacks are forums, message boards, and comment-enabled websites.

A website or web application is vulnerable to XSS attacks if it uses unfiltered user input. User input must be parsed by the browser. XSS attacks can happen in VBScript, ActiveX, Flash, and even CSS. However, they are most common in JavaScript, mainly because JavaScript is the foundation for most browsing experiences. Almost everyone who learns about OWASP knows about this vulnerability.

Insecure Deserialization

Deserialization is the process of restoring this stream of bytes into a fully functional copy of the original object, in the exact state when it was serialized. The web logic can then interact with this object, just like any other object.

Serialization (serialization) is the process of converting complex data structures, such as objects and their fields, into a “flatter” format that can be sent and received as a sequential stream of bytes. The ordering of data lies in the purpose of:

  • Write complex data to inter-process memory, files, or databases.
  • Send complex data, such as over a network, between different components of an application or within an API call.

Importantly, when serializing an object, its state is also maintained. In other words, the properties of the object are preserved, along with their specified values.

Using components with known vulnerabilities

Known vulnerabilities are those that have been discovered in open source components and published in the NVD, security advisor, or issue tracker. As of the time of publication, a security hole can be exploited by hackers who find documentation related to them. According to OWASP, the problem of using vulnerable components is very common. Furthermore, the use of open source components is so widespread that many development leaders don’t even know what they’ve accomplished.

Inadequate logging and monitoring

When an organization does not have sufficient logging, detection, monitoring and response capabilities, attackers will rely on these weaknesses to achieve their goals undetected. The lack of these methods includes things like:

  • Auditable events, such as logins, failed logins, and high value transactions are not logged.
  • Warnings and errors produce incomplete or ambiguous log messages.
  • Logs of unmonitored applications and APIs for suspicious activity.
  • Logs are stored locally only.
  • Appropriate alarm thresholds and out-of-place or ineffective feedback reporting procedures.
  • Penetration testing and scanning with DAST tools did not trigger warnings.
  • Applications cannot detect, report, or warn about active attacks in real time or near real time.

Above is a list of Top 10 OWASP Vulnerabilities in 2020.

The article achieved: 5/5 – (100 votes)

Tags: announcementOWASPsecurityTopVulnerabilitiesweb
Previous Post

Instructions to register .xyz domain name for 0 VND (free)

Next Post

How to fix Google app error after new update on Android

AnonyViet

AnonyViet

Related Posts

How to implement Shellcode Injection attack technique with Autoit
Security

How to implement Shellcode Injection attack technique with Autoit

March 14, 2025
How to exploit the holy hole of Hijacking on Windows
Security

How to exploit the holy hole of Hijacking on Windows

March 8, 2025
Hamamal: Shellcode execution technique from afar to overcome Antivirus's discovery
Security

Hamamal: Shellcode execution technique from afar to overcome Antivirus's discovery

February 10, 2025
Snov.io Email Finder: Search emails with only company name/domain name/LinkedIn profile
Security

Snov.io Email Finder: Search emails with only company name/domain name/LinkedIn profile

December 14, 2024
Capsolver: Automatic solution solution for business
Security

Capsolver: Automatic solution solution for business

December 12, 2024
Seekr: Collect & manage OSINT data
Security

Seekr: Collect & manage OSINT data

November 22, 2024
Next Post
How to fix Google app error after new update on Android

How to fix Google app error after new update on Android

0 0 votes
Article Rating
Subscribe
Login
Notify of
guest

guest

0 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments

Recent News

Top 5 game programming languages ​​to learn now

Top 5 game programming languages ​​to learn now

June 8, 2025
The iPhone list is updated with iOS 26

The iPhone list is updated with iOS 26

June 8, 2025
Discover the glowing effect next to the iPhone ios 18 screen

Discover the glowing effect next to the iPhone ios 18 screen

June 8, 2025
[Godot Shooter] #2: Creating characters & shooting bullets

[Godot Shooter] #2: Creating characters & shooting bullets

June 7, 2025
Top 5 game programming languages ​​to learn now

Top 5 game programming languages ​​to learn now

June 8, 2025
The iPhone list is updated with iOS 26

The iPhone list is updated with iOS 26

June 8, 2025
Discover the glowing effect next to the iPhone ios 18 screen

Discover the glowing effect next to the iPhone ios 18 screen

June 8, 2025
AnonyViet - English Version

AnonyViet

AnonyViet is a website share knowledge that you have never learned in school!

We are ready to welcome your comments, as well as your articles sent to AnonyViet.

Follow Us

Contact:

Email: anonyviet.com[@]gmail.com

Main Website: https://anonyviet.com

Recent News

Top 5 game programming languages ​​to learn now

Top 5 game programming languages ​​to learn now

June 8, 2025
The iPhone list is updated with iOS 26

The iPhone list is updated with iOS 26

June 8, 2025
  • Home
  • Home 2
  • Home 3
  • Home 4
  • Home 5
  • Home 6
  • Next Dest Page
  • Sample Page

©2024 AnonyVietFor Knowledge kqxs hôm nay xem phim miễn phí SHBET https://kubet88.yoga/ bj88

No Result
View All Result
  • Home
  • News
  • Software
  • Knowledge
  • MMO
  • Tips
  • Security
  • Network
  • Office

©2024 AnonyVietFor Knowledge kqxs hôm nay xem phim miễn phí SHBET https://kubet88.yoga/ bj88

wpDiscuz
0
0
Would love your thoughts, please comment.x
()
x
| Reply