OWASP Top 10 2023 Flashcards
A01
Broken Access Control
A02
Cryptographic Failures
A03
Injection
A04
Insecure Design
A05
Security Misconfiguration
A06
Vulnerable and Outdated Components
A07
Identification and Authentication Failures
A08
Software and Data Integrity Failures
A09
Security Logging and Monitoring Failures
A10
Server Side Request Forgery (SSRF)
Broken Access Control Description
Enforces policy such that users cannot act outside of their intended permissions.
Broken Access Control prevention
Deny by default and log access failures
Example broken access control
App uses unverified data in SQL call, url contains acct parameter and the user sends whatever account number they want to get info
Cryptographic Failures Description
Determine protection needs of data in transit and at rest. Any old or weak cryptographic algorithms or protocols used either by default or in older code. Hard coded passwords.
Cryptographic failures prevention
Classify data processed, stored, or transmitted by an application. Identify which data is sensitive according to privacy laws, regulatory requirements, or business needs. Dont store sensitive data unnecessarily. Encrypt all sensitive data at rest. Up to date algorithms, protocols and keys. Strong hashing and encryption.
Injection description
Injecting SQL, code, scripts into input
Injection vulnerable to attack when
User-supplied data is not validated, filtered, or sanitized by the application.
Injection how to prevent
Use safe API which avoids interpreter entirely and properly sanitize input.