cross site scripting | All About Testing https://allabouttesting.org Software Testing & Ethical Hacking Fundamentals Thu, 01 Dec 2022 16:55:21 +0000 en-US hourly 1 https://wordpress.org/?v=6.3.2 https://i0.wp.com/allabouttesting.org/wp-content/uploads/2018/02/cropped-logo-favicon.jpg?fit=32%2C32&ssl=1 cross site scripting | All About Testing https://allabouttesting.org 32 32 135190090 OWASP Top 10 2017: What changed from 2013 to 2017? https://allabouttesting.org/owasp-top-10-2017-what-changed-from-2013-to-2017/?utm_source=rss&utm_medium=rss&utm_campaign=owasp-top-10-2017-what-changed-from-2013-to-2017 https://allabouttesting.org/owasp-top-10-2017-what-changed-from-2013-to-2017/#respond Wed, 13 Dec 2017 15:59:37 +0000 https://allabouttesting.org/?p=1498 Finally, OWASP Top 10 2017 has been released after 4 years. As we know, OWASP stands for Open Web Application Security...

The post OWASP Top 10 2017: What changed from 2013 to 2017? first appeared on All About Testing.

]]>
Finally, OWASP Top 10 2017 has been released after 4 years. As we know, OWASP stands for Open Web Application Security Project (OWASP); it is an online community, produces freely available articles, methodologies, documentation, tools, and technologies in the field of web application security. This article will see what the changes in the Top 10 vulnerabilities released by the OWASP are.

There are a lot of changes in web application development in the last 4 years. Developers have adopted many new methodologies. As mentioned by OWASP, Microservices written in node.js and Spring Boot are replacing traditional monolithic applications. Single-page applications, written in JavaScript frameworks such as Angular and React, allow creating highly modular feature-rich front ends. Client-side functionality that has traditionally been delivered server-side brings its own security challenges. JavaScript is now the primary language of the web with node.js running server-side and modern web frameworks such as Bootstrap, Electron, Angular, and React running on the client.”

Three New Vulnerabilities Added

These new methodologies also introduce new risks and vulnerabilities. This time, OWASP 2017 added a new issue supported by data. As mentioned by OWASP, “A4:2017-XML External Entities (XXE) is a new category primarily supported by source code analysis security testing tools (SAST) data sets. The other two new issues added in OWASP 2017 are A8:2017-Insecure Deserialization, which permits remote code execution or sensitive object manipulation on affected platforms, and  A10:2017-Insufficient Logging and Monitoring.

Two Vulnerabilities Merged into One

Some vulnerabilities in OWASP TOP 10 2013 have been merged in OWASP TOP 10 2017, and some have been retired from OWASP Top 10 2013. A4-Insecure Direct Object References and A7-Missing Function Level Access Control merged into A5:2017-Broken Access Control.

Two Vulnerabilities Removed

A8-Cross-Site Request Forgery (CSRF), removed from OWASP Top 10 2017, as now many frameworks include CSRF defenses, it was found in only 5% of applications as mentioned by OWASP in the official release. A10-Unvalidated Redirects and Forwards, also removed from OWASP Top 10 2017.

Now we summarize what are the changes in OWASP Top 10 2017.

  • A1 Injection and A9 Using Components with Known Vulnerabilities remain intact in OWASP Top 10 2017.
  • A2 Broken Authentication and Session Management name is slightly trim; now it is just Broken Authentication. Some vulnerabilities changed position in OWASP Top 10 2017.
  • A3 Cross-Site Scripting now at the 7th position in OWASP Top 10 2017. A5 Security Misconfiguration is now at the 6th position.
  • A6 Sensitive Data Exposure is now at the 3rd position in OWASP Top 10 2017. As discussed earlier, A8 Cross-site Request Forgery and A10 Unvalidated Redirects and Forward are removed from OWASP Top 10 2017.
  • Some vulnerabilities in OWASP TOP 10 2013 have been merged in OWASP TOP 10 2017. A4-Insecure Direct Object References and A7-Missing Function Level Access Control merged into A5:2017-Broken Access Control.
  • As discussed, this time, the three new issues which have been added in OWASP 2017 are A4:2017-XML External Entities (XXE), A8:2017-Insecure Deserialization, and A10:2017-Insufficient Logging&Monitoring.

References:
https://www.owasp.org

The post OWASP Top 10 2017: What changed from 2013 to 2017? first appeared on All About Testing.

]]>
https://allabouttesting.org/owasp-top-10-2017-what-changed-from-2013-to-2017/feed/ 0 1498
Top 10 Interview Questions | OWASP TOP 10 https://allabouttesting.org/top-10-interview-questions-owasp-top-10-application-security/?utm_source=rss&utm_medium=rss&utm_campaign=top-10-interview-questions-owasp-top-10-application-security https://allabouttesting.org/top-10-interview-questions-owasp-top-10-application-security/#comments Tue, 07 Nov 2017 15:17:07 +0000 https://allabouttesting.org/?p=1290 OWASP Top 10 is a list of the TOP 10 vulnerabilities released by OWASP. OWASP is a non-profit organization that...

The post Top 10 Interview Questions | OWASP TOP 10 first appeared on All About Testing.

]]>
OWASP Top 10 is a list of the TOP 10 vulnerabilities released by OWASP. OWASP is a non-profit organization that works to spread awareness about practices for a secure web application. Here is the list of interview questions and answers of OWASP Top 10, which are frequently asked in interviews.

Q1. What is OWASP? Also Mention OWASP TOP 10 2021.

Ans: OWASP is a non-profit organization that releases the top 10 web vulnerabilities. It works as a community of cybersecurity professionals, who constantly work to build an ecosystem for awareness about secure web applications. Recently, OWASP released new top 10 vulnerabilities for 2021:

  • A01 Broken Access Control
  • A02 Cryptographic Failures
  • A03 Injection
  • A04 Insecure Design
  • A05 Security Misconfiguration
  • A06 Vulnerable and Outdated Components
  • A07 Identification and Authentication Failures
  • A08 Software and Data Integrity Failures
  • A09 Security Logging and Monitoring Failures
  • A10 Server Side Request Forgery (SSRF)

Q2. Mention what flaw arises from session tokens having poor randomness across a range of values.

Ans:  Session hijacking, is the issue related to A2: 2017 – Broken Authentication. It is also called cookie hijacking. In this type of attack, there is the possibility of exploitation of a valid computer session—sometimes also called a session key—to gain unauthorized access to information or services in a system. This flaw comes when there is poor randomness in the session key.

Q3. How to mitigate SQL Injection risks?

Ans: Mitigations of SQL injection:

  • Prepared Statements with Parameterized Queries: Always ensure that your SQL interpreter can always differentiate between code and data. Never use dynamic queries which fail to find the difference between code and data. Instead, use static SQL query and then pass in the external input as a parameter to query.  The use of Prepared Statements (with Parameterized Queries) forces the developer first to define all the SQL code and then pass each parameter to the query later.
  • Use of Stored Procedures: Stored Procedure is like a function in C where the database administrator calls it whenever he/she needs it. It is not completely mitigated SQL injection but definitely helps in reducing risks of SQL injection by avoiding dynamic SQL generation inside.
  • White List Input Validation: Always use white list input validation and allow only preapproved input by the developer. Never use a blacklist approach as it is less secure than a whitelist approach.
  • Escaping All User Supplied Input
  • Enforcing the Least Privilege

Click Here for SQL Injection Interview Questions

Q4. How to mitigate the risk of Weak authentication and session management?

Ans: Weak Authentication and Session management can be mitigated by controls of strong authentication and session management. Such controls are as follows:

  • Compliant with all the authentication and session management requirements defined in OWASP’s Application Security Verification Standard (ASVS) areas V2 (Authentication) and V3 (Session Management).
  • Always use a simple interface for developers. Consider the ESAPI Authenticator and User APIs as good examples to emulate, use, or build upon.
  • Use standard practices to secure session id by cross-site scripting attack.

Q5. How to mitigate the risk of Sensitive Data Exposure?

Ans: Following are the mitigation techniques employed for secure applications from Sensitive data exposure:

  • Prepare a threat model to secure data both in transit and at rest from both types of the attacker( e.g., insider attack, external user)
  • Encrypt data to protect it from any cyber attack.
  • Never store sensitive data unnecessarily. Discard it as soon as possible. Data you don’t have can’t be stolen.
  • Disable autocomplete on forms collecting sensitive data and disable caching for pages that contain sensitive data.
  • Always implement and ensure strong standard algorithms and strong keys are used, and proper key management is in place. Consider using FIPS 140 validated cryptographic modules.
  • Ensure passwords are stored with an algorithm specifically designed for password protection, such as bcrypt, PBKDF2, or scrypt.

Q6. What is a bug bounty?

Ans: Bug bounty is a program run by many big organizations which rewards those individuals who report security vulnerabilities to them. These organizations generally publish those vulnerabilities on websites after fixing those issues.

Q7. What Is Failure to Restrict URL Access?

Ans: This vulnerability has been removed from OWASP Top 10 2013. Actually, this issue is related to forced browsing where a user forcibly accesses URLs which is not supposed to access by the user. The attacker may guess links and brute force techniques to find unprotected pages through this vulnerability.

Q8. How to Prevent Breaches Due to Failure to Restrict URL Access?

Ans: This can be mitigated by using secure techniques for proper authentication and proper authorization for each page of the web application. Some mitigation techniques are described below:

  • Implement Authentication and authorization policies based on the role instead of based on the user.
  • Policies are highly configurable in favor of standard practices.
  • Deny all access by default, and allow only those controls that the user needs.

Q9. How can we Protect Web Applications From Forced Browsing?

Ans: To protect web applications from forced browsing, strictly monitor access-control settings to be accurate and up-to-date on every page and application on the site.

Q10. Mention what is the basic design of OWASP ESAPI.

Ans: OWASP ESAPI is short for OWASP Enterprise Security API which is voluntarily developed by the OWASP community to provide a free, open-source, web application security control library to web developers to help them to develop a less vulnerable web application.

The basic design of OWASP ESAPI includes a set of security control interfaces. For each security control, there is a reference implementation that can be implemented as the requirement of the organization.

The post Top 10 Interview Questions | OWASP TOP 10 first appeared on All About Testing.

]]>
https://allabouttesting.org/top-10-interview-questions-owasp-top-10-application-security/feed/ 1 1290
Top 10 Interview Questions: Cross-Site Scripting | OWASP | Application Security https://allabouttesting.org/top-10-interview-questions-cross-site-scripting-owasp-application-security/?utm_source=rss&utm_medium=rss&utm_campaign=top-10-interview-questions-cross-site-scripting-owasp-application-security https://allabouttesting.org/top-10-interview-questions-cross-site-scripting-owasp-application-security/#comments Tue, 07 Nov 2017 15:11:19 +0000 https://allabouttesting.org/?p=1286 Cross-Site Scripting (XSS) is the most found vulnerability in web applications. Mitigation for this vulnerability is also very tricky. This...

The post Top 10 Interview Questions: Cross-Site Scripting | OWASP | Application Security first appeared on All About Testing.

]]>
Cross-Site Scripting (XSS) is the most found vulnerability in web applications. Mitigation for this vulnerability is also very tricky. This article covers the Top 10 interview questions on XSS. Click Here if you are interested in Top Interview Questions of Owasp Top 10.

Q1. What is Cross-Site Scripting (XSS)?

Ans: By using the Cross-Site Scripting (XSS) technique, users executed malicious scripts (also called payloads) unintentionally by clicking on untrusted links, and hence, these scripts pass cookies information to attackers.

Q2. What information can an attacker steal using XSS?

Ans: By using XSS, the session id of the genuine user can be stolen by the attacker. The browser uses the session id to identify your credentials in an application and helps you keep login in till you sign off from an application. An attacker can write a code to extract information from cookies that contain session-id and other information. Later, the same session id can be used by an attacker to browse the application on behalf of the user without actually logged in to the application.

Q3. Apart from mailing links of error pages, are there other methods of exploiting XSS?

Ans: Other methods where attackers store malicious scripts (also called payloads) are discussion forums, the comment section of websites, and other similar platforms. Whenever the user navigates those pages, payloads got executed, and the user’s cookies information automatically sends to an attacker.

Q4. What are the types of XSS?

Ans: Cross-site Scripting can be divided into three types:

  • Stored XSS
  • Reflected XSS
  • DOM-based XSS

Q5. What is Stored XSS?

Ans: In Stored XSS, the attacker plants a malicious script (also called payload) on a web page. Comment pages, forums, and other similar platforms can be used to store payloads. When the user browses these pages, these payloads are executed and sends cookies information to an attacker.

Q6. What is Reflected XSS?

Ans: Reflected XSS is one of the most widespread attack techniques used by attackers. In this type of attack, the user sends a malicious request by clicking on malicious links (contains an XSS payload) to a web server available on social networking sites and other platforms. As a result, the webserver replied to the user with an HTTP response containing the payload, which was executed in the browser and stole the user’s cookies.

Q7. What is DOM-based XSS?

Ans: DOM-based XSS is a type of cross-site scripting that appears in DOM(Document Object Model), instead of HTML.

Q8. How can I prevent XSS?

Ans: XSS can be prevented by sanitizing user input to the application. Always allowed those elements as input which is absolutely essential for that field.

Q9. Can XSS be prevented without modifying the source code?

Ans: “http only” attribute can also be used to prevent XSS.

Q10. What is Cross-Site Tracing (XST)? How can it be prevented?

Ans: By using XST technique, attackers are able to steal cookies by bypassing “http only” attribute.

XST technique can be prevented by disabling the TRACE method on the webserver.

Miscellaneous Questions

Q. List out key HTML entities used in XSS.

Ans:

> (greater than)
' (apostrophe or single quote)
" (double quote)
< (less than)
& (ampersand)

Q. Which tools are helpful in identifying XSS vulnerabilities?

Ans: XSS is the most common vulnerability type available in web applications. Many tools are available to identify XSS. Some of them are listed below:

  • OWASP ZAP – Basically a web scanner but it can also be used in identifying XSS vulnerability
  • BurpSuite – Most popular tool among Security Researchers.
  • ratproxy – Automated web application security scanning tool.
  • XSS-Proxy – Advanced tool to identify XSS vulnerability.

References:

https://www.owasp.org

The post Top 10 Interview Questions: Cross-Site Scripting | OWASP | Application Security first appeared on All About Testing.

]]>
https://allabouttesting.org/top-10-interview-questions-cross-site-scripting-owasp-application-security/feed/ 1 1286