OWASP 2017 Playbook PDF
OWASP 2017 Playbook PDF
w w w. a p p t r a n a . i n d u s f a c e . c o m
www.apptrana.indusface.com
1
Understanding OWASP Top 10 & Web Application Security
2016 was the record year of data breaches and there was a 40% increase from
2015 according to Identity Threat Resource center, most of the data breaches
were because of the vulnerabilities in the web application layer. From the looks
of it 2017 is no different. And most of these breaches were due to exploits of the
vulnerabilities present in the application layer. As one can imagine, cost of these
attacks is very high and at times insurmountable. Biggest risk of such attacks is
the reputation risk. Customers would lose trust in the brand and it will be a PR
nightmare. For example, In a survey it was found out that 87% of companies would
not do business with a company which has faced a breach of credit/debit card
details.
w w w. a p p t r a n a . i n d u s f a c e . c o m
Generally, these attacks are sophisticated and targeted attacks aimed at gaining
access to critical resources/data or to deny access to critical data/resources.
Most of the commonly used attacks are SQL injection, cross site scripting, denial
of service, leakage, disclosure attacks.
2
Understanding OWASP Top 10 & Web Application Security
To build the best defense for your application, it is paramount to understand the
risk posture of your application and OWASP Top 10 is ideal place to start covering
your bases. In the rest of the paper, we will be discussing about OWASP Top 10
vulnerabilities, how attackers can exploit them and what AppTrana can do to
protect against attacks exploiting these vulnerabilities.
application security flaws. It’s a widely accepted methodology for evaluating web
application security and build mitigation strategies for websites and web-based
applications. It outlines the top 10 areas where web applications are susceptible to
attacks, and where common vulnerabilities are found in such workloads.
Last OWASP Top 10 was released on 2013 and new RC1 candidate was released on
2017. Final version is expected by Nov 2017.
3
Understanding OWASP Top 10 & Web Application Security
General cloud security solutions, takes a cookie cutter approach when it comes to
WAF. They provide default set of rules that can be applied and then ask website
owners to create/tweak the rules to meet their application need. The problem with
this approach is
• With just default rules and no knowledge of vulnerability, the security is weak.
• Default rules will create false positives and tweaking it is time consuming
• Creating own custom rules are complex and requires expertise.
Due to these reasons over time, WAF solution becomes ineffective as organizations
do not have time and expertise to maintain the rules.
Let’s dig deeper into OWASP Top 10 vulnerabilities and its protection through
AppTrana.
w w w. a p p t r a n a . i n d u s f a c e . c o m
4
Understanding OWASP Top 10 & Web Application Security
A1 Injection
A2 Broken Authentication and Session Management
A3 Cross-Site Scripting (XSS)
A4 Broken Access Control (NEW)
A5 Security Misconfiguration
A6 Sensitive Data Exposure
A7 Insufficient Attack Protection (NEW)
A8 Cross-Site Request Forgery (CSRF)
A9 Using Components with Known Vulnerabilities
A10 Under protected APIs (NEW)
With AppTrana, you will be able to detect if your application is vulnerable in any of
these areas and also ensure you are protected from any exploits immediately.
w w w. a p p t r a n a . i n d u s f a c e . c o m
5
A1 Injection
What is it What are the risks
Imagine a hacker coming to your account login page and en- Think of the infinite possibilities when hackers have a di-
tering a string of code. The command gets accepted and al- rect way of interacting with your server. They can steal data,
lows them to login without even a valid account or password. change it, delete it, deny access, and much more. In fact,
This is an injection attack. and SQL Injection is the most com- injection attacks are responsible for some of the major data
mon attack in this category. breaches last year.
Apart from it, there are rules which are experiential in nature
which may cause false positives, these rules will be monitored
by our experts and moved to block mode after fine-tuning. This
is available only as part of the premium plan.
A1 Injection
Test for SQL Injection Yes Yes Yes Yes Yes
Test for LDAP Injection Yes Yes Yes
Test for ORM Injection Yes Yes Yes
Test for XML Injection Yes Yes
Test for SSI Injection Yes Yes Yes Yes
Test for XPath Injection Yes Yes Yes Yes Yes
Test for IMAP/SMTP Injection Yes Partial*
w w w. a p p t r a n a . i n d u s f a c e . c o m
*Vulnerabilities are application specific and capability of virtual patching through custom rules is limited. Custom rules will be creat-
ed by experts on request if vulnerability is detected. This will reduce the risk exposure but will not eliminate it.
Note that buffer overflow checks are only done on request after customer approval.
6
A2 Broken Authentication &
Session Management
What is it What are the risks
“Incorrect Password” error messages are a classic example of Such vulnerabilities allow attackers to earn complete account
this type of vulnerability. If a hacker tries a random combina- access. In severe cases, hackers have stolen database records
tion of Username-Password and an error message tells them and sold them on the underground black market.
that the password is incorrect, he knows that at least the us-
ername is correct. A brute force attacker now knows that an
account exists and he only needs the right password. There
are dozens of automated tools from the dark web that can How can Apptrana help
try millions of password combinations for a hacker. Improper
Since these vulnerabilities are application specific, automated
sessions management is also a severe risk. Think of an online
scans have limited scope but all the vulnerabilities can be de-
bank account that keeps you logged in even after closing the
tected through AppTrana’s premium scans.
browser.
When it comes to protection, Session management and au-
thentication vulnerability leads to unauthorized access and it
Impact becomes hard for WAF layer to distinguish between valid re-
quest which are properly authenticated and requests which
uses stolen identity. In such cases AppTrana takes a reactive
approach and helps you block requests once you know that
there has been a compromise. You could choose to blacklist
certain identities or if you know the token, you can request a
custom rule to block access for the token temporarily or per-
manently.
The complete competency matrix of AppTrana when it comes to broken authentication & session management is as follows
*Vulnerabilities are application specific and capability of virtual patching through custom rules is limited. Custom rules will be creat-
ed by experts on request if vulnerability is detected. This will reduce the risk exposure but will not eliminate it.
A3 Cross-Site Scripting (XSS)
What is it What are the risks
An attacker can inject malicious scripts into trusted websites Hackers can deface your website, inject malware, phishing
and use this code to hijack browser sessions from users to ini- links and hijack user accounts.
tiate a man-in-the-middle attack.
The attacker can send anything to your server now while si-
multaneously redirecting users to dark parts of the web with- How can Apptrana help
out them knowing about it. Such attacks can trouble your cus-
Both the Automated scans and Premium scans of AppTra-
tomers and business equally.
na can detect these vulnerabilities and they can be readily
blocked by Advanced, premium rules which AppTrana provide.
The complete competency matrix of AppTrana when it comes to Cross-Site Scripting (XSS) is as follows
XSS Filter Evasion Cheat Sheet Yes Yes Yes Yes Yes
8
A4 Broken Access Control
What is it What are the risks
In the latest version of OWASP Top 10, A4 represents two vul- Such vulnerabilities lead to loss of data, ghost account cre-
nerabilities from the previous list (2003 A4 & A7) combined ation and admin account hijacking.
into one. In the latest version of OWASP Top 10, A4 represents
two vulnerabilities from the previous list (2003 A4 & A7) com-
bined into one.
How can Apptrana help
Both the Automated scans and Premium scans of AppTrana
cover for this vulnerability and they can be readily blocked by
Advanced, premium rules which AppTrana provide.
Impact
The complete competency matrix of AppTrana when it comes to Broken Access Control is as follows
*Vulnerabilities are application specific and capability of virtual patching through custom rules is limited. Custom rules will be
created by experts on request if vulnerability is detected. This will reduce the risk exposure but will not eliminate it. 9
A5 Security Misconfiguration
What is it What are the risks
Old sample apps, expired yet active features, default system A5 can lead to complete loss of data through alteration, dele-
passwords... hackers love all the additional information they tion and theft. Recovery is costly and highly unreliable, espe-
can get. This vulnerability is about all of these loopholes. cially if the data gets encrypted.
Attackers look for small issues, combine them, and try to make
something big out of them. They use default accounts, unused
pages, unpatched flaws, unprotected files and directories, etc. How can Apptrana help
to gain unauthorized access to or knowledge of the system
Since these vulnerabilities are regarding server configurations
and at infra level, WAF can be used for mitigation purpose for
most cases. Custom rule can be written to avoid some issues
Impact like banner grapping to find server info and the like, but in most
cases the patching must be done only at application. If the
pattern of exploit is known based on the vulnerability, then
custom rules can be written to block them.
The complete competency matrix of AppTrana when it comes to Security Misconfiguration is as follows
Yes Partially*
for Sensitive Information
Enumerate Infrastructure and Application
Yes Yes Partially*
Admin Interfaces
The complete competency matrix of AppTrana when it comes to Sensative Data Exposure is as follows
ability
Test for Credentials Transported over an En-
Yes Yes
crypted Channel
11
A7 Insufficient
Attack Protection
(New)
What is it
This newest addition to this year’s OWASP 10 asks
a powerful question; Does your application detect
and respond to both manual and automated at-
tacks? Can it patch itself to ward off attackers in
real-time? Your applications and APIs might be
sanitizing inputs or rejecting wrong passwords,
but can they reject automated inputs? If there is
a critical vulnerability discovered, how soon can
you patch it?
Impact
12
A8 Cross-Site
Request Forgery (CSRF)
What is it
A compromised browser session is hijacked by a
hacker to run rogue commands in a web applica-
tion using CSRF. With a little help from phishing
techniques (email or chat links), hackers trick us-
ers into changing email addresses, wiring money,
and so forth. If the victim is an administrative ac-
count, CSRF can compromise the entire web ap-
plication.
Impact
13
A9 Using Components
with Known Vulnerabilities
What is it
Unknown chunks of code breed mysterious vul-
nerabilities. Developers use open source projects
and often they don’t even know what code library
it came from where and with what vulnerability.
Such components can weaken any application.
Impact
14
A10 Underprotected
APIs (New)
What is it
Most browser web applications are written in JavaS-
cript and use APIs to get data but these APIs often
contain numerous vulnerabilities. Attackers can reverse
engineer the code or monitor the communication be-
tween browser and API with a tool to find vulnerabilities
and to exploit them. Moreover, the architecture of most
APIs is so complex that they require continuous auto-
mated testing and thorough penetration testing to find
deep-seeded vulnerabilities.
Impact
Start securing your application for free. Try out our free
trial by Clicking here.
15
Trust you have enough
knowledge about Web
Application Security and
OWASP Top 10 vulnerabilities
and are convinced that you
should act now.
About Indusface
Indusface is an award-winning application security leader protecting 900+ customers across 17 countries. Our security products have
been mentioned in the Gartner Magic Quadrants for Application Security Testing and Web Application Firewall, and have won all major
startup awards in the last 12 months. Indusface TAS is available On-premise, As A Service and through the AWS Marketplace.