Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add new vulnerabilities to current list #11

Merged
merged 7 commits into from
Oct 3, 2020
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
87 changes: 71 additions & 16 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,22 +4,29 @@


### Table Of Content
- [Web Application Security Vulnerabilities](#web-application-security-vulnerabilities)
- [Cross-site Scripting (XSS): Reflected, Persistent and DOM-based XSS:](#cross-site-scripting-xss-reflected-persistent-and-dom-based-xss)
- [SQL Injection (SQLi)](#sql-injection-sqli)
- [Cross-site Request Forgery (CSRF)](#cross-site-request-forgery-csrf)
- [Server Side Request Forgery (SSRF)](#server-side-request-forgery-ssrf)
- [Remote File Inclusion (RFI)](#remote-file-inclusion-rfi)
- [Local File Inclusion (LFI)](#local-file-inclusion-lfi)
- [Remote Code Execution (RCE)](#remote-code-execution-rce)
- [CRLF Injection](#crlf-injection)
- [LDAP Injection](#ldap-injection)
- [Mobile Application Security Vulnerabilities:](#mobile-application-security-vulnerabilities)
- [Weak Server Side Controls](#weak-server-side-controls)
- [Lack of Binary Protections](#lack-of-binary-protections)
- [Insecure Data Storage](#insecure-data-storage)
- [Unintended Data Leakage](#unintended-data-leakage)
- [Poor Authorization and Authentication](#poor-authorization-and-authentication)
- [Web Application Security Vulnerabilities](#web-application-security-vulnerabilities)
- [Cross-site Scripting (XSS): Reflected, Persistent and DOM-based XSS:](#cross-site-scripting-xss-reflected-persistent-and-dom-based-xss)
- [SQL Injection (SQLi)](#sql-injection-sqli)
- [Cross-site Request Forgery (CSRF)](#cross-site-request-forgery-csrf)
- [Server Side Request Forgery (SSRF)](#server-side-request-forgery-ssrf)
- [Remote File Inclusion (RFI)](#remote-file-inclusion-rfi)
- [Local File Inclusion (LFI)](#local-file-inclusion-lfi)
- [Remote Code Execution (RCE)](#remote-code-execution-rce)
- [CRLF Injection](#crlf-injection)
- [LDAP Injection](#ldap-injection)
- [Failure to restrict URL Access](#failure-to-restrict-url-access)
- [Insufficient Transport Layer Protection](#insufficient-transport-layer-protection)
- [Unvalidated Redirects and Forwards](#unvalidated-redirects-and-forwards)
- [Insecure Cryptographic Storage](#insecure-cryptographic-storage)
- [Security Misconfiguration](#security-misconfiguration)
- [Insecure Direct Object References](#insecure-direct-object-references)
- [Mobile Application Security Vulnerabilities:](#mobile-application-security-vulnerabilities)
- [Weak Server Side Controls](#weak-server-side-controls)
- [Lack of Binary Protections](#lack-of-binary-protections)
- [Insecure Data Storage](#insecure-data-storage)
- [Unintended Data Leakage](#unintended-data-leakage)
- [Poor Authorization and Authentication](#poor-authorization-and-authentication)




Expand Down Expand Up @@ -96,6 +103,54 @@ LDAP Injection is an attack used to exploit web based applications that construc

----

### Failure to restrict URL Access
Web applications check URL access rights before rendering protected links and buttons. Applications need to perform similar access control checks each time these pages are accessed.
In most of the applications, the privileged pages, locations and resources are not presented to the privileged users.
By an intelligent guess, an attacker can access privilege pages. An attacker can access sensitive pages, invoke functions and view confidential information.
Making use of this vulnerability, attacker can gain access to the unauthorized URLs, without logging into the application and exploit the vulnerability.
An attacker can access sensitive pages, invoke functions and view confidential information.

----

### Insufficient Transport Layer Protection
Deals with information exchange between the user (client) and the server (application).
Applications frequently transmit sensitive information like authentication details, credit card information, and session tokens over a network.
By using weak algorithms or using expired or invalid certificates or not using SSL can allow the communication to be exposed to untrusted users, which may compromise a web application and or steal sensitive information.
Making use of this web security vulnerability, an attacker can sniff legitimate user's credentials and gaining access to the application.
Can steal credit card information.

----

### Unvalidated Redirects and Forwards
The web application uses few methods to redirect and forward users to other pages for an intended purpose.
If there is no proper validation while redirecting to other pages, attackers can make use of this and can redirect victims to phishing or malware sites, or use forwards to access unauthorized pages.
An attacker can send a URL to the user that contains a genuine URL appended with encoded malicious URL.
A user by just seeing the genuine part of the attacker sent URL can browse it and may become a victim.

----

### Insecure Cryptographic Storage
Insecure Cryptographic storage is a common vulnerability which exists when the sensitive data is not stored securely.
The user credentials, profile information, health details, credit card information, etc. come under sensitive data information on a website.
This data will be stored on the application database. When this data are stored improperly by not using encryption or hashing*, it will be vulnerable to the attackers.
By using this vulnerability, an attacker can steal, modify such weakly protected data to conduct identity theft, credit card fraud or other crimes.

----

### Security Misconfiguration
Security Configuration must be defined and deployed for the application, frameworks, application server, web server, database server, and platform.
If these are properly configured, an attacker can have unauthorized access to sensitive data or functionality.
Making use of this vulnerability, the attacker can enumerate the underlying technology and application server version information,
database information and gain information about the application to mount few more attacks.

----

### Insecure Direct Object References
It occurs when a developer exposes a reference to an internal implementation object, such as a file, directory, or database key as in URL or as a FORM parameter.
The attacker can use this information to access other objects and can create a future attack to access the unauthorized data.
Using this vulnerability, an attacker can gain access to unauthorized internal objects,
can modify data or compromise the application.

## Mobile Application Security Vulnerabilities:

### Weak Server Side Controls
Expand Down
56 changes: 54 additions & 2 deletions vulnerabilities list
Original file line number Diff line number Diff line change
Expand Up @@ -56,8 +56,60 @@
/*========================================*/

** LDAP Injection
- LDAP Injection is an attack used to exploit web based applications that construct LDAP statements based on user input. When an application fails to properly sanitize user input,
it's possible to modify LDAP statements using a local proxy.
- LDAP Injection is an attack used to exploit web based applications that construct LDAP statements based on user input. When an application fails to properly sanitize user input,
it's possible to modify LDAP statements using a local proxy.

/*========================================*/

** Failure to restrict URL Access
- Web applications check URL access rights before rendering protected links and buttons. Applications need to perform similar access control checks each time these pages are accessed.
In most of the applications, the privileged pages, locations and resources are not presented to the privileged users.
By an intelligent guess, an attacker can access privilege pages. An attacker can access sensitive pages, invoke functions and view confidential information.
- Making use of this vulnerability, attacker can gain access to the unauthorized URLs, without logging into the application and exploit the vulnerability.
An attacker can access sensitive pages, invoke functions and view confidential information.

/*========================================*/

** Insufficient Transport Layer Protection
- Deals with information exchange between the user (client) and the server (application).
Applications frequently transmit sensitive information like authentication details, credit card information, and session tokens over a network.
By using weak algorithms or using expired or invalid certificates or not using SSL can allow the communication to be exposed to untrusted users,
which may compromise a web application and or steal sensitive information.
- Making use of this web security vulnerability, an attacker can sniff legitimate user's credentials and gaining access to the application.
Can steal credit card information.

/*========================================*/

** Unvalidated Redirects and Forwards
- The web application uses few methods to redirect and forward users to other pages for an intended purpose.
If there is no proper validation while redirecting to other pages, attackers can make use of this and can redirect victims to phishing or malware sites,
or use forwards to access unauthorized pages.
- An attacker can send a URL to the user that contains a genuine URL appended with encoded malicious URL.
A user by just seeing the genuine part of the attacker sent URL can browse it and may become a victim.

/*========================================*/

** Insecure Cryptographic Storage
- Insecure Cryptographic storage is a common vulnerability which exists when the sensitive data is not stored securely.
The user credentials, profile information, health details, credit card information, etc. come under sensitive data information on a website.
This data will be stored on the application database. When this data are stored improperly by not using encryption or hashing*, it will be vulnerable to the attackers.
- By using this vulnerability, an attacker can steal, modify such weakly protected data to conduct identity theft, credit card fraud or other crimes.

/*========================================*/

** Security Misconfiguration
- Security Configuration must be defined and deployed for the application, frameworks, application server, web server, database server, and platform.
If these are properly configured, an attacker can have unauthorized access to sensitive data or functionality.
- Making use of this vulnerability, the attacker can enumerate the underlying technology and application server version information,
database information and gain information about the application to mount few more attacks.

/*========================================*/

** Insecure Direct Object References
- It occurs when a developer exposes a reference to an internal implementation object, such as a file, directory, or database key as in URL or as a FORM parameter.
The attacker can use this information to access other objects and can create a future attack to access the unauthorized data.
- Using this vulnerability, an attacker can gain access to unauthorized internal objects,
can modify data or compromise the application.

/*========================================*/

Expand Down