Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cybersecurity
    • Cybersecurity

    OWASP Lists Top 10 Most Critical Web Application Risks

    Written by

    Brian Prince
    Published June 17, 2013
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      The Open Web Application Security Project cited injection flaws as the top risk facing software developers today in the recent version of its annual list of security threats.

      The findings are based on data from eight firms that specialize in application security, and span more than 500,000 vulnerabilities across hundreds of organizations and thousands of applications, according to OWASP.

      Rounding out the top three are broken authentication and session management and cross-site scripting, with broken authentication and session management moving up a slot from the previous list. Injection flaws such as SQL injection and Lightweight Directory Access Protocol (LDAP) injection remain at the top of the heap.

      “Injection flaws occur when an application sends untrusted data to an interpreter,” OWASP explained in the report. “Injection flaws are very prevalent, particularly in legacy code. They are often found in SQL, LDAP, Xpath, or NoSQL queries; OS commands; XML parsers, SMTP Headers, program arguments, etc.

      “The best way to find out if an application is vulnerable to injection is to verify that all use of interpreters clearly separates untrusted data from the command or query,” the report continues. “For SQL calls, this means using bind variables in all prepared statements and stored procedures, and avoiding dynamic queries.”

      The top three categories are issues that have been known about for more than a decade, noted Chris Eng, vice president of research at Veracode.

      “Unfortunately,” he told eWEEK, “these vulnerabilities are so prevalent—in part due to years of lax security practices—that it is difficult to identify and fix them using ad-hoc manual security testing, which is still a common practice. Consider that the average large enterprise has 600 business critical apps, and according to our data, 32 percent of them have at least one SQL injection vulnerability and 67 percent have at least one cross-site scripting vulnerability. That is a lot of code and a lot of vulnerabilities.”

      Further complicating the rooting out of vulnerable applications is that the vast majority of apps in use are not frequently or easily reviewed and updated to correct security flaws—in part because many of them are older apps that are not on a frequent update schedule, opined Scott Parcel, CTO of Cenzic.

      “It tends to be only the more high-profile applications that are regularly updated,” he said, adding that organizations should make sure all of their production applications are regularly monitored for security flaws.

      Besides the top three categories, the other vulnerabilities—in descending in order of risk—are insecure direct object references, security misconfiguration, sensitive data exposure, missing function level access control, cross-site request forgery, using known vulnerable components, and unvalidated redirects and forwards.

      “The list hasn’t changed significantly since 2010, though some items have been combined or shifted in importance,” Eng said. “The newest category, A9 (‘Using Known Vulnerable Components’) is an important addition to the list because it acknowledges and highlights the fact that software vulnerabilities are introduced not just by a developer’s own code but by the libraries and other components they choose to integrate. If you’re only focused on testing and fixing your own code, you’re ignoring a huge part of the attack surface.”

      Brian Prince
      Brian Prince

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×