OWASP Top 10 Flashcards

1
Q

What is the OWASP Top 10 member designated ‘A01’?

HINT: Roles

A

A01 is described as ‘Broken Access Control’.

This can relate to a vulnerability that breaks the bounds of what the system allows a typical user to do, such as accessing sensitive data they should not be able to.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the OWASP Top 10 member designated ‘A02’?

HINT: Keys

A

A02 is described as ‘Cryptographic Failures’.

This is not necessarily related to the failure of the chosen cryptographic scheme itself, but from general failures to implement these schemes, or even a lack thereof.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the OWASP Top 10 member designated ‘A03’?

HINT: User input

A

A03 is described as ‘Injection’.

This is a vulnerability which is caused by some form of user input exploit, such as a SQL injection on a database, or a number input causing a buffer overflow.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the OWASP Top 10 member designated ‘A04’?

HINT: Umbrella term

A

A04 is described as ‘Insecure Design’.

This is a very broad category, which essentially is used for when a developer did not consider something they should have, such as forgetting to use encryption to transmit sensitive data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the OWASP Top 10 member designated ‘A05’?

HINT: 5 for S, S for…

A

A05 is described as ‘Security Misconfiguration’.

This may involve security not being properly configured on the server, such as failing to change the defaults of an Apache server, or important server logs being returned to users unintentionally.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the OWASP Top 10 member designated ‘A06’?

HINT: OpenSSL

A

A06 is described as ‘Vulnerable and Outdated Components’.

This is a vulnerability born from the use of components or libraries that may be outdated or have a known, exploitable vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the OWASP Top 10 member designated ‘A07’?

A

A07 is described as ‘Identification and Authentication Failures’.

This is a vulnerability categorised by not identifying or properly authenticating users. This may include forgetting to put a restriction on a page displaying important data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the OWASP Top 10 member designated ‘A08’?

HINT: Installs

A

A08 is described as ‘Software and Data Integrity Failures’.

This is a vulnerability where we have issues related to data transfer without verifying the integrity of the data. For example, if we run a script to install a software, if we don’t verify where it’s coming from, any user could intercept and send their own malicious code!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the OWASP Top 10 member designated ‘A09’?

HINT: Incorrect password failures

A

A09 is described as ‘Security Logging and Monitoring Failures’.

This is a vulnerability where we fail to log important information, or log unintended data. For example, if we log users’ passwords in plaintext on the server, even if they’re a failure there’s a high chance it’s only a couple of letters off.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the OWASP Top 10 member designated ‘A10’?

HINT: Not Injection For Sure

A

A10 is described as ‘Server Side Request Forgery’, and is a weird one.

This is an injection vulnerability with only one CWE, meaning there’s only one instance of it! However, it’s highlighted because it’s so dangerous.

It relates specifically to a problem where a user may trick the external web server into returning sensitive data from an internal web server using some form of injection trick. In the worst case, a hacker could even change the IP address of the entire backend!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly