OWASP Top 10 Web Application Security Risks Flashcards

1
Q

Broken Access Control

A

Access control failures, users act outside of their intended permissions.

Ex: Bypassing AC checks, Elevation of privileges,

Includes:
Exposure of sensitive data, Path traversal, Cross-Site Request Forgery (CSRF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cryptographic failures

A

Failures related to cryptography (or lack thereof)

Ex: Hard-coded passwords
Broken crypto algorithms

Includes:
Data transmitted in clear text
Old. weak, deprecated protocols
Unsalted password hashes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Injection

A

Add unintended commands in the data sent to an interpreter (software component or system that interprets and executes code or commands
)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Insecure Design

A

Risks related to design and architectural flaws

Ex: Being able to buy with bots, need to identify onauthentic purcheses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Security Misconfiguration

A

When security options are not defined in a way that maximizes security, or when services are deployed with insecure default settings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Vulnerable and Outdated Components

A

Components with vulnerabilites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Identification and Authentication Failures

A

Is about sessions and authentication.

Easy to get wrong:
Session IDs exposed in URLs, Sessions don’t timeout, don’t delete tokens

Consequences: Uathorized access, session hijacking.

Countermeasures: Secure APIs, Multi-factor authentication, avoid default passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Software and Data Integrity Failures

A

Code and infrastructure that does not protect against integrity violations

Ex: An application that relies upon plugins, libraries or modules from untrusted sources

Countermeasures: Use digital signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Security Logging and Monotoring failures

A

Issues where a system is not properly recording or watching for security events, making it difficult to detect and respond to potential threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Server-Side Request Forgery

A

Happens when a website fetches information from another place on the internet without checking if it’s safe.

Countermeasures:
Sanitize and validate client-supplied data & disable HTTP redirections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly