II Unit Owspf
II Unit Owspf
identify all vulnerabilities in the OWASP Top 10. How true is such a claim?
A question we are typically asked is if Netsparker Web Application Security Scanner can
detect all vulnerabilities and security flaws listed in the OWASP Top 10. Many are lead to
believe, and told that some automated web application security scanners can detect all
vulnerabilities and security issues listed in the OWASP Top 10.
I have personally seen responses from security software companies stating that their web
vulnerability scanner, or network scanner can detect all vulnerabilities listed in the
OWASP Top 10. To start off with let us be clear, such statements are not true. There is no
automated tool that can detect all security flaws listed in the OWASP top 10.
Apart from the fact that such statements are not true, they are also misleading security
professionals and decision makers. But simply answering the question is not enough. This
article goes into the details and explains why no security software can automatically
identify all vulnerabilities listed in the OWASP Top 10 list.
This is the first category in the OWASP Top 10 list which lists a number of security issues
that CANNOT be automatically identified by a web vulnerability scanner. For example
insecure storage of user credentials; credentials are stored in clear text and are not
protected using hashing or encrypted when stored in the backend database. An automated
web vulnerability scanner, or any other automated security tool can never determine how
user authentication details are stored in your web applications backend database. Such
checks can only be done manually by a human.
Having said that some of the security issues listed in this category can be identified
automatically by web application security scanners. For example session IDs exposed in
URLs, or the transmission of usernames and passwords over an unencrypted connection.
A5 - Security Misconfiguration
This category refers to a number of security issues which are the result of a
misconfiguration in the server or the software and framework being used. Most of these
security issues can be automatically identified with an automated web vulnerability
scanner, though most of them still need to be verified by a human who is familiar with the
web application before being confirmed as security issues, as explained below.
Unnecessary network services: You can identify running network services such as FTP,
DNS and SMTP on your web server by using a port scanner. The scanner will report the
open ports but it is up to you to determine if the reported network services are needed or
not.
Out of Date Software: A web vulnerability scanner will alert you if any of the software
being used to run your web application is outdated and most probably vulnerable. A
scanner can also identify the web server version, the development framework (php, .NET
etc) version and even the version of well known web applications such as WordPress,
Drupal etc.
Security Settings of Development framework: A web vulnerability scanner can also
notify you of some configuration issues in development frameworks that might leave
your web application exposed to malicious hack attacks. For example a scanner will alert
you if debugging is enabled, or if error messages disclose sensitive information.
Default Accounts and Passwords: By default web vulnerability scanners do launch
brute force attacks against login forms using a dictionary, and in fact weak credentials
will be identified. Though of course this is limited to what you are scanning. For example
if you use weak credentials to access the web server itself, the scanner will never be able
to identify them. Hence why it is important to audit every component that make up your
web farm.
http://www.example.com/redirect.php?address=en.example.com
In such cases, if the attacker can change the URL in the address parameter to another
URL then the target website is vulnerable to unvalidated redirects and forwards. In most
cases web vulnerability scanners can identify such security issues automatically.