Ch2 Websecurity22
Ch2 Websecurity22
Security Risks
Who is the OWASP® Foundation?
• Encrypt all data in transit with secure protocols such as TLS with perfect forward
secrecy (PFS) ciphers, cipher prioritization by the server, and secure parameters.
• Enforce encryption using directives like HTTP Strict Transport Security (HSTS).
• Store passwords using strong adaptive and salted hashing functions with a work
factor (delay factor), such as Argon2, scrypt, bcrypt, or PBKDF2.
• Another new addition to the 2021 roster is software and data integrity
failures.
• These failures can take many forms, particularly since as the web evolves
it is more and more common to use third party code and services within
web applications.
• These failures can be summarised as follows:
1. Usage of code that does not verify integrity of source
2. Usage of third party plugins where you do not control the source
3. Plugins and extensions from untrusted sources
4. The introduction of or potential for compromise or unauthorised access
5. Auto-updates assume trust of the source
Software and Data Integrity Failures
cont.
• WordPress website administrators make heavy usage out of the official
WordPress repository.
• Other CMS platforms have similar libraries that are used.
• These repositories are all open source and the code is publicly accessible
and able to be analyzed. This is a major advantage but not foolproof.
• Many open source plugins over the last few years have been targeted by
attackers after serious vulnerabilities were discovered within them.
• Common for website owners to use hacked or “nulled” plugins/themes
on their website.
• These are almost always coupled with backdoors that will be used to
compromise the website environment.
Examples of Integrity Failure