what
|
is this project?
|
OWASP Access Control Rules Tester Project
Purpose: Web application business logic vulnerabilities will be under increasing attention in near future. Although input validation vulnerabilities (XSS, SQLI) are in overwhelming majority nowadays, many automated approaches have emerged that deal with them. On the contrary, there are no known approaches (and methodologies for security experts) to classify or even detect business logic vulnerabilities. Besides, business logic flaws usually expose web application to great risks (according to OWASP Testing Guide). The proposal is to make an attempt to create a systematic approach that addresses business logic vulnerabilities. To begin with, access control flaws are surveyed.
License: N/A
|
who
|
is working on this project?
|
Project Leader: Andrew Petukhov
Project Maintainer:
Project Contributor(s): N/A
|
how
|
can you learn more?
|
Project Pamphlet: N/A
3x slide Project Presentation: N/A
Mailing list: N/A
Project Roadmap: To view, click here
Main links: N/A
Project Health: Not Reviewed (Provisional)
To be reviewed under Assessment Criteria v2.0
|
|
Key Contacts
|
|
- Contact Andrew Petukhov to contribute, review or sponsor this project
- Contact the GPC to report a problem or concern about this project or to update information.
|
|
|