This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP Common Numbering Project"
Line 36: | Line 36: | ||
* OCN-DBASE: Secure Database Usage | * OCN-DBASE: Secure Database Usage | ||
* OCN-FILE: Secure File Access | * OCN-FILE: Secure File Access | ||
+ | * OCN-MEM: Memory Management | ||
* OCN-GEN: General Coding Practices | * OCN-GEN: General Coding Practices | ||
− | * OCN-AVAIL: Availability | + | * OCN-INTEG: Integrity |
− | + | * OCN-AVAIL: Availability | |
− | |||
− | |||
− | |||
− | |||
</td> | </td> |
Revision as of 16:40, 10 February 2011
Home
Common OWASP Numbering
An exciting development, a new numbering scheme that will be common across OWASP Guides and References is being developed. The numbering is loosely based on the OWASP ASVS section and detailed requirement numbering. OWASP ASVS, Guide, and Reference project leads and contributors as well as the OWASP leadership plan to work together to develop numbering that would allow for easy mapping between OWASP Guides and References, and that would allow for a period of transition as Guides and References are updated to reflect the new numbering. This project will provide a centralized clearinghouse for mapping information. For more information, please contact Dave Wichers. This common numbering will be of requirements. A mapping of vulnerabilities to this requirements list will most likely be developed after the common requirements list is created. This common numbering scheme is intended to be independent of any particular OWASP project and is not intended to dictate how those projects are developed and organized. Its intent is to be a resource to facilitate cross referencing between related topics and to encourage, but not require, projects like the OWASP Guides to adopt a similar structure. But that decision is up to the respective project leads. |
Common OWASP Numbering Scheme
Common OWASP Numbering Scheme
OCN-AUTHN-01 OCN-AUTHN-02 OCN-AUTHN-02.01 OCN-AUTHN-03 OCN-INPVAL-01 OCB-INPVAL-02 Common Numbering Scheme Proposed Requirement Areas:
|
Reference
|
Mapping to Legacy Testing Guide IDs
Note: This is still a work in progress and is currently incomplete.
|
|
|
Information Gathering | ||
OWASP-IG-001 | Spiders, Robots and Crawlers | OWASP-<put mapped ASVS 4 digit # here>-TG-IG-001 |
OWASP-IG-002 | Search Engine Discovery/Reconnaissance | |
OWASP-IG-003 | Identify application entry points | |
OWASP-IG-004 | Testing for Web Application Fingerprint | |
OWASP-IG-005 | Application Discovery | |
OWASP-IG-006 | Analysis of Error Codes | |
Configuration Management Testing | ||
OWASP-CM-001 | SSL/TLS Testing (SSL Version, Algorithms, Key length, Digital Cert. Validity) | |
OWASP-CM-002 | DB Listener Testing | |
OWASP-CM-003 | Infrastructure Configuration Management Testing | |
OWASP-CM-004 | Application Configuration Management Testing | |
OWASP-CM-005 | Testing for File Extensions Handling | |
OWASP-CM-006 | Old, backup and unreferenced files | |
OWASP-CM-007 | Infrastructure and Application Admin Interfaces | |
OWASP-CM-008 | Testing for HTTP Methods and XST | |
Authentication Testing | ||
OWASP-AT-001 | Credentials transport over an encrypted channel | |
OWASP-AT-002 | Testing for user enumeration | |
OWASP-AT-003 | Testing for Guessable (Dictionary) User Account | |
OWASP-AT-004 | Brute Force Testing | |
OWASP-AT-005 | Testing for bypassing authentication schema | |
OWASP-AT-006 | Testing for vulnerable remember password and pwd reset | |
OWASP-AT-007 | Testing for Logout and Browser Cache Management | |
OWASP-AT-008 | Testing for CAPTCHA | |
OWASP-AT-009 | Testing Multiple Factors Authentication | |
OWASP-AT-010 | Testing for Race Conditions | |
Session Management | ||
OWASP-SM-001 | Testing for Session Management Schema | |
OWASP-SM-002 | Testing for Cookies attributes | |
OWASP-SM-003 | Testing for Session Fixation | |
OWASP-SM-004 | Testing for Exposed Session Variables | |
OWASP-SM-005 | Testing for CSRF | |
Authorization Testing | ||
OWASP-AZ-001 | Testing for Path Traversal | |
OWASP-AZ-002 | Testing for bypassing authorization schema | |
OWASP-AZ-003 | Testing for Privilege Escalation | |
Business logic testing | ||
OWASP-BL-001 | Testing for business logic | |
Data Validation Testing | ||
OWASP-DV-001 | Testing for Reflected Cross Site Scripting | |
OWASP-DV-002 | Testing for Stored Cross Site Scripting | |
OWASP-DV-003 | Testing for DOM based Cross Site Scripting | |
OWASP-DV-004 | Testing for Cross Site Flashing | |
OWASP-DV-005 | SQL Injection | |
OWASP-DV-006 | LDAP Injection | |
OWASP-DV-007 | ORM Injection | |
OWASP-DV-008 | XML Injection | |
OWASP-DV-009 | SSI Injection | |
OWASP-DV-010 | XPath Injection | |
OWASP-DV-011 | IMAP/SMTP Injection | |
OWASP-DV-012 | Code Injection | |
OWASP-DV-013 | OS Commanding | |
OWASP-DV-014 | Buffer overflow | |
OWASP-DV-015 | Incubated vulnerability Testing | |
OWASP-DV-016 | Testing for HTTP Splitting/Smuggling | |
Denial of Service Testing | ||
OWASP-DS-001 | Testing for SQL Wildcard Attacks | |
OWASP-DS-002 | Locking Customer Accounts | |
OWASP-DS-003 | Testing for DoS Buffer Overflows | |
OWASP-DS-004 | User Specified Object Allocation | |
OWASP-DS-005 | User Input as a Loop Counter | |
OWASP-DS-006 | Writing User Provided Data to Disk | |
OWASP-DS-007 | Failure to Release Resources | |
OWASP-DS-008 | Storing too Much Data in Session | |
Web Services Testing | ||
OWASP-WS-001 | WS Information Gathering | |
OWASP-WS-002 | Testing WSDL | |
OWASP-WS-003 | XML Structural Testing | |
OWASP-WS-004 | XML content-level Testing | |
OWASP-WS-005 | HTTP GET parameters/REST Testing | |
OWASP-WS-006 | Naughty SOAP attachments | |
OWASP-WS-007 | Replay Testing | |
AJAX Testing | ||
OWASP-AJ-001 | AJAX Vulnerabilities | |
OWASP-AJ-002 | AJAX Testing |
Mapping to Top 10 2010 IDs
|
|
|
2010-A1 | Injection |
OWASP-0705 OWASP-0706 OWASP-0707 OWASP-0708 OWASP-0709 OWASP-0710 OWASP-0711 OWASP-0712 |
2010-A2 | Cross Site Scripting (XSS) | OWASP-0701
OWASP-0702 OWASP-0703 OWASP-0704 |
2010-A3 | Broken Authentication and Session Management | OWASP-0300
OWASP-0400 |
2010-A4 | Insecure Direct Object References | OWASP-0502 |
2010-A5 | Cross Site Request Forgery | OWASP-0405 |
2010-A6 | Security Misconfiguration | OWASP-0203
OWASP-0204 |
2010-A7 | Failure to Restrict URL Access | OWASP-0500 |
2010-A8 | Unvalidated Redirects and Forwards | OWASP-0717 |
2010-A9 | Insecure Cryptographic Storage | OWASP-0209 |
2010-A10 | Insufficient Transport Layer Protection | OWASP-0201 |
Contributors
Project Leader
Project Contributors
|