This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Top 10 2013-Details About Risk Factors"
(Internationalisation: 2st step: table content; corrected CSRF: Detectability: EASY (was AVERAGE)) |
|||
Line 9: | Line 9: | ||
The following table presents a summary of the 2013 Top 10 Application Security Risks, and the risk factors we have assigned to each risk. These factors were determined based on the available statistics and the experience of the OWASP Top 10 team. To understand these risks for a particular application or organization, <u>you must consider your own specific threat agents and business impacts</u>. Even egregious software weaknesses may not present a serious risk if there are no threat agents in a position to perform the necessary attack or the business impact is negligible for the assets involved. | The following table presents a summary of the 2013 Top 10 Application Security Risks, and the risk factors we have assigned to each risk. These factors were determined based on the available statistics and the experience of the OWASP Top 10 team. To understand these risks for a particular application or organization, <u>you must consider your own specific threat agents and business impacts</u>. Even egregious software weaknesses may not present a serious risk if there are no threat agents in a position to perform the necessary attack or the business impact is negligible for the assets involved. | ||
+ | |||
<center> | <center> | ||
Line 78: | Line 79: | ||
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=freetext|position=whole|title={{Top_10:LanguageFile|text=additionalRisksToConsider|language=en}}|width=100%|year=2013|language=en}} | {{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=freetext|position=whole|title={{Top_10:LanguageFile|text=additionalRisksToConsider|language=en}}|width=100%|year=2013|language=en}} | ||
− | The Top 10 cover a lot of ground, but there are other risks | + | The Top 10 cover a lot of ground, but there are many other risks you should consider and evaluate in your organization. Some of these have appeared in previous versions of the Top 10, and others have not, including new attack techniques that are being identified all the time. Other important application security risks (in alphabetical order) that you should also consider include: |
* [https://www.owasp.org/index.php/Clickjacking Clickjacking] | * [https://www.owasp.org/index.php/Clickjacking Clickjacking] | ||
* [https://www.owasp.org/index.php/Testing_for_Race_Conditions_(OWASP-AT-010) Concurrency Flaws] | * [https://www.owasp.org/index.php/Testing_for_Race_Conditions_(OWASP-AT-010) Concurrency Flaws] | ||
* [https://www.owasp.org/index.php/Application_Denial_of_Service Denial of Service] (Was 2004 Top 10 – Entry 2004-A9) | * [https://www.owasp.org/index.php/Application_Denial_of_Service Denial of Service] (Was 2004 Top 10 – Entry 2004-A9) | ||
− | * [https://www.aspectsecurity.com/uploads/downloads/2011/09/ExpressionLanguageInjection.pdf Expression Language Injection] | + | * [https://www.aspectsecurity.com/uploads/downloads/2011/09/ExpressionLanguageInjection.pdf Expression Language Injection] ([http://cwe.mitre.org/data/definitions/917.html CWE-917]) |
* [http://projects.webappsec.org/Information-Leakage Information Leakage] and [https://www.owasp.org/index.php/Top_10_2007-A6 Improper Error Handling] (Was part of 2007 Top 10 – [https://www.owasp.org/index.php/Top_10_2007-A6 Entry 2007-A6]) | * [http://projects.webappsec.org/Information-Leakage Information Leakage] and [https://www.owasp.org/index.php/Top_10_2007-A6 Improper Error Handling] (Was part of 2007 Top 10 – [https://www.owasp.org/index.php/Top_10_2007-A6 Entry 2007-A6]) | ||
− | * [http://projects.webappsec.org/Insufficient+Anti-automation Insufficient Anti-automation] | + | * [http://projects.webappsec.org/Insufficient+Anti-automation Insufficient Anti-automation] ([http://cwe.mitre.org/data/definitions/799.html CWE-799]) |
* Insufficient Logging and Accountability (Related to 2007 Top 10 – [https://www.owasp.org/index.php/Top_10_2007-A6 Entry 2007-A6]) | * Insufficient Logging and Accountability (Related to 2007 Top 10 – [https://www.owasp.org/index.php/Top_10_2007-A6 Entry 2007-A6]) | ||
* [https://www.owasp.org/index.php/ApplicationLayerIntrustionDetection Lack of Intrusion Detection and Response] | * [https://www.owasp.org/index.php/ApplicationLayerIntrustionDetection Lack of Intrusion Detection and Response] | ||
* [https://www.owasp.org/index.php/Top_10_2007-A3 Malicious File Execution] (Was 2007 Top 10 – [https://www.owasp.org/index.php/Top_10_2007-A3 Entry 2007-A3]) | * [https://www.owasp.org/index.php/Top_10_2007-A3 Malicious File Execution] (Was 2007 Top 10 – [https://www.owasp.org/index.php/Top_10_2007-A3 Entry 2007-A3]) | ||
− | * [http://en.wikipedia.org/wiki/ | + | * [http://en.wikipedia.org/wiki/Mass_assignment_vulnerability Mass Assignment] ([http://cwe.mitre.org/data/definitions/915.html CWE-915]) |
* [https://www.owasp.org/index.php/Privacy_Violation User Privacy] | * [https://www.owasp.org/index.php/Privacy_Violation User Privacy] | ||
+ | |||
{{Top_10:SubsectionTableEndTemplate}} | {{Top_10:SubsectionTableEndTemplate}} | ||
{{Top_10_2013:BottomTemplate | {{Top_10_2013:BottomTemplate |
Revision as of 18:10, 14 June 2013
NOTE: THIS IS NOT THE LATEST VERSION. Please visit the OWASP Top 10 project page to find the latest edition.
[[Top 10 {{{year}}}-Note About Risks|← Note About Risks]] | [[Top_10_{{{year}}}-Top 10|{{{year}}} Top 10 List]] |
Top 10 Risk Factor Summary
The following table presents a summary of the 2013 Top 10 Application Security Risks, and the risk factors we have assigned to each risk. These factors were determined based on the available statistics and the experience of the OWASP Top 10 team. To understand these risks for a particular application or organization, you must consider your own specific threat agents and business impacts. Even egregious software weaknesses may not present a serious risk if there are no threat agents in a position to perform the necessary attack or the business impact is negligible for the assets involved.
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Additional Risks to Consider
The Top 10 cover a lot of ground, but there are many other risks you should consider and evaluate in your organization. Some of these have appeared in previous versions of the Top 10, and others have not, including new attack techniques that are being identified all the time. Other important application security risks (in alphabetical order) that you should also consider include:
|
[[Top 10 {{{year}}}-Note About Risks|← Note About Risks]] | [[Top_10_{{{year}}}-Top 10|{{{year}}} Top 10 List]] |
