This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "OWASP Newsletter 6"

From OWASP
Jump to: navigation, search
Line 1: Line 1:
==  OWASP Newsletter #6 ==
+
==  OWASP Newsletter #6 (5-Mar-2007) ==
== Featured Item: TBD ==
+
tbd
OWASP Top 10 update??
+
== Featured Item: OWASP Autumn of Code 2006 finished! ==
 +
All the OWASP Autumn of Code 2006 projects are completed. Congratulations to all contributors and project leaders!
 +
* [[OWASP_Autumn_of_Code_2006_-_Projects:_WebScarab_NG|WebScarab NG]]: A working beta version is now available for WebScarad which implements a complete new user interface and is much more usable and practical (although still doesn't have all features from the current version)
 +
* [[OWASP_Autumn_of_Code_2006_-_Projects:_Live_CD|Live CD]]: The Live CD is a valuable addition to the OWASP collection, since it allows the easy access, use and testing of several OWASP tools and documents
 +
* [[OWASP_Autumn_of_Code_2006_-_Projects:_CAL9000|CAL9000]]: A new version of CAP 9000 is now released containing several new features and with extended support for more browsers
 +
* [[OWASP_Autumn_of_Code_2006_-_Projects:_SiteGenerator_and_ORG|SiteGenerator and ORG]] :Both [[OWASP Report Generator]](ORG) and [[OWASP Site Generator]] (OSG) receive large number of enhancements. In ORG tons of small/medium bugs were fixed and several new major features where added (in addition to an update to .NET 2.0). In OSG, HttpModule was re-implemented to use TCP, several nasty bugs were fixed and new OSG vulnerabilities where added.
 +
* [[OWASP_Autumn_of_Code_2006_-_Projects:_Pantera|Pantera]]: Simon delivered a new version of Pantera which contains several new features and is more optimized
 +
* [OWASP_Autumn_of_Code_2006_-_Projects:_Web_Goat|Web Goat]]: 12 new lessons where added to WebGoat (for example: DOM/XML Injection, JSON Injection, Cross-Site Request Forgery , HTTP Splitting, etc..)
 +
* [[OWASP_Autumn_of_Code_2006_-_Projects:_Testing_Guide|Testing Guide]]:The previous Guide was greatly enhanced where large portions were re-writen and new material added. This Guide is an important addition to the OWASP catalogue.
 +
* [[OWASP_Autumn_of_Code_2006_-_Projects:_Owasp_.Net_Tools|Owasp .Net Tools]]: The OWASP .Net tools SAM'SHE and ANSA are in integrated into a new client server architecture which contains a 'built from scratch' client application which 'consumes' the results from the .Net tests. This new tools (called OWASP Tiger) could be the beginning of a standard vulnerability collector.
 +
* [[OWASP_Autumn_of_Code_2006_-_Projects:_Website_and_Branding|Owasp Website]]: Multiple sections of OWASP.org website where re-organized (for example the Projects Page), the OWASP newsletter was created and several pages received improvements in their layout
 +
More details on [http://www.owasp.org/index.php/OWASP_Autumn_Of_Code_2006 OWASP Autumn Of Code 2006]. We are looking forward to the "SpoC 007" (do you get the joke?), which is the OWASP Spring of Code 2007.
  
== Featured Project: TBD ==
+
== Featured Project: XML Gateway Eval Project ==
XML Gateway Eval Project?
+
This [http://www.owasp.org/index.php/Category:OWASP_XML_Security_Gateway_Evaluation_Criteria_Project OWASP Project] defines an open standard for evaluating XML Security Gateways. This criteria will provide the OWASP community a set of standard evaluation criteria to assess the functionality and quality of XML Security Gateways. The main driver for this project is to reduce the confusion and complexity in assessing the strengths and weaknesses of solutions in this the XML Security space, and enlightening the community as to the utility of XML Security Gateways to deliver a number of valuable security services.  
This OWASP Project defines an open standard for evaluating XML Security Gateways. This criteria will provide the OWASP community a set of standard evaluation criteria to assess the functionality and quality of XML Security Gateways. The main driver for this project is to reduce the confusion and complexity in assessing the strengths and weaknesses of solutions in this the XML Security space, and enlightening the community as to the utility of XML Security Gateways to deliver a number of valuable security services.  
 
  
 
== Latest additions to the WIKI ==
 
== Latest additions to the WIKI ==
 +
The [http://blogs.owasp.org/ OWASP Blogs] has been integrated in the OWASP web site.<br>
 +
Do not hesitate to create your own Web Application Security blog on it!
  
==== New Pages====  
+
==== New Pages====
* [[OWASP Education Project Modules]]
+
* [[Hacking Java Clients]]
 +
* [[OWASP Testing Guide Presentations]]
 +
* [[InfoSecurity Milano 2007]]
 +
* [[:Category:OWASP Education Project|OWASP Education Project]]
 
* [[Mark O'Neill]]
 
* [[Mark O'Neill]]
* [[OWASP Education Presentation Rating]]
+
* [[OWASP Education Presentation|consolidation page of OWASP presentations]]
* ‎[[OWASP Education Project Roadmap]]
+
* [‎http://www.owasp.org/index.php/J2EE_Bad_Practices:_JSP_Expressions J2EE Bad Practices: JSP Expressions]
* [‎[J2EE Bad Practices: JSP Expressions]]
 
  
 
==== Updated pages====  
 
==== Updated pages====  
 
Updated chapter pages:
 
Updated chapter pages:
 +
* [[New Jersey]]
 +
* [[Virginia (Northern Virginia)]]
 +
* [[Germany]]
 
* [[San Francisco]]
 
* [[San Francisco]]
 
* [[Ottawa]]
 
* [[Ottawa]]
Line 25: Line 42:
 
* [[Helsinki‎]]
 
* [[Helsinki‎]]
 
Other pages:
 
Other pages:
 +
* [[Category:OWASP Sprajax Project]]
 
* [[Appendix A: Testing Tools]]
 
* [[Appendix A: Testing Tools]]
 
* [[Access Control In Your J2EE Application]]
 
* [[Access Control In Your J2EE Application]]
Line 34: Line 52:
  
 
==== New Documents & Presentations from chapters====  
 
==== New Documents & Presentations from chapters====  
* [http://www.disenchant.ch/blog/files/presentations/pres_20070206_04_svetsch_xss_worms.pdf XSS and XSS Worms (Sven Vetsch)] from the [[Switzerland|Switzerland]] Chapter.
+
* [http://www.disenchant.ch/blog/files/presentations/pres_20070206_04_svetsch_xss_worms.pdf XSS and XSS Worms (Sven Vetsch)] from the [[Switzerland|Switzerland]] Chapter.<br>
 +
For a complete list of chapter presentations see [http://www.owasp.org/index.php/OWASP_Education_Presentation the online table of presentations].
  
 
==== Latest Blog entries====  
 
==== Latest Blog entries====  
 +
* [http://blogs.owasp.org/diniscruz/2007/03/03/simple-backdoor-on-wordpress/ Simple Backdoor on WordPress]
 +
* [http://blogs.owasp.org/seba/2007/03/03/ipod/ iPod]
 
* [http://blogs.owasp.org/dre/2007/02/27/re-writing-exploits/| Re-writing Exploits]
 
* [http://blogs.owasp.org/dre/2007/02/27/re-writing-exploits/| Re-writing Exploits]
 
* [http://blogs.owasp.org/seba/2007/02/22/javascript-badware/| JavaScript Badware]
 
* [http://blogs.owasp.org/seba/2007/02/22/javascript-badware/| JavaScript Badware]
Line 60: Line 81:
 
* Mar 6 (18:30h) - [[San Francisco|San Francisco and San Jose chapter meeting]]
 
* Mar 6 (18:30h) - [[San Francisco|San Francisco and San Jose chapter meeting]]
 
* Mar 6 (18:00h) - [[Melbourne|Melbourne chapter meeting]]
 
* Mar 6 (18:00h) - [[Melbourne|Melbourne chapter meeting]]
 
+
* Mar 5 (11:00h) - [[New Jersey|New Jersey chapter meeting]]
  
 
==== Application Security News ====  
 
==== Application Security News ====  
 +
* '''Mar 2 - [http://wordpress.org/development/2007/03/upgrade-212/ Wordpress (popular blog software) backdoored]'''
 +
:"Long story short: If you downloaded WordPress 2.1.1 within the past 3-4 days, your files may include a security exploit that was added by a cracker, and you should upgrade all of your files to 2.1.2 immediately."
 +
* '''Mar 1 - [http://www.php-security.org/ the Month of PHP Bugs "formerly known as March"]'''
 +
:"This initiative is an effort to improve the security of PHP. However we will not concentrate on problems in the PHP language that might result in insecure PHP applications, but on security vulnerabilities in the PHP core."
 
* '''Feb 26 - [http://www.securityfocus.com/infocus/1888 Building Secure Applications: Consistent Logging]'''
 
* '''Feb 26 - [http://www.securityfocus.com/infocus/1888 Building Secure Applications: Consistent Logging]'''
 
:SecurityFocus article, "This article examines the dismal state of application-layer logging as observed from the authors’ years of experience in performing source code security analysis on millions of lines of code."
 
:SecurityFocus article, "This article examines the dismal state of application-layer logging as observed from the authors’ years of experience in performing source code security analysis on millions of lines of code."
Line 69: Line 94:
  
 
== OWASP references in the Media==
 
== OWASP references in the Media==
 +
* [http://sev.prnewswire.com/computer-electronics/20070302/CLF05902032007-1.html WhiteHat Security Chief Technology Officer Jeremiah Grossman to Present at OWASP Philadelphia Meeting]
 +
* [http://www.professionalsecuritytesters.org/modules.php?name=News&file=article&sid=766 ANNOUNCING THE OWASP TESTING GUIDE]
 
* [http://www.securityfocus.com/infocus/1888| Building Secure Applications: Consistent Logging]
 
* [http://www.securityfocus.com/infocus/1888| Building Secure Applications: Consistent Logging]

Revision as of 13:13, 5 March 2007

OWASP Newsletter #6 (5-Mar-2007)

tbd

Featured Item: OWASP Autumn of Code 2006 finished!

All the OWASP Autumn of Code 2006 projects are completed. Congratulations to all contributors and project leaders!

  • WebScarab NG: A working beta version is now available for WebScarad which implements a complete new user interface and is much more usable and practical (although still doesn't have all features from the current version)
  • Live CD: The Live CD is a valuable addition to the OWASP collection, since it allows the easy access, use and testing of several OWASP tools and documents
  • CAL9000: A new version of CAP 9000 is now released containing several new features and with extended support for more browsers
  • SiteGenerator and ORG :Both OWASP Report Generator(ORG) and OWASP Site Generator (OSG) receive large number of enhancements. In ORG tons of small/medium bugs were fixed and several new major features where added (in addition to an update to .NET 2.0). In OSG, HttpModule was re-implemented to use TCP, several nasty bugs were fixed and new OSG vulnerabilities where added.
  • Pantera: Simon delivered a new version of Pantera which contains several new features and is more optimized
  • [OWASP_Autumn_of_Code_2006_-_Projects:_Web_Goat|Web Goat]]: 12 new lessons where added to WebGoat (for example: DOM/XML Injection, JSON Injection, Cross-Site Request Forgery , HTTP Splitting, etc..)
  • Testing Guide:The previous Guide was greatly enhanced where large portions were re-writen and new material added. This Guide is an important addition to the OWASP catalogue.
  • Owasp .Net Tools: The OWASP .Net tools SAM'SHE and ANSA are in integrated into a new client server architecture which contains a 'built from scratch' client application which 'consumes' the results from the .Net tests. This new tools (called OWASP Tiger) could be the beginning of a standard vulnerability collector.
  • Owasp Website: Multiple sections of OWASP.org website where re-organized (for example the Projects Page), the OWASP newsletter was created and several pages received improvements in their layout

More details on OWASP Autumn Of Code 2006. We are looking forward to the "SpoC 007" (do you get the joke?), which is the OWASP Spring of Code 2007.

Featured Project: XML Gateway Eval Project

This OWASP Project defines an open standard for evaluating XML Security Gateways. This criteria will provide the OWASP community a set of standard evaluation criteria to assess the functionality and quality of XML Security Gateways. The main driver for this project is to reduce the confusion and complexity in assessing the strengths and weaknesses of solutions in this the XML Security space, and enlightening the community as to the utility of XML Security Gateways to deliver a number of valuable security services.

Latest additions to the WIKI

The OWASP Blogs has been integrated in the OWASP web site.
Do not hesitate to create your own Web Application Security blog on it!

New Pages

Updated pages

Updated chapter pages:

Other pages:


New Documents & Presentations from chapters

For a complete list of chapter presentations see the online table of presentations.

Latest Blog entries

OWASP Community

Application Security News

"Long story short: If you downloaded WordPress 2.1.1 within the past 3-4 days, your files may include a security exploit that was added by a cracker, and you should upgrade all of your files to 2.1.2 immediately."
"This initiative is an effort to improve the security of PHP. However we will not concentrate on problems in the PHP language that might result in insecure PHP applications, but on security vulnerabilities in the PHP core."
SecurityFocus article, "This article examines the dismal state of application-layer logging as observed from the authors’ years of experience in performing source code security analysis on millions of lines of code."
A long paper on web application security threats released by honeynet.org. "This paper focuses on application threats against common web applications. After reviewing the fundamentals of a typical attack, we will go on to describe the trends we have observed and to describe the research methods that we currently use to observe and monitor these threats."

OWASP references in the Media