|
|
(2 intermediate revisions by 2 users not shown) |
Line 1: |
Line 1: |
− | {{Template:Vulnerability}}
| + | ''This is a '''Vulnerability'''. To view all vulnerabilities, please see the [[:Category:Vulnerability|Vulnerability Category]] page.'' |
− | Last revision (mm/dd/yy): '''{{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}'''
| + | [[Category:Vulnerability]] |
− | | |
− | [[ASDR_TOC_Vulnerabilities|Vulnerabilities Table of Contents]]
| |
− | | |
− | [[ASDR Table of Contents]]
| |
− | __TOC__
| |
− | | |
− | | |
− | ==Description==
| |
− | | |
− | A vulnerability is a weakness in an application (frequently a broken or missing control) that enables an attack to succeed. Be sure you don't put [attacks] or [controls] in this category.
| |
− | | |
− | # Start with a one-sentence description of the vulnerability
| |
− | # What is the problem that creates the vulnerability?
| |
− | # What are the attacks that target this vulnerability?
| |
− | # What are the technical impacts of this vulnerability?
| |
− | | |
− | | |
− | ==Risk Factors==
| |
− | | |
− | * Talk about the [[OWASP Risk Rating Methodology|factors]] that make this vulnerability likely or unlikely to actually happen
| |
− | * Discuss the technical impact of a successful exploit of this vulnerability
| |
− | * Consider the likely [business impacts] of a successful attack
| |
− | | |
− | | |
− | ==Examples==
| |
− | | |
− | ===Short example name===
| |
− | : A short example description, small picture, or sample code with [http://www.site.com links] | |
− | | |
− | ===Short example name===
| |
− | : A short example description, small picture, or sample code with [http://www.site.com links]
| |
− | | |
− | | |
− | ==Related [[Attacks]]==
| |
− | | |
− | * [[Attack 1]]
| |
− | * [[Attack 2]]
| |
− | | |
− | | |
− | ==Related [[Vulnerabilities]]==
| |
− | | |
− | * [[Vulnerability 1]]
| |
− | * [[Vulnerabiltiy 2]]
| |
− | | |
− | ==Related [[Controls]]==
| |
− | | |
− | * [[Control 1]]
| |
− | * [[Control 2]]
| |
− | | |
− | | |
− | ==Related [[Technical Impacts]]==
| |
− | | |
− | * [[Technical Impact 1]]
| |
− | * [[Technical Impact 2]]
| |
− | | |
− | | |
− | ==References==
| |
− | Note: A reference to related [http://cwe.mitre.org/ CWE] or [http://capec.mitre.org/ CAPEC] article should be added when exists. Eg:
| |
− | | |
− | * [http://cwe.mitre.org/data/definitions/79.html CWE 79].
| |
− | * http://www.link1.com
| |
− | * [http://www.link2.com Title for the link2]
| |
− | | |
− | [[Category:FIXME|add links | |
− | | |
− | In addition, one should classify vulnerability based on the following subcategories: Ex:<nowiki>[[Category:Error Handling Vulnerability]]</nowiki>
| |
− | | |
− | Availability Vulnerability
| |
− | | |
− | Authorization Vulnerability
| |
− | | |
− | Authentication Vulnerability
| |
− | | |
− | Concurrency Vulnerability
| |
− | | |
− | Configuration Vulnerability
| |
− | | |
− | Cryptographic Vulnerability
| |
− | | |
− | Encoding Vulnerability
| |
− | | |
− | Error Handling Vulnerability
| |
− | | |
− | Input Validation Vulnerability
| |
− | | |
− | Logging and Auditing Vulnerability
| |
− | | |
− | Session Management Vulnerability]]
| |
− | | |
| __NOTOC__ | | __NOTOC__ |
− |
| |
− |
| |
− | [[Category:OWASP ASDR Project]]
| |
− |
| |
− | [[Category:Vulnerability]]
| |