|
|
| (10 intermediate revisions by the same user not shown) |
| Line 1: |
Line 1: |
| − | {{Template:Vulnerability}} | + | {{template:CandidateForDeletion}} |
| | + | |
| | + | #REDIRECT [[::Category:Attack]] |
| | | | |
| − | [[Category:FIXME|This is the text from the old template. This needs to be rewritten using the new template.]]
| |
| | | | |
| − | {{Template:Vulnerability}}
| |
| | Last revision (mm/dd/yy): '''{{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}''' | | Last revision (mm/dd/yy): '''{{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}''' |
| | | | |
| − | [[ASDR_TOC_Vulnerabilities|Vulnerabilities Table of Contents]]
| |
| | | | |
| − | [[ASDR Table of Contents]]
| + | ==Description== |
| − | __TOC__
| |
| | | | |
| | + | Allows a legitimate but expensive operation before the entity has proven that the operation should be allowed. |
| | | | |
| − | ==Description==
| + | PLOVER Early Amplification. |
| | | | |
| − | A vulnerability is a weakness in an application (frequently a broken or missing control) that enables an attack to succeed. Be sure you don't put [attacks] or [controls] in this category.
| + | * Attackers try to launch a denial of service attack by performing the unprotected expensive operations repeatly |
| − | | |
| − | # Start with a one-sentence description of the vulnerability
| |
| − | # What is the problem that creates the vulnerability?
| |
| − | # What are the attacks that target this vulnerability?
| |
| − | # What are the technical impacts of this vulnerability?
| |
| | | | |
| | | | |
| | ==Risk Factors== | | ==Risk Factors== |
| | | | |
| − | * Talk about the [[OWASP Risk Rating Methodology|factors]] that make this vulnerability likely or unlikely to actually happen
| + | TBD |
| − | * Discuss the technical impact of a successful exploit of this vulnerability
| |
| − | * Consider the likely [business impacts] of a successful attack
| |
| − | | |
| | | | |
| | ==Examples== | | ==Examples== |
| − | | + | TBD |
| − | ===Short example name===
| |
| − | : A short example description, small picture, or sample code with [http://www.site.com links]
| |
| − | | |
| − | ===Short example name===
| |
| − | : A short example description, small picture, or sample code with [http://www.site.com links]
| |
| − | | |
| | | | |
| | ==Related [[Attacks]]== | | ==Related [[Attacks]]== |
| | | | |
| − | * [[Attack 1]] | + | * [[Denial of Service]] |
| − | * [[Attack 2]]
| |
| | | | |
| | | | |
| Line 48: |
Line 32: |
| | * [[Vulnerability 1]] | | * [[Vulnerability 1]] |
| | * [[Vulnerabiltiy 2]] | | * [[Vulnerabiltiy 2]] |
| − |
| |
| − | Note: the contents of "Related Problems" sections should be placed here
| |
| | | | |
| | | | |
| | ==Related [[Controls]]== | | ==Related [[Controls]]== |
| | | | |
| − | * [[Control 1]] | + | * [[Authentication]] |
| − | * [[Control 2]]
| |
| − | | |
| − | Note: contents of "Avoidance and Mitigation" and "Countermeasure" related Sections should be placed here
| |
| − | | |
| | | | |
| | ==Related [[Technical Impacts]]== | | ==Related [[Technical Impacts]]== |
| Line 67: |
Line 45: |
| | | | |
| | ==References== | | ==References== |
| − | Note: A reference to related [http://cwe.mitre.org/ CWE] or [http://capec.mitre.org/ CAPEC] article should be added when exists. Eg:
| + | TBD |
| − | | |
| − | * [http://cwe.mitre.org/data/definitions/79.html CWE 79].
| |
| − | * http://www.link1.com
| |
| − | * [http://www.link2.com Title for the link2]
| |
| − | | |
| − | [[Category:FIXME|add links
| |
| − | | |
| − | In addition, one should classify vulnerability based on the following subcategories: Ex:<nowiki>[[Category:Error Handling Vulnerability]]</nowiki>
| |
| − | | |
| − | Availability Vulnerability
| |
| − | | |
| − | Authorization Vulnerability
| |
| − | | |
| − | Authentication Vulnerability
| |
| − | | |
| − | Concurrency Vulnerability
| |
| − | | |
| − | Configuration Vulnerability
| |
| − | | |
| − | Cryptographic Vulnerability
| |
| − | | |
| − | Encoding Vulnerability
| |
| − | | |
| − | Error Handling Vulnerability
| |
| − | | |
| − | Input Validation Vulnerability
| |
| | | | |
| − | Logging and Auditing Vulnerability
| |
| − |
| |
| − | Session Management Vulnerability]]
| |
| | | | |
| | __NOTOC__ | | __NOTOC__ |
| − |
| |
| − |
| |
| − | [[Category:OWASP ASDR Project]]
| |
| − |
| |
| − |
| |
| − | ==Description==
| |
| − | Allows a legitimate but expensive operation before the entity has proven that the operation should be allowed.
| |
| − |
| |
| − | PLOVER Early Amplification.
| |
| − |
| |
| − | ==Examples ==
| |
| − |
| |
| − | ==Related Threats==
| |
| − | * Attackers try to launch a denial of service attack by performing the unprotected expensive operations repeatly
| |
| − |
| |
| − | ==Related Attacks==
| |
| − | [[Denial of Service | Denial of Service]]
| |
| − |
| |
| − | ==Related Countermeasures==
| |
| − |
| |
| − | [[:Category:Authentication]]
| |
| − |
| |
| − | [[:Category:Access Control]]
| |
| − |
| |
| − | ==Categories==
| |
| − |
| |
| − | [[Category:Access Control Vulnerability]]
| |
| − | {{Template:Stub}}
| |
Allows a legitimate but expensive operation before the entity has proven that the operation should be allowed.
PLOVER Early Amplification.