This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Enterprise Business Application Security Development Issues"
(Created page with " === Development of guides === == Objective == This document will describe different areas of program vulnerabilities that can be found in Enterprise Business applications...") |
|||
Line 1: | Line 1: | ||
− | === Development | + | === Development Issues === |
== Objective == | == Objective == | ||
− | This document will describe different areas of program vulnerabilities that can be found in Enterprise Business applications and ERP systems. | + | This document will describe different areas of program vulnerabilities that can be found in source code of Enterprise Business applications and ERP systems. |
== Purpose == | == Purpose == | ||
Line 12: | Line 12: | ||
== Intro == | == Intro == | ||
− | There are many different languages and technologies that can be used to develop business applications and write costom code. Here, we will try to categorize | + | There are many different languages and technologies that can be used to develop business applications and write costom code such as ABAP for SAP, PeopleCode for PeopleSoft,X++ for Microsoft Dynamics, PL/SQL for Oracle EBS, LotusScript for Lotus and much much more. Here, we will try to categorize them into 9 main areas filtered by criticality. |
== Main == | == Main == | ||
− | Crosslinks to CWE SANS OWASP and risks with descriptions will be added soon. | + | Crosslinks to CWE, SANS, OWASP and risks with descriptions will be added soon. |
− | + | == 9 most critical types of issues in source code (EASAD-9-2013) == | |
− | + | 1 injections (Code sql os) | |
− | + | 2 critical calls (to db to os ) | |
− | + | 3 missing or bad access control checks (miss auth checks ) | |
− | + | 4 directory/path traversal (write, read, smbrelay) | |
− | + | 5 Modification of displayed content (XSS stored, linked, js/html injections) | |
− | + | 6 backdoors (hardcoded credentials) | |
− | + | 7 covert channels (sockets, http calls, ssrf's, ) | |
− | + | 8 information disclose (hardcoded users, passwords, debug information, | |
− | + | 9 obsolete statements ( READ TABLE, kernel methods,….) | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | 2 | ||
− | 3 | ||
− | 4 | ||
− | 5 | ||
− | 6 | ||
− | 7 | ||
− | 8 | ||
− | 9 | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
== Links == | == Links == | ||
Line 68: | Line 40: | ||
== Authors == | == Authors == | ||
− | Alexander Polyakov | + | Alexander Polyakov |
− | + | Alexander Minojenko | |
− | + | Pavel Kuzmin | |
− |
Revision as of 20:42, 15 September 2013
Development Issues
Objective
This document will describe different areas of program vulnerabilities that can be found in source code of Enterprise Business applications and ERP systems.
Purpose
The purpose of this document is to increase awareness of the developers of Enterprise Business software. Here, we will collect top software vulnerabilities in server side and frontend side that can exist in Business Applications.
Intro
There are many different languages and technologies that can be used to develop business applications and write costom code such as ABAP for SAP, PeopleCode for PeopleSoft,X++ for Microsoft Dynamics, PL/SQL for Oracle EBS, LotusScript for Lotus and much much more. Here, we will try to categorize them into 9 main areas filtered by criticality.
Main
Crosslinks to CWE, SANS, OWASP and risks with descriptions will be added soon.
9 most critical types of issues in source code (EASAD-9-2013)
1 injections (Code sql os) 2 critical calls (to db to os ) 3 missing or bad access control checks (miss auth checks ) 4 directory/path traversal (write, read, smbrelay) 5 Modification of displayed content (XSS stored, linked, js/html injections) 6 backdoors (hardcoded credentials) 7 covert channels (sockets, http calls, ssrf's, ) 8 information disclose (hardcoded users, passwords, debug information, 9 obsolete statements ( READ TABLE, kernel methods,….)
Links
coming soon
Authors
Alexander Polyakov Alexander Minojenko Pavel Kuzmin