This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "OWASP Newsletter 6"

From OWASP
Jump to: navigation, search
(Latest additions to the WIKI)
Line 18: Line 18:
  
 
== Latest additions to the WIKI ==
 
== Latest additions to the WIKI ==
The [http://blogs.owasp.org/ OWASP Blogs] has been integrated in the OWASP web site.<br>
+
The [http://blogs.owasp.org/ OWASP Blogs] have been integrated in the OWASP web site.<br>
Do not hesitate to create your own Web Application Security blog on it!
+
Do not hesitate to start your own Web Application Security blog.
  
 
==== New Pages====
 
==== New Pages====
Line 28: Line 28:
 
* [[Mark O'Neill]]
 
* [[Mark O'Neill]]
 
* [[OWASP Education Presentation|consolidation page of OWASP presentations]]
 
* [[OWASP Education Presentation|consolidation page of OWASP presentations]]
* [‎http://www.owasp.org/index.php/J2EE_Bad_Practices:_JSP_Expressions J2EE Bad Practices: JSP Expressions]
+
* [[J2EE_Bad_Practices:_JSP_Expressions|J2EE Bad Practices: JSP Expressions]]
  
 
==== Updated pages====  
 
==== Updated pages====  
Line 42: Line 42:
 
* [[Helsinki‎]]
 
* [[Helsinki‎]]
 
Other pages:
 
Other pages:
* [[Category:OWASP Sprajax Project]]
+
* [[:Category:OWASP Sprajax Project|OWASP Sprajax Project]]
 
* [[Appendix A: Testing Tools]]
 
* [[Appendix A: Testing Tools]]
 
* [[Access Control In Your J2EE Application]]
 
* [[Access Control In Your J2EE Application]]
Line 48: Line 48:
 
* [[How to add validation logic to HttpServletRequest‎]]
 
* [[How to add validation logic to HttpServletRequest‎]]
 
* [[OWASP Autumn of Code 2006 - Project Completion]]
 
* [[OWASP Autumn of Code 2006 - Project Completion]]
* [[Category:OWASP XML Security Gateway Evaluation Criteria Project]]
+
* [[:Category:OWASP XML Security Gateway Evaluation Criteria Project|OWASP XML Security Gateway Evaluation Criteria Project]]
  
  
 
==== New Documents & Presentations from chapters====  
 
==== New Documents & Presentations from chapters====  
 
* [http://www.disenchant.ch/blog/files/presentations/pres_20070206_04_svetsch_xss_worms.pdf XSS and XSS Worms (Sven Vetsch)] from the [[Switzerland|Switzerland]] Chapter.<br>
 
* [http://www.disenchant.ch/blog/files/presentations/pres_20070206_04_svetsch_xss_worms.pdf XSS and XSS Worms (Sven Vetsch)] from the [[Switzerland|Switzerland]] Chapter.<br>
For a complete list of chapter presentations see [http://www.owasp.org/index.php/OWASP_Education_Presentation the online table of presentations].
+
For a complete list of chapter presentations see [[OWASP_Education_Presentation|the online table of presentations]].
  
 
==== Latest Blog entries====  
 
==== Latest Blog entries====  

Revision as of 13:21, 5 March 2007

OWASP Newsletter #6 (5-Mar-2007)

tbd

Featured Item: OWASP Autumn of Code 2006 finished!

All the OWASP Autumn of Code 2006 projects are completed. Congratulations to all contributors and project leaders!

  • WebScarab NG: A working beta version is now available for WebScarad which implements a complete new user interface and is much more usable and practical (although still doesn't have all features from the current version)
  • Live CD: The Live CD is a valuable addition to the OWASP collection, since it allows the easy access, use and testing of several OWASP tools and documents
  • CAL9000: A new version of CAP 9000 is now released containing several new features and with extended support for more browsers
  • SiteGenerator and ORG :Both OWASP Report Generator(ORG) and OWASP Site Generator (OSG) receive large number of enhancements. In ORG tons of small/medium bugs were fixed and several new major features where added (in addition to an update to .NET 2.0). In OSG, HttpModule was re-implemented to use TCP, several nasty bugs were fixed and new OSG vulnerabilities where added.
  • Pantera: Simon delivered a new version of Pantera which contains several new features and is more optimized
  • [OWASP_Autumn_of_Code_2006_-_Projects:_Web_Goat|Web Goat]]: 12 new lessons where added to WebGoat (for example: DOM/XML Injection, JSON Injection, Cross-Site Request Forgery , HTTP Splitting, etc..)
  • Testing Guide:The previous Guide was greatly enhanced where large portions were re-writen and new material added. This Guide is an important addition to the OWASP catalogue.
  • Owasp .Net Tools: The OWASP .Net tools SAM'SHE and ANSA are in integrated into a new client server architecture which contains a 'built from scratch' client application which 'consumes' the results from the .Net tests. This new tools (called OWASP Tiger) could be the beginning of a standard vulnerability collector.
  • Owasp Website: Multiple sections of OWASP.org website where re-organized (for example the Projects Page), the OWASP newsletter was created and several pages received improvements in their layout

More details on OWASP Autumn Of Code 2006. We are looking forward to the "SpoC 007" (do you get the joke?), which is the OWASP Spring of Code 2007.

Featured Project: XML Gateway Eval Project

This OWASP Project defines an open standard for evaluating XML Security Gateways. This criteria will provide the OWASP community a set of standard evaluation criteria to assess the functionality and quality of XML Security Gateways. The main driver for this project is to reduce the confusion and complexity in assessing the strengths and weaknesses of solutions in this the XML Security space, and enlightening the community as to the utility of XML Security Gateways to deliver a number of valuable security services.

Latest additions to the WIKI

The OWASP Blogs have been integrated in the OWASP web site.
Do not hesitate to start your own Web Application Security blog.

New Pages

Updated pages

Updated chapter pages:

Other pages:


New Documents & Presentations from chapters

For a complete list of chapter presentations see the online table of presentations.

Latest Blog entries

OWASP Community

Application Security News

"Long story short: If you downloaded WordPress 2.1.1 within the past 3-4 days, your files may include a security exploit that was added by a cracker, and you should upgrade all of your files to 2.1.2 immediately."
"This initiative is an effort to improve the security of PHP. However we will not concentrate on problems in the PHP language that might result in insecure PHP applications, but on security vulnerabilities in the PHP core."
SecurityFocus article, "This article examines the dismal state of application-layer logging as observed from the authors’ years of experience in performing source code security analysis on millions of lines of code."
A long paper on web application security threats released by honeynet.org. "This paper focuses on application threats against common web applications. After reviewing the fundamentals of a typical attack, we will go on to describe the trends we have observed and to describe the research methods that we currently use to observe and monitor these threats."

OWASP references in the Media