This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "RIA Security Smackdown"
From OWASP
(New page: Notes from the OWASP Washington chapter meeting where we discussed: * FLEX (Adobe) - development environment for Flash Apps * Flash Studio for movies * Java Applet * Flash 7 * JFX (Sun J...) |
|||
| Line 7: | Line 7: | ||
* Flash 7 | * Flash 7 | ||
* JFX (Sun Java) | * JFX (Sun Java) | ||
| − | * Silverlight (Microsoft) | + | * Silverlight (Microsoft) - .NET Applets that run inside the browser, no privileged code |
| − | * Google Gears | + | * GWT + Google Gears |
* AIR (Adobe - formerly Apollo) - VM that runs Flash, Shockwave movies, ActionScript, JavaScript, FLV | * AIR (Adobe - formerly Apollo) - VM that runs Flash, Shockwave movies, ActionScript, JavaScript, FLV | ||
| + | |||
| + | ==Threat Agents== | ||
| + | |||
| + | * Threat from external attackers | ||
| + | * Threat from malicious developers (sandbox?) | ||
| + | |||
| + | ==Basic Problems== | ||
| + | |||
| + | * Anyone going to this model will have to deal with how to handle sensitive information and sensitive functions on the client. | ||
| + | * Is there sharing of data between users? Download someone else's data into your application? | ||
| + | * How do you separate code from data? Does any data contain anything that might get interpreted? HTML, XML, JSON, Javascript, ??? | ||
| + | * How do you separate one app from another app within the VM (same for DB) | ||
| + | * What happens when you move outside the browser? You lose the protection that the browser sandbox afford. | ||
| + | * Mashups? | ||
| + | * Connections between an RIA and an app running inside the browser (to steal SESSION) | ||
| + | |||
| + | |||
| + | ==References== | ||
| + | |||
| + | AIR - http://www.flashsec.org, http://www.wisec.it.en/Docs/flash_App_testing_Owasp07.swf | ||
| + | |||
==Criteria== | ==Criteria== | ||
| Line 20: | Line 41: | ||
* JavaScript | * JavaScript | ||
* Support for cross-domain policy (crossdomain.xml) | * Support for cross-domain policy (crossdomain.xml) | ||
| + | * Windowing | ||
| + | * Drag and Drop | ||
| + | * | ||
Revision as of 23:11, 23 August 2007
Notes from the OWASP Washington chapter meeting where we discussed:
- FLEX (Adobe) - development environment for Flash Apps
- Flash Studio for movies
- Java Applet
- Flash 7
- JFX (Sun Java)
- Silverlight (Microsoft) - .NET Applets that run inside the browser, no privileged code
- GWT + Google Gears
- AIR (Adobe - formerly Apollo) - VM that runs Flash, Shockwave movies, ActionScript, JavaScript, FLV
Threat Agents
- Threat from external attackers
- Threat from malicious developers (sandbox?)
Basic Problems
- Anyone going to this model will have to deal with how to handle sensitive information and sensitive functions on the client.
- Is there sharing of data between users? Download someone else's data into your application?
- How do you separate code from data? Does any data contain anything that might get interpreted? HTML, XML, JSON, Javascript, ???
- How do you separate one app from another app within the VM (same for DB)
- What happens when you move outside the browser? You lose the protection that the browser sandbox afford.
- Mashups?
- Connections between an RIA and an app running inside the browser (to steal SESSION)
References
AIR - http://www.flashsec.org, http://www.wisec.it.en/Docs/flash_App_testing_Owasp07.swf
Criteria
- Cross platform
- Local File system access
- Network access
- Built-in Database
- HTML
- JavaScript
- Support for cross-domain policy (crossdomain.xml)
- Windowing
- Drag and Drop
Organizations have been rated on the following five characteristics:
- 1. Adobe AIR
- The
- 2.
- The
- 3. Flex
- The
- 4. Flex
- The
- 5. Flex
- The
Scoring
| RIA Framework | 1. Awareness | 2. Requirements | 3. Verification | 4. AppSec Team | 5. Response | Score |
|---|---|---|---|---|---|---|
| Full | Full | Full | Full | Full | 10 | |
| Oracle | Full | None | Partial | None | Full | 5 |
| Foobar | Full | Full | Full | Full | Full | ? |