This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Enterprise Business Application Security Development Issues"
m |
|||
Line 4: | Line 4: | ||
== Objective == | == Objective == | ||
− | This document will describe different areas of program vulnerabilities that can be found in source code of Enterprise Business applications and ERP systems. | + | This document will describe different areas of program vulnerabilities that can be found in the source code of Enterprise Business applications and ERP systems. |
== Purpose == | == Purpose == | ||
Line 12: | Line 12: | ||
== Intro == | == Intro == | ||
− | There are many different languages and technologies that can be used to develop business applications and write | + | There are many different languages and technologies that can be used to develop business applications and write custom code such as ABAP for SAP, PeopleCode for PeopleSoft, X++ for Microsoft Dynamics, PL/SQL for Oracle EBS, LotusScript for Lotus and much, much more. Here, we will try to categorize them into 9 main areas filtered by criticality. |
== Main == | == Main == | ||
Line 20: | Line 20: | ||
== 9 most critical types of issues in source code (EASAD-9-2013) == | == 9 most critical types of issues in source code (EASAD-9-2013) == | ||
− | <br>1 | + | <br>1 Injections (code, SQL, OS) |
− | <br>2 | + | <br>2 Critical calls (to DB, to OS) |
− | <br>3 | + | <br>3 Missing or bad access control checks (missing auth checks) |
− | <br>4 | + | <br>4 Directory / path traversal (write, read, SMBRelay) |
− | <br>5 Modification of displayed content (XSS stored, linked, | + | <br>5 Modification of displayed content (XSS stored, XSS linked, JS/HTML injections) |
− | <br>6 | + | <br>6 Backdoors (hardcoded credentials) |
− | <br>7 | + | <br>7 Covert channels (sockets, HTTP calls, SSRFs) |
− | <br>8 | + | <br>8 Information disclosure (hardcoded users, passwords, debug information) |
− | <br>9 | + | <br>9 Obsolete statements (READ TABLE, kernel methods) |
Line 41: | Line 41: | ||
Alexander Polyakov | Alexander Polyakov | ||
− | Alexander | + | Alexander Minozhenko |
Pavel Kuzmin | Pavel Kuzmin |
Revision as of 17:13, 16 September 2013
Development Issues
Objective
This document will describe different areas of program vulnerabilities that can be found in the source code of Enterprise Business applications and ERP systems.
Purpose
The purpose of this document is to increase awareness of the developers of Enterprise Business software. Here, we will collect top software vulnerabilities in server side and frontend side that can exist in Business Applications.
Intro
There are many different languages and technologies that can be used to develop business applications and write custom code such as ABAP for SAP, PeopleCode for PeopleSoft, X++ for Microsoft Dynamics, PL/SQL for Oracle EBS, LotusScript for Lotus and much, much more. Here, we will try to categorize them into 9 main areas filtered by criticality.
Main
Crosslinks to CWE, SANS, OWASP and risks with descriptions will be added soon.
9 most critical types of issues in source code (EASAD-9-2013)
1 Injections (code, SQL, OS)
2 Critical calls (to DB, to OS)
3 Missing or bad access control checks (missing auth checks)
4 Directory / path traversal (write, read, SMBRelay)
5 Modification of displayed content (XSS stored, XSS linked, JS/HTML injections)
6 Backdoors (hardcoded credentials)
7 Covert channels (sockets, HTTP calls, SSRFs)
8 Information disclosure (hardcoded users, passwords, debug information)
9 Obsolete statements (READ TABLE, kernel methods)
Links
coming soon
Authors
Alexander Polyakov Alexander Minozhenko Pavel Kuzmin