This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Enterprise Business Application Security Development Issues"

From OWASP
Jump to: navigation, search
m
Line 4: Line 4:
 
== Objective  ==
 
== Objective  ==
  
This document will describe different areas of program vulnerabilities that can be found in source code of Enterprise Business applications and ERP systems.  
+
This document will describe different areas of program vulnerabilities that can be found in the source code of Enterprise Business applications and ERP systems.  
  
 
== Purpose  ==
 
== Purpose  ==
Line 12: Line 12:
 
== Intro  ==
 
== Intro  ==
  
There are many different languages and technologies that can be used to develop business applications and write costom code such as ABAP for SAP, PeopleCode for PeopleSoft,X++ for Microsoft Dynamics, PL/SQL for Oracle EBS, LotusScript for Lotus and much much more. Here, we will try to categorize them into 9 main areas filtered by criticality.  
+
There are many different languages and technologies that can be used to develop business applications and write custom code such as ABAP for SAP, PeopleCode for PeopleSoft, X++ for Microsoft Dynamics, PL/SQL for Oracle EBS, LotusScript for Lotus and much, much more. Here, we will try to categorize them into 9 main areas filtered by criticality.  
  
 
== Main  ==
 
== Main  ==
Line 20: Line 20:
 
== 9 most critical types of issues in source code (EASAD-9-2013) ==
 
== 9 most critical types of issues in source code (EASAD-9-2013) ==
  
<br>1 injections (Code sql os)
+
<br>1 Injections (code, SQL, OS)
<br>2 critical calls (to db to os )
+
<br>2 Critical calls (to DB, to OS)
<br>3 missing or bad access control checks (miss auth checks )
+
<br>3 Missing or bad access control checks (missing auth checks)
<br>4 directory/path traversal (write, read, smbrelay)
+
<br>4 Directory / path traversal (write, read, SMBRelay)
<br>5 Modification of displayed content (XSS stored, linked, js/html injections)
+
<br>5 Modification of displayed content (XSS stored, XSS linked, JS/HTML injections)
<br>6 backdoors (hardcoded credentials)
+
<br>6 Backdoors (hardcoded credentials)
<br>7 covert channels (sockets, http calls, ssrf's, )
+
<br>7 Covert channels (sockets, HTTP calls, SSRFs)
<br>8 information disclose (hardcoded users, passwords, debug information,
+
<br>8 Information disclosure (hardcoded users, passwords, debug information)
<br>9 obsolete statements ( READ TABLE, kernel methods,….)
+
<br>9 Obsolete statements (READ TABLE, kernel methods)
  
  
Line 41: Line 41:
  
 
Alexander Polyakov
 
Alexander Polyakov
Alexander Minojenko
+
Alexander Minozhenko
 
Pavel Kuzmin
 
Pavel Kuzmin

Revision as of 17:13, 16 September 2013

Development Issues

Objective

This document will describe different areas of program vulnerabilities that can be found in the source code of Enterprise Business applications and ERP systems.

Purpose

The purpose of this document is to increase awareness of the developers of Enterprise Business software. Here, we will collect top software vulnerabilities in server side and frontend side that can exist in Business Applications.

Intro

There are many different languages and technologies that can be used to develop business applications and write custom code such as ABAP for SAP, PeopleCode for PeopleSoft, X++ for Microsoft Dynamics, PL/SQL for Oracle EBS, LotusScript for Lotus and much, much more. Here, we will try to categorize them into 9 main areas filtered by criticality.

Main

Crosslinks to CWE, SANS, OWASP and risks with descriptions will be added soon.

9 most critical types of issues in source code (EASAD-9-2013)


1 Injections (code, SQL, OS)
2 Critical calls (to DB, to OS)
3 Missing or bad access control checks (missing auth checks)
4 Directory / path traversal (write, read, SMBRelay)
5 Modification of displayed content (XSS stored, XSS linked, JS/HTML injections)
6 Backdoors (hardcoded credentials)
7 Covert channels (sockets, HTTP calls, SSRFs)
8 Information disclosure (hardcoded users, passwords, debug information)
9 Obsolete statements (READ TABLE, kernel methods)


Links

coming soon


Authors

Alexander Polyakov Alexander Minozhenko Pavel Kuzmin