This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Germany/Projekte/Top 10 fuer Entwickler-2013/Neuerungen"
(Note that the Major Relaese Cycle depends on the Top 10 Project and its German translati) |
|||
Line 13: | Line 13: | ||
}} | }} | ||
{{Top_10:SubsectionTableBeginTemplate|type=main}}{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=freetext|position=firstWhole|title={{Top_10:LanguageFile|text=whatChangedFrom2010to2013|year=2013|language=de}}|width=100%|year=2013|language=de}} | {{Top_10:SubsectionTableBeginTemplate|type=main}}{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=freetext|position=firstWhole|title={{Top_10:LanguageFile|text=whatChangedFrom2010to2013|year=2013|language=de}}|width=100%|year=2013|language=de}} | ||
− | + | The threat landscape for applications security constantly changes. Key factors in this evolution are advances made by attackers, the release of new technologies with new weaknesses as well as more built in defenses, and the deployment of increasingly complex systems. To keep pace, we periodically update the OWASP Top 10. In this 2013 release, we made the following changes: | |
<ol> | <ol> | ||
− | + | <li>Broken Authentication and Session Management moved up in prevalence based on our data set,. Probably because this area is being looked at harder, not because issues are actually more prevalent. This caused Risks A2 and A3 to switch places.</li> | |
− | <li> | + | <li>Cross-Site Request Forgery (CSRF) moved down in prevalence based on our data set from 2010-A5 to 2013-A8. We believe this is because CSRF has been in the OWASP Top 10 for 6 years, and organizations and framework developers have focused on it enough to significantly reduce the number of CSRF vulnerabilities in real world applications.</li> |
− | + | <li>We broadened Failure to Restrict URL Access from the 2010 OWASP Top 10 to be more inclusive: | |
− | <li> | ||
− | |||
− | <li> | ||
<p style="padding-left: 2em; text-indent: -2em;"> | <p style="padding-left: 2em; text-indent: -2em;"> | ||
− | + 2010-A8: | + | + 2010-A8: Failure to Restrict URL Access is now <u>2013-A7: Missing Function Level Access Control</u> – to cover all of function level access control. There are many ways to specify which function is being accessed, not just the URL.</p></li> |
− | + | <li>We merged and broadened 2010-A7 & 2010-A9 to CREATE: <u>2013-A6: Sensitive Data Exposure</u>: | |
− | <li>2010-A7 | ||
<p style="padding-left: 2em; text-indent: -2em;"> | <p style="padding-left: 2em; text-indent: -2em;"> | ||
− | - | + | - This new category was created by merging 2010-A7 – Insecure Cryptographic Storage & 2010-A9 - Insufficient Transport Layer Protection, plus adding browser side sensitive data risks as well. This new category covers sensitive data protection (other than access control which is covered by 2013-A4 and 2013-A7) from the moment sensitive data is provided by the user, sent to and stored within the application, and then sent back to the browser again.</p></li> |
− | + | <li>We added: <u>2013-A9: Using Components with Known Vulnerabilities</u>: | |
− | <li> | ||
<p style="padding-left: 2em; text-indent: -2em;"> | <p style="padding-left: 2em; text-indent: -2em;"> | ||
− | + | + | + This issue was mentioned as part of 2010-A6 – Security Misconfiguration, but now has a category of its own as the growth and depth of component based development has significantly increased the risk of using components with known vulnerabilities.</p></li> |
</ol> | </ol> | ||
{{Top_10:SubsectionTableEndTemplate}} | {{Top_10:SubsectionTableEndTemplate}} | ||
Line 37: | Line 32: | ||
{| style="width: 99%; align:center; text-align:center; border: 2px solid #4d953d; background-color:#F2F2F2; padding=2;" | {| style="width: 99%; align:center; text-align:center; border: 2px solid #4d953d; background-color:#F2F2F2; padding=2;" | ||
|- style="background-color: #4d953d; color: #FFFFFF;" | |- style="background-color: #4d953d; color: #FFFFFF;" | ||
− | ! OWASP Top 10 - 2010 ( | + | ! OWASP Top 10 - 2010 (Previous Version) !! OWASP Top 10 - 2013 (Current Version) |
|- style="background-color: #FFFFFF;" | |- style="background-color: #FFFFFF;" | ||
− | | [[Top_10_2010-A1 | A1- | + | | [[Top_10_2010-A1 | A1-Injection]] |
| [[{{Top_10:LanguageFile|text=documentRootTop10|year=2013|language=de}}-A1-{{Top_10_2010:ByTheNumbers|1|language=de|year=2013}}|A1-{{Top_10_2010:ByTheNumbers|1|language=de|year=2013}}]] | | [[{{Top_10:LanguageFile|text=documentRootTop10|year=2013|language=de}}-A1-{{Top_10_2010:ByTheNumbers|1|language=de|year=2013}}|A1-{{Top_10_2010:ByTheNumbers|1|language=de|year=2013}}]] | ||
|- style="background-color: #FFFFFF;" | |- style="background-color: #FFFFFF;" | ||
− | | [[Top_10_2010-A3 | A3- | + | | [[Top_10_2010-A3 | A3-Broken Authentication and Session Management]] |
| [[{{Top_10:LanguageFile|text=documentRootTop10|year=2013|language=de}}-A2-{{Top_10_2010:ByTheNumbers|2|language=de|year=2013}}|A2-{{Top_10_2010:ByTheNumbers|2|language=de|year=2013}}]] | | [[{{Top_10:LanguageFile|text=documentRootTop10|year=2013|language=de}}-A2-{{Top_10_2010:ByTheNumbers|2|language=de|year=2013}}|A2-{{Top_10_2010:ByTheNumbers|2|language=de|year=2013}}]] | ||
|- style="background-color: #FFFFFF;" | |- style="background-color: #FFFFFF;" | ||
− | | [[Top_10_2010-A2 | A2- | + | | [[Top_10_2010-A2 | A2-Cross Site Scripting (XSS)]] |
| [[{{Top_10:LanguageFile|text=documentRootTop10|year=2013|language=de}}-A3-{{Top_10_2010:ByTheNumbers|3|language=de|year=2013}}|A3-{{Top_10_2010:ByTheNumbers|3|language=de|year=2013}}]] | | [[{{Top_10:LanguageFile|text=documentRootTop10|year=2013|language=de}}-A3-{{Top_10_2010:ByTheNumbers|3|language=de|year=2013}}|A3-{{Top_10_2010:ByTheNumbers|3|language=de|year=2013}}]] | ||
|- style="background-color: #FFFFFF;" | |- style="background-color: #FFFFFF;" | ||
− | | [[Top_10_2010-A4 | A4- | + | | [[Top_10_2010-A4 | A4-Insecure Direct Object Reference]] |
| [[{{Top_10:LanguageFile|text=documentRootTop10|year=2013|language=de}}-A4-{{Top_10_2010:ByTheNumbers|4|language=de|year=2013}}|A4-{{Top_10_2010:ByTheNumbers|4|language=de|year=2013}}]] | | [[{{Top_10:LanguageFile|text=documentRootTop10|year=2013|language=de}}-A4-{{Top_10_2010:ByTheNumbers|4|language=de|year=2013}}|A4-{{Top_10_2010:ByTheNumbers|4|language=de|year=2013}}]] | ||
|- style="background-color: #FFFFFF;" | |- style="background-color: #FFFFFF;" | ||
− | | [[Top_10_2010-A6 | A6- | + | | [[Top_10_2010-A6 | A6-Security Misconfiguration]] |
| [[{{Top_10:LanguageFile|text=documentRootTop10|year=2013|language=de}}-A5-{{Top_10_2010:ByTheNumbers|5|language=de|year=2013}}|A5-{{Top_10_2010:ByTheNumbers|5|language=de|year=2013}}]] | | [[{{Top_10:LanguageFile|text=documentRootTop10|year=2013|language=de}}-A5-{{Top_10_2010:ByTheNumbers|5|language=de|year=2013}}|A5-{{Top_10_2010:ByTheNumbers|5|language=de|year=2013}}]] | ||
|- style="background-color: #D7D6C0;" | |- style="background-color: #D7D6C0;" | ||
− | | [[Top_10_2010-A7 | A7- | + | | [[Top_10_2010-A7 | A7-Insecure Cryptographic Storage - Merged with A9 -->]] |
| [[{{Top_10:LanguageFile|text=documentRootTop10|year=2013|language=de}}-A6-{{Top_10_2010:ByTheNumbers|6|language=de|year=2013}}|A6-{{Top_10_2010:ByTheNumbers|6|language=de|year=2013}}]] | | [[{{Top_10:LanguageFile|text=documentRootTop10|year=2013|language=de}}-A6-{{Top_10_2010:ByTheNumbers|6|language=de|year=2013}}|A6-{{Top_10_2010:ByTheNumbers|6|language=de|year=2013}}]] | ||
|- style="background-color: #D7D6C0;" | |- style="background-color: #D7D6C0;" | ||
− | | [[Top_10_2010-A8 | A8- | + | | [[Top_10_2010-A8 | A8-Failure to Restrict URL Access - Broadened into -->]] |
| [[{{Top_10:LanguageFile|text=documentRootTop10|year=2013|language=de}}-A7-{{Top_10_2010:ByTheNumbers|7|language=de|year=2013}}|A7-{{Top_10_2010:ByTheNumbers|7|language=de|year=2013}}]] | | [[{{Top_10:LanguageFile|text=documentRootTop10|year=2013|language=de}}-A7-{{Top_10_2010:ByTheNumbers|7|language=de|year=2013}}|A7-{{Top_10_2010:ByTheNumbers|7|language=de|year=2013}}]] | ||
|- style="background-color: #FFFFFF;" | |- style="background-color: #FFFFFF;" | ||
− | | [[Top_10_2007-A5 | A5- | + | | [[Top_10_2007-A5 | A5-Cross Site Request Forgery (CSRF)]] |
| [[{{Top_10:LanguageFile|text=documentRootTop10|year=2013|language=de}}-A8-{{Top_10_2010:ByTheNumbers|8|language=de|year=2013}}|A8-{{Top_10_2010:ByTheNumbers|8|language=de|year=2013}}]] | | [[{{Top_10:LanguageFile|text=documentRootTop10|year=2013|language=de}}-A8-{{Top_10_2010:ByTheNumbers|8|language=de|year=2013}}|A8-{{Top_10_2010:ByTheNumbers|8|language=de|year=2013}}]] | ||
|- style="background-color: #D7D6C0;" | |- style="background-color: #D7D6C0;" | ||
− | | [[Top_10_2010-A6 | < | + | | [[Top_10_2010-A6 | <buried in A6: Security Misconfiguration>]] |
| [[{{Top_10:LanguageFile|text=documentRootTop10|year=2013|language=de}}-A9-{{Top_10_2010:ByTheNumbers|9|language=de|year=2013}}|A9-{{Top_10_2010:ByTheNumbers|9|language=de|year=2013}}]] | | [[{{Top_10:LanguageFile|text=documentRootTop10|year=2013|language=de}}-A9-{{Top_10_2010:ByTheNumbers|9|language=de|year=2013}}|A9-{{Top_10_2010:ByTheNumbers|9|language=de|year=2013}}]] | ||
|- style="background-color: #FFFFFF;" | |- style="background-color: #FFFFFF;" | ||
− | | [[Top_10_2010-A10 | A10- | + | | [[Top_10_2010-A10 | A10-Unvalidated Redirects and Forwards]] |
| [[{{Top_10:LanguageFile|text=documentRootTop10|year=2013|language=de}}-A10-{{Top_10_2010:ByTheNumbers|10|language=de|year=2013}}|A10-{{Top_10_2010:ByTheNumbers|10|language=de|year=2013}}]] | | [[{{Top_10:LanguageFile|text=documentRootTop10|year=2013|language=de}}-A10-{{Top_10_2010:ByTheNumbers|10|language=de|year=2013}}|A10-{{Top_10_2010:ByTheNumbers|10|language=de|year=2013}}]] | ||
|- style="background-color: #E6B9B8;" | |- style="background-color: #E6B9B8;" | ||
− | | [[Top_10_2010-A9 | A9- | + | | [[Top_10_2010-A9 | A9-Insufficient Transport Layer Protection]] |
− | | | + | | Merged with [[Top_10_2010-A7 | 2010-A7]] into [[{{Top_10:LanguageFile|text=documentRootTop10|year=2013|language=de}}-A6-{{Top_10_2010:ByTheNumbers|6|language=de|year=2013}}|2013-A6]] |
|} | |} | ||
</center> | </center> |
Revision as of 16:12, 25 February 2016
Was hat sich von Version 2010 zu 2013 verändert?
The threat landscape for applications security constantly changes. Key factors in this evolution are advances made by attackers, the release of new technologies with new weaknesses as well as more built in defenses, and the deployment of increasingly complex systems. To keep pace, we periodically update the OWASP Top 10. In this 2013 release, we made the following changes:
|