This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit

OWASP Newsletter 2

Revision as of 14:44, 16 January 2007 by Dinis.cruz (talk | contribs) (Protected "OWASP Newsletter 2": Email Sent, content is static now [edit=sysop:move=sysop])

(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search

Sent to owasp-all mailing list on 16th Jan 2007

OWASP Newsletter #2 – January 8th 2006 to January 15th 2006

Hello, here is another newsletter with tons of links and information about what is happening at OWASP. If you want something to appear in the next version, please add it to OWASP Newsletter 3

Dinis Cruz Chief OWASP Evangelist London, UK


Featured Projects

  • OWASP WebScarab NG Project - Rogan has been very busy on the new version of WebScarab, which is not complete, but is already in a very usable state (I already prefer it to the current version). Rogan needs your help in testing this version and sending in your comments. Quote from OWASP WebScarab NG Project: WebScarab-NG is a complete rewrite of the old WebScarab application, with a special focus on making the application more user-friendly. To this end, WebScarab-NG makes use of the Spring Rich Client Platform to provide the user interface features. By using the Spring Rich Client Platform, WebScarab-NG automatically gains things like default buttons, keyboard shortcuts, support for internationalisation, etc.
  • Category:OWASP CAL9000 Project - This project is a great resource to (amongst other things) understand and exploit XSS. Quote: CAL9000 is a collection of web application security testing tools that complement the feature set of current web proxies and automated scanners. CAL9000 gives you the flexibility and functionality you need for more effective manual testing efforts. Works best when used with Firefox or Internet Explorer.

Featured Story: Two free Java EE filters for CSRF, Reflected XSS, and Adobe XSS

OWASP contributors from Aspect Security have developed two new Java EE filters to protect against common web attacks. Just add a few lines to your web.xml file and enjoy the protection.

CSRF and Reflected XSS Filter for Java EE
This filter adds a random token to forms and URLs that prevent an attacker from executing both CSRF and reflected XSS attacks.
Adobe XSS Filter for Java EE
This filter protects against the recent XSS attacks on PDF files. By using a redirect and an encrypted token, this filter ensures that dangerous attacks are not passed into the Adobe reader plugin.

Featured Story: "Automated Scanner vs. The OWASP Top Ten"

Apart from some shameless marketing plus and its real intention with this paper, WhiteHat Security has published a good paper on the limitations of Web Application Security Scanners capabilities to detect the [OWASP_Top_Ten_Project OWASP Top 10] vulnerabilities (which btw, all vendors claim they do). I actually think that the examples are quite basic, but they are good enough for the argument presented.

You can download this paper from [1]

Quote: "The OWASP Top Ten is a list of the most critical web application security flaws – a list also often used as a minimum standard for web application vulnerability assessment (VA) and compliance. There is an ongoing industry dialog about the possibility of identifying the OWASP Top Ten in a purely automated fashion (scanning). People frequently ask what can and can’t be found using either white box or black box scanners. This is important because a single missed vulnerability, or more accurately exploited vulnerability, can cause an organization significant financial harm. Proper expectations must be set when it comes to the various vulnerability assessment solutions."

Note: I haven't seen any Web App Scannor vendor responses, so if you spot it let me know.

Latest Blog Entries from

Latest additions to the WIKI

New pages

Edited Pages

OWASP Community

Application Security News (from

Jan 10 - Vulnerability Disclosure: The Good, the Bad and the Ugly
More than a decade into the practice of vulnerability disclosure, where do we stand? Are we more secure? Or less?, three good articles: Microsoft: Responsible Vulnerability Disclosure Protects Users , Schneier: Full Disclosure of Security Vulnerabilities a ’Damned Good Idea’, The Vulnerability Disclosure Game: Are We More Secure? and The Chilling Effect

OWASP references in the Media