This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Top 10-2017 Details About Risk Factors"

From OWASP
Jump to: navigation, search
(Prepare OWASP Top 10-2017 Release (Risk Table))
(Updated table, editorial changes)
Line 9: Line 9:
 
<!--- +RF Details About Risk Factors --->
 
<!--- +RF Details About Risk Factors --->
 
{{Top_10:SubsectionTableBeginTemplate|type=main}}{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=freetext|position=firstWhole|title=Top 10 Risk Factor Summary|width=100%|year=2017|language=en}}
 
{{Top_10:SubsectionTableBeginTemplate|type=main}}{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=freetext|position=firstWhole|title=Top 10 Risk Factor Summary|width=100%|year=2017|language=en}}
The following table presents a summary of the 2017 Top 10 Application Security Risks, and the risk factors we have assigned to each risk. These factors were determined based on the available statistics and the experience of the OWASP Top 10 team. To understand these risks for a particular application or organization, you must consider your own specific threat agents and business impacts. Even severe software weaknesses may not present a serious risk if there are no threat agents in a position to perform the necessary attack or the business impact is negligible for the assets involved.
+
The following table presents a summary of the 2017 Top 10 Application Security Risks, and the risk factors we have assigned to each risk. These factors were determined based on the available statistics and the experience of the OWASP Top 10 team. To understand these risks for a particular application or organization, <u>you must consider your own specific threat agents and business impacts</u>. Even severe software weaknesses may not present a serious risk if there are no threat agents in a position to perform the necessary attack or the business impact is negligible for the assets involved.
 
<center>
 
<center>
<table style="align:center; border-collapse: collapse; text-align:center; margin: 0px 5px 0px 5px; border: 3px solid #444444;  
+
<table style="align:center; border-collapse: collapse; text-align:center; margin: 0px 5px 0px 5px; border: 3px solid #444444; background-color: {{Top 10:BackgroundColor|year=2017 }}; padding=2;">
 
 
  background-color: {{Top 10:BackgroundColor|year=2017 }};
 
padding=2;">
 
  
 
<tr style="background-color: {{Top 10:BorderColor|year=2017}}; height: 2em; font-size: 130%; color: #FFFFFF;  text-shadow: 2px 2px 8px #444444; ">
 
<tr style="background-color: {{Top 10:BorderColor|year=2017}}; height: 2em; font-size: 130%; color: #FFFFFF;  text-shadow: 2px 2px 8px #444444; ">
 
     <th style="border: 3px solid #444444;">{{Top_10:LanguageFile|text=risk|language=en}}</th>
 
     <th style="border: 3px solid #444444;">{{Top_10:LanguageFile|text=risk|language=en}}</th>
 
     <th style="border: 3px solid #444444;">{{Top_10:LanguageFile|text=threatAgents|language=en}}</th>
 
     <th style="border: 3px solid #444444;">{{Top_10:LanguageFile|text=threatAgents|language=en}}</th>
     <th style="border: 3px solid #444444;">{{Top_10:LanguageFile|text=attackVectors|language=en}}</th>
+
     <th style="border: 3px solid #444444;">{{Top_10:LanguageFile|text=attackVectors|language=en}}<div style="font-size: 80%;">({{Top_10:LanguageFile|text=exploitability|language=en}})</div></th>
     <th style="border: 3px solid #444444;">{{Top_10:LanguageFile|text=securityWeakness|language=en}}<div style="font-size: 60%;">({{Top_10:LanguageFile|text=prevalence|language=en}})</div></th>
+
     <th style="border: 3px solid #444444;">{{Top_10:LanguageFile|text=securityWeakness|language=en}}<div style="font-size: 80%;">({{Top_10:LanguageFile|text=prevalence|language=en}})</div></th>
     <th style="border: 3px solid #444444;">{{Top_10:LanguageFile|text=securityWeakness|language=en}}<div style="font-size: 60%;">({{Top_10:LanguageFile|text=detectability|language=en}})</div></th>
+
     <th style="border: 3px solid #444444;">{{Top_10:LanguageFile|text=securityWeakness|language=en}}<div style="font-size: 80%;">({{Top_10:LanguageFile|text=detectability|language=en}})</div></th>
     <th style="border: 3px solid #444444;">{{Top_10:LanguageFile|text=technicalImpacts|language=en}}</th>
+
     <th style="border: 3px solid #444444;">{{Top_10:LanguageFile|text=impacts|language=en}}<div style="font-size: 80%;">({{Top_10:LanguageFile|text=technical|language=en}})</div></th>
     <th style="border: 3px solid #444444;">{{Top_10:LanguageFile|text=businessImpacts|language=en}}</th>
+
     <th style="border: 3px solid #444444;">{{Top_10:LanguageFile|text=impacts|language=en}}<div style="font-size: 80%;">({{Top_10:LanguageFile|text=business|language=en}})</div></th>
 
     <th style="border: 3px solid #444444;">{{Top_10:LanguageFile|text=score|language=en}}</th>
 
     <th style="border: 3px solid #444444;">{{Top_10:LanguageFile|text=score|language=en}}</th>
 
</tr>
 
</tr>
<tr><td style="border: 3px solid #444444;"><b><u>[[{{Top_10:LanguageFile|text=documentRootTop10New|year=2017|language=en}}_A1-{{Top_10_2010:ByTheNumbers|1|language=en|year=2017}}|A1-{{Top_10_2010:ByTheNumbers|1|language=en|year=2017}}]]</u></b></td>
+
<tr><td style="border: 3px solid #444444;"><b><u>[[{{Top_10:LanguageFile|text=documentRootTop10New|language=en|year=2017 }}_A1-{{Top_10_2010:ByTheNumbers|1|year=2017|language=en}} | A1:2017-{{Top_10_2010:ByTheNumbers|1|year=2017|language=en}}]]</u></b></td>
 
<td style="border: 3px solid #444444;"><b>{{Top_10:LanguageFile|text=appSpecific|language=en}}</b></td>
 
<td style="border: 3px solid #444444;"><b>{{Top_10:LanguageFile|text=appSpecific|language=en}}</b></td>
 
   {{Top_10-2017:SummaryTableTemplate|type=valueOnly|exploitability=3|prevalence=2|detectability=3|impact=3|language=en|year=2017}}
 
   {{Top_10-2017:SummaryTableTemplate|type=valueOnly|exploitability=3|prevalence=2|detectability=3|impact=3|language=en|year=2017}}
Line 32: Line 29:
 
<td style="border: 3px solid #444444"><b>8.0</b></td></tr>
 
<td style="border: 3px solid #444444"><b>8.0</b></td></tr>
  
<tr><td style="border: 3px solid #444444;"><b><u>[[{{Top_10:LanguageFile|text=documentRootTop10New|year=2017|language=en}}_A2-{{Top_10_2010:ByTheNumbers|2|language=en|year=2017}}|A2-{{Top_10:LanguageFile|text=authentication|year=2017|language=en}}]]</u></b></td>
+
<tr><td style="border: 3px solid #444444;"><b><u>[[{{Top_10:LanguageFile|text=documentRootTop10New|language=en|year=2017 }}_A2-{{Top_10_2010:ByTheNumbers|2|year=2017|language=en}} | A2:2017-{{Top_10_2010:ByTheNumbers|2|year=2017|language=en}}]]</u></b></td>
 
<td style="border: 3px solid #444444;"><b>{{Top_10:LanguageFile|text=appSpecific|language=en}}</b></td>
 
<td style="border: 3px solid #444444;"><b>{{Top_10:LanguageFile|text=appSpecific|language=en}}</b></td>
 
   {{Top_10-2017:SummaryTableTemplate|type=valueOnly|exploitability=3|prevalence=2|detectability=2|impact=3|language=en|year=2017}}
 
   {{Top_10-2017:SummaryTableTemplate|type=valueOnly|exploitability=3|prevalence=2|detectability=2|impact=3|language=en|year=2017}}
Line 39: Line 36:
  
  
<tr><td style="border: 3px solid #444444;"><b><u>[[{{Top_10:LanguageFile|text=documentRootTop10New|year=2017|language=en}}_A3-{{Top_10_2010:ByTheNumbers|3|language=en|year=2017}}|A3-{{Top_10:LanguageFile|text=xssShort|year=2017|language=en}}]]</u></b></td>
+
<tr><td style="border: 3px solid #444444;"><b><u>[[{{Top_10:LanguageFile|text=documentRootTop10New|language=en|year=2017 }}_A3-{{Top_10_2010:ByTheNumbers|3|year=2017|language=en}} | A3:2017-{{Top_10_2010:ByTheNumbers|3|year=2017|language=en}}]]</u></b></td>
 
<td style="border: 3px solid #444444;"><b>{{Top_10:LanguageFile|text=appSpecific|language=en}}</b></td>
 
<td style="border: 3px solid #444444;"><b>{{Top_10:LanguageFile|text=appSpecific|language=en}}</b></td>
 
   {{Top_10-2017:SummaryTableTemplate|type=valueOnly|exploitability=2|prevalence=3|detectability=2|impact=3|language=en|year=2017}}
 
   {{Top_10-2017:SummaryTableTemplate|type=valueOnly|exploitability=2|prevalence=3|detectability=2|impact=3|language=en|year=2017}}
Line 45: Line 42:
 
<td style="border: 3px solid #444444"><b>7.0</b></td></tr>
 
<td style="border: 3px solid #444444"><b>7.0</b></td></tr>
  
<tr><td style="border: 3px solid #444444;"><b><u>[[{{Top_10:LanguageFile|text=documentRootTop10New|year=2017|language=en}}_A4-{{Top_10_2010:ByTheNumbers|4|language=en|year=2017}}|A4-{{Top_10:LanguageFile|text=accessCtrl|year=2017|language=en}}]]</u></b></td>
+
<tr><td style="border: 3px solid #444444;"><b><u>[[{{Top_10:LanguageFile|text=documentRootTop10New|language=en|year=2017 }}_A4-{{Top_10_2010:ByTheNumbers|4|year=2017|language=en}} | A4:2017-{{Top_10_2010:ByTheNumbers|4|year=2017|language=en}}]]</u></b></td>
 
<td style="border: 3px solid #444444;"><b>{{Top_10:LanguageFile|text=appSpecific|language=en}}</b></td>
 
<td style="border: 3px solid #444444;"><b>{{Top_10:LanguageFile|text=appSpecific|language=en}}</b></td>
 
   {{Top_10-2017:SummaryTableTemplate|type=valueOnly|exploitability=2|prevalence=2|detectability=3|impact=3|language=en|year=2017}}
 
   {{Top_10-2017:SummaryTableTemplate|type=valueOnly|exploitability=2|prevalence=2|detectability=3|impact=3|language=en|year=2017}}
Line 51: Line 48:
 
<td style="border: 3px solid #444444"><b>7.0</b></td></tr>
 
<td style="border: 3px solid #444444"><b>7.0</b></td></tr>
  
<tr><td style="border: 3px solid #444444;"><b><u>[[{{Top_10:LanguageFile|text=documentRootTop10New|year=2017|language=en}}_A5-{{Top_10_2010:ByTheNumbers|5|language=en|year=2017}}|A5-{{Top_10:LanguageFile|text=misconfig|year=2017|language=en}}]]</u></b></td>
+
<tr><td style="border: 3px solid #444444;"><b><u>[[{{Top_10:LanguageFile|text=documentRootTop10New|language=en|year=2017 }}_A5-{{Top_10_2010:ByTheNumbers|5|year=2017|language=en}} | A5:2017-{{Top_10_2010:ByTheNumbers|5|year=2017|language=en}}]]</u></b></td>
 
<td style="border: 3px solid #444444;"><b>{{Top_10:LanguageFile|text=appSpecific|language=en}}</b></td>
 
<td style="border: 3px solid #444444;"><b>{{Top_10:LanguageFile|text=appSpecific|language=en}}</b></td>
 
   {{Top_10-2017:SummaryTableTemplate|type=valueOnly|exploitability=2|prevalence=2|detectability=2|impact=3|language=en|year=2017}}
 
   {{Top_10-2017:SummaryTableTemplate|type=valueOnly|exploitability=2|prevalence=2|detectability=2|impact=3|language=en|year=2017}}
Line 57: Line 54:
 
<td style="border: 3px solid #444444"><b>6.0</b></td></tr>
 
<td style="border: 3px solid #444444"><b>6.0</b></td></tr>
  
<tr><td style="border: 3px solid #444444;"><b><u>[[{{Top_10:LanguageFile|text=documentRootTop10New|year=2017|language=en}}_A6-{{Top_10_2010:ByTheNumbers|6|language=en|year=2017}}|A6-{{Top_10:LanguageFile|text=sensData|year=2017|language=en}}]]</u></b></td>
+
<tr><td style="border: 3px solid #444444;"><b><u>[[{{Top_10:LanguageFile|text=documentRootTop10New|language=en|year=2017 }}_A6-{{Top_10_2010:ByTheNumbers|6|year=2017|language=en}} | A6:2017-{{Top_10_2010:ByTheNumbers|6|year=2017|language=en}}]]</u></b></td>
 
<td style="border: 3px solid #444444;"><b>{{Top_10:LanguageFile|text=appSpecific|language=en}}</b></td>
 
<td style="border: 3px solid #444444;"><b>{{Top_10:LanguageFile|text=appSpecific|language=en}}</b></td>
 
   {{Top_10-2017:SummaryTableTemplate|type=valueOnly|exploitability=3|prevalence=3|detectability=3|impact=2|language=en|year=2017}}
 
   {{Top_10-2017:SummaryTableTemplate|type=valueOnly|exploitability=3|prevalence=3|detectability=3|impact=2|language=en|year=2017}}
Line 63: Line 60:
 
<td style="border: 3px solid #444444"><b>6.0</b></td></tr>
 
<td style="border: 3px solid #444444"><b>6.0</b></td></tr>
  
<tr><td style="border: 3px solid #444444;"><b><u>[[{{Top_10:LanguageFile|text=documentRootTop10New|year=2017|language=en}}_A7-{{Top_10_2010:ByTheNumbers|7|language=en|year=2017}}|A7-{{Top_10:LanguageFile|text=attackProt|year=2017|language=en}}]]</u></b></td>
+
<tr><td style="border: 3px solid #444444;"><b><u>[[{{Top_10:LanguageFile|text=documentRootTop10New|language=en|year=2017 }}_A7-{{Top_10_2010:ByTheNumbers|7|year=2017|language=en}} | A7:2017-{{Top_10_2010:ByTheNumbers|7|year=2017|language=en}}]]</u></b></td>
 
<td style="border: 3px solid #444444;"><b>{{Top_10:LanguageFile|text=appSpecific|language=en}}</b></td>
 
<td style="border: 3px solid #444444;"><b>{{Top_10:LanguageFile|text=appSpecific|language=en}}</b></td>
 
   {{Top_10-2017:SummaryTableTemplate|type=valueOnly|exploitability=3|prevalence=3|detectability=3|impact=2|language=en|year=2017}}
 
   {{Top_10-2017:SummaryTableTemplate|type=valueOnly|exploitability=3|prevalence=3|detectability=3|impact=2|language=en|year=2017}}
Line 69: Line 66:
 
<td style="border: 3px solid #444444"><b>6.0</b></td></tr>
 
<td style="border: 3px solid #444444"><b>6.0</b></td></tr>
  
<tr><td style="border: 3px solid #444444;"><b><u>[[{{Top_10:LanguageFile|text=documentRootTop10New|year=2017|language=en}}_A8-{{Top_10_2010:ByTheNumbers|8|language=en|year=2017}}|A8-{{Top_10:LanguageFile|text=csrfShort|year=2017|language=en}}]]</u></b></td>
+
<tr><td style="border: 3px solid #444444;"><b><u>[[{{Top_10:LanguageFile|text=documentRootTop10New|language=en|year=2017 }}_A8-{{Top_10_2010:ByTheNumbers|8|year=2017|language=en}} | A8:2017-{{Top_10_2010:ByTheNumbers|8|year=2017|language=en}}]]</u></b></td>
 
<td style="border: 3px solid #444444;"><b>{{Top_10:LanguageFile|text=appSpecific|language=en}}</b></td>
 
<td style="border: 3px solid #444444;"><b>{{Top_10:LanguageFile|text=appSpecific|language=en}}</b></td>
 
   {{Top_10-2017:SummaryTableTemplate|type=valueOnly|exploitability=1|prevalence=2|detectability=2|impact=3|language=en|year=2017}}
 
   {{Top_10-2017:SummaryTableTemplate|type=valueOnly|exploitability=1|prevalence=2|detectability=2|impact=3|language=en|year=2017}}
Line 75: Line 72:
 
<td style="border: 3px solid #444444"><b>5.0</b></td></tr>
 
<td style="border: 3px solid #444444"><b>5.0</b></td></tr>
  
<tr><td style="border: 3px solid #444444;"><b><u>[[{{Top_10:LanguageFile|text=documentRootTop10New|year=2017|language=en}}_A9-{{Top_10_2010:ByTheNumbers|9|language=en|year=2017}}|A9-{{Top_10:LanguageFile|text=vulnComponents|year=2017|language=en}}]]</u></b></td>
+
<tr><td style="border: 3px solid #444444;"><b><u>[[{{Top_10:LanguageFile|text=documentRootTop10New|language=en|year=2017 }}_A9-{{Top_10_2010:ByTheNumbers|9|year=2017|language=en}} | A9:2017-{{Top_10_2010:ByTheNumbers|9|year=2017|language=en}}]]</u></b></td>
 
<td style="border: 3px solid #444444;"><b>{{Top_10:LanguageFile|text=appSpecific|language=en}}</b></td>
 
<td style="border: 3px solid #444444;"><b>{{Top_10:LanguageFile|text=appSpecific|language=en}}</b></td>
 
   {{Top_10-2017:SummaryTableTemplate|type=valueOnly|exploitability=2|prevalence=3|detectability=2|impact=2|language=en|year=2017}}
 
   {{Top_10-2017:SummaryTableTemplate|type=valueOnly|exploitability=2|prevalence=3|detectability=2|impact=2|language=en|year=2017}}
Line 81: Line 78:
 
<td style="border: 3px solid #444444"><b>4.7</b></td></tr>
 
<td style="border: 3px solid #444444"><b>4.7</b></td></tr>
  
<tr><td style="border: 3px solid #444444;"><b><u>[[{{Top_10:LanguageFile|text=documentRootTop10New|year=2017|language=en}}_A10-{{Top_10_2010:ByTheNumbers|10|language=en|year=2017}}|A10-{{Top_10:LanguageFile|text=ApiProt|year=2017|language=en}}]]</u></b></td>
+
<tr><td style="border: 3px solid #444444;"><b><u>[[{{Top_10:LanguageFile|text=documentRootTop10New|language=en|year=2017 }}_A10-{{Top_10_2010:ByTheNumbers|10|year=2017|language=en}} | A10:2017-{{Top_10_2010:ByTheNumbers|10|year=2017|language=en}}]]</u></b></td>
 
<td style="border: 3px solid #444444;"><b>{{Top_10:LanguageFile|text=appSpecific|language=en}}</b></td>
 
<td style="border: 3px solid #444444;"><b>{{Top_10:LanguageFile|text=appSpecific|language=en}}</b></td>
 
   {{Top_10-2017:SummaryTableTemplate|type=valueOnly|exploitability=2|prevalence=3|detectability=1|impact=2|language=en|year=2017}}
 
   {{Top_10-2017:SummaryTableTemplate|type=valueOnly|exploitability=2|prevalence=3|detectability=1|impact=2|language=en|year=2017}}

Revision as of 18:14, 1 January 2018

← Note About Risks
2017 Table of Contents

PDF version

Methodology and Data →
Top 10 Risk Factor Summary

The following table presents a summary of the 2017 Top 10 Application Security Risks, and the risk factors we have assigned to each risk. These factors were determined based on the available statistics and the experience of the OWASP Top 10 team. To understand these risks for a particular application or organization, you must consider your own specific threat agents and business impacts. Even severe software weaknesses may not present a serious risk if there are no threat agents in a position to perform the necessary attack or the business impact is negligible for the assets involved.


Risk Threat Agents Attack Vectors
(Exploitability)
Security Weakness
(Prevalence)
Security Weakness
(Detectability)
Impacts
(Technical)
Impacts
(Business)
Score
A1:2017-Injection App Specific EASY: 3 COMMON: 2 EASY: 3 SEVERE: 3 App Specific 8.0
A2:2017-Broken Authentication App Specific EASY: 3 COMMON: 2 AVERAGE: 2 SEVERE: 3 App Specific 7.0
A3:2017-Sensitive Data Exposure App Specific AVERAGE: 2 WIDESPREAD: 3 AVERAGE: 2 SEVERE: 3 App Specific 7.0
A4:2017-XML External Entities (XXE) App Specific AVERAGE: 2 COMMON: 2 EASY: 3 SEVERE: 3 App Specific 7.0
A5:2017-Broken Access Control App Specific AVERAGE: 2 COMMON: 2 AVERAGE: 2 SEVERE: 3 App Specific 6.0
A6:2017-Security Misconfiguration App Specific EASY: 3 WIDESPREAD: 3 EASY: 3 MODERATE: 2 App Specific 6.0
A7:2017-Cross-Site Scripting (XSS) App Specific EASY: 3 WIDESPREAD: 3 EASY: 3 MODERATE: 2 App Specific 6.0
A8:2017-Insecure Deserialization App Specific DIFFICULT: 1 COMMON: 2 AVERAGE: 2 SEVERE: 3 App Specific 5.0
A9:2017-Using Components with Known Vulnerabilities App Specific AVERAGE: 2 WIDESPREAD: 3 AVERAGE: 2 MODERATE: 2 App Specific 4.7
A10:2017-Insufficient Logging&Monitoring App Specific AVERAGE: 2 WIDESPREAD: 3 DIFFICULT: 1 MODERATE: 2 App Specific 4.0
Additional Risks To Consider

The Top 10 covers a lot of ground, but there are many other risks you should consider and evaluate in your organization. Some of these have appeared in previous versions of the Top 10, and others have not, including new attack techniques that are being identified all the time. Other important application security risks (ordered by CWE-ID) that you should additionally consider include:

← Note About Risks
2017 Table of Contents

PDF version

Methodology and Data →

© 2002-2017 OWASP Foundation This document is licensed under the Creative Commons Attribution-ShareAlike 3.0 license. Some rights reserved. CC-by-sa-3 0-88x31.png